Assessment
Submission
AI Processing
& Analysis
Key Controls
Review
4
Final
Results
Search & Add Controls
AI-powered search finds controls based on meaning and context
AI Search Results

Found semantically similar controls

0 results

Current Key Controls

179 Total
Scoping Question 1

Will the entity’s personnel require specialized clearances or certifications? Determines if staff need background checks, professional licenses, or industry certifications before starting work. Delays onboarding if certifications lapse; compliance risk if unauthorised staff perform regulated tasks. Credential-verification process Expiration-tracking of certifications Backup resource plan for lapsed clearances

73 Controls
CIS 5.1 Found
Establish and Maintain an Inventory of Accounts

Establish and maintain an inventory of all accounts managed in the enterprise. The inventory must at a minimum include user, administrator accounts, and service accounts. The inventory, at a minimum, ...

Auto-Generated Generated during job processing
Control 5.1 is relevant to the scoping question because maintaining an accurate inventory of accounts—including personnel names, roles, and start/stop dates—enables the organization to verify that only authorized staff with required clearances or cer...
CIS 3.1 Found
Establish and Maintain a Data Management Process

Establish and maintain a documented data management process. In the process, address data sensitivity, data owner, handling of data, data retention limits, and disposal requirements, based on sensitiv...

Auto-Generated Generated during job processing
Control 3.1 is relevant to the scoping question because a documented data management process ensures that sensitive personnel information—such as background checks, certifications, and clearances—is properly handled, retained, and disposed of in acco...
CIS 2.2 Found
Ensure Authorized Software is Currently Supported

Ensure that only currently supported software is designated as authorized in the software inventory for enterprise assets. If software is unsupported, yet necessary for the fulfillment of the enterpri...

Auto-Generated Generated during job processing
Control 2.2 is relevant to the scoping question because personnel with specialized clearances or certifications often require access to authorized, supported software to perform regulated tasks securely and compliantly. Ensuring only supported softwa...
NIST PE-3 Found
Physical Access Control

Physical access control applies to employees and visitors. Individuals with permanent physical access authorizations are not considered visitors. Physical access controls for publicly accessible areas...

Auto-Generated Generated during job processing
1. PE-3 (Physical Access Control) addresses the scoping question by ensuring that only personnel with the required specialized clearances or certifications are granted physical access to sensitive or restricted areas. 2. This control is important for...
NIST AT-3 Found
Role-based Training

Organizations determine the content of training based on the assigned roles and responsibilities of individuals as well as the security and privacy requirements of organizations and the systems to whi...

Auto-Generated Generated during job processing
1. **How this control addresses the scoping question:** AT-3 (Role-based Training) ensures that personnel receive training tailored to their specific roles, including any specialized clearances or certifications required for those roles. 2. **Why ...
NIST SA-9 Found
External System Services

External system services are provided by an external provider, and the organization has no direct control over the implementation of the required controls or the assessment of control effectiveness. O...

Auto-Generated Generated during job processing
Control SA-9 is relevant to the scoping question because it ensures that external service providers are contractually obligated to verify personnel credentials, certifications, and clearances as part of their security responsibilities. This control i...
NIST SA-21 Found
Developer Screening

Developer screening is directed at external developers. Internal developer screening is addressed by PS-3. Because the system, system component, or system service may be used in critical activities es...

Auto-Generated Generated during job processing
Control SA-21 (Developer Screening) directly addresses the scoping question by requiring verification that external developers possess the necessary clearances, background checks, and certifications before engaging in critical system activities. This...
NIST CP-3 Found
Contingency Training

Contingency training provided by organizations is linked to the assigned roles and responsibilities of organizational personnel to ensure that the appropriate content and level of detail is included i...

Auto-Generated Generated during job processing
1. CP-3 Contingency Training is relevant to the scoping question because it ensures personnel receive role-specific training, including any specialized clearances or certifications required for contingency operations. 2. This control is important for...
NIST CA-6 Found
Authorization

Authorizations are official management decisions by senior officials to authorize operation of systems, authorize the use of common controls for inheritance by organizational systems, and explicitly a...

Auto-Generated Generated during job processing
CA-6 (Authorization) is relevant to the scoping question because it requires senior officials to formally authorize system operations and accept associated risks, including ensuring that personnel meet required clearances and certifications. This con...
NIST PE-2 Found
Physical Access Authorizations

Physical access authorizations apply to employees and visitors. Individuals with permanent physical access authorization credentials are not considered visitors. Authorization credentials include ID b...

Auto-Generated Generated during job processing
1. PE-2 (Physical Access Authorizations) addresses the scoping question by ensuring that only personnel with the required clearances or certifications are granted physical access to sensitive areas, aligning access rights with credential requirements...
NIST AC-3 Found
Access Enforcement

Access control policies control access between active entities or subjects (i.e., users or processes acting on behalf of users) and passive entities or objects (i.e., devices, files, records, domains)...

Auto-Generated Generated during job processing
1. AC-3 (Access Enforcement) addresses the scoping question by ensuring that only personnel with the required clearances, certifications, or licenses are granted access to systems, applications, or data relevant to their roles. 2. This control is imp...
NIST PM-10 Found
Authorization Process

Authorization processes for organizational systems and environments of operation require the implementation of an organization-wide risk management process and associated security and privacy standard...

Auto-Generated Generated during job processing
1. PM-10 (Authorization Process) is relevant to the scoping question because it ensures that only personnel with the required clearances, certifications, or licenses are formally authorized to access systems or perform regulated tasks. 2. This contro...
NIST PS-3 Found
Personnel Screening

Personnel screening and rescreening activities reflect applicable laws, executive orders, directives, regulations, policies, standards, guidelines, and specific criteria established for the risk desig...

Auto-Generated Generated during job processing
PS-3 Personnel Screening is directly relevant to the scoping question because it ensures that staff undergo appropriate background checks and credential verification before accessing sensitive systems or performing regulated tasks. This control is es...
NIST IA-2 Found
Identification and Authentication (Organizational Users)

Organizations can satisfy the identification and authentication requirements by complying with the requirements in HSPD 12. Organizational users include employees or individuals who organizations cons...

Auto-Generated Generated during job processing
1. Control IA-2 ensures that only authorized personnel—whose identities and credentials have been verified—can access organizational systems, directly addressing the need for specialized clearances or certifications identified in the scoping question...
NIST PE-6 Found
Monitoring Physical Access

Physical access monitoring includes publicly accessible areas within organizational facilities. Examples of physical access monitoring include the employment of guards, video surveillance equipment (i...

Auto-Generated Generated during job processing
PE-6 (Monitoring Physical Access) is relevant to the scoping question because it ensures that only personnel with the required specialized clearances or certifications can physically access sensitive areas. This control is important for compliance as...
NIST CP-9 Found
System Backup

System-level information includes system state information, operating system software, middleware, application software, and licenses. User-level information includes information other than system-lev...

Auto-Generated Generated during job processing
Control CP-9 (System Backup) is relevant to the scoping question because it ensures that critical information, such as personnel clearance records, certification statuses, and onboarding documentation, is securely backed up and recoverable in case of...
NIST PT-2 Found
Authority to Process Personally Identifiable Information

The processing of personally identifiable information is an operation or set of operations that the information system or organization performs with respect to personally identifiable information acro...

Auto-Generated Generated during job processing
1. Control PT-2 is relevant to the scoping question because it requires organizations to ensure that only authorized personnel process personally identifiable information, which may necessitate specialized clearances or certifications. 2. This contro...
NIST PM-23 Found
Data Governance Body

A Data Governance Body can help ensure that the organization has coherent policies and the ability to balance the utility of data with security and privacy requirements. The Data Governance Body estab...

Auto-Generated Generated during job processing
1. The Data Governance Body (PM-23) addresses the scoping question by establishing and enforcing policies that define personnel requirements for data access, including necessary clearances, certifications, and background checks. 2. This control is im...
NIST AU-1 Found
Policy and Procedures

Audit and accountability policy and procedures address the controls in the AU family that are implemented within systems and organizations. The risk management strategy is an important factor in estab...

Auto-Generated Generated during job processing
AU-1 (Policy and Procedures) is relevant to the scoping question because it requires the organization to formally document and implement policies and procedures for audit and accountability, including credential verification and tracking of specializ...
NIST SA-23 Found
Specialization

It is often necessary for a system or system component that supports mission-essential services or functions to be enhanced to maximize the trustworthiness of the resource. Sometimes this enhancement ...

Auto-Generated Generated during job processing
Control SA-23 (Specialization) is relevant to the scoping question because it ensures that systems supporting mission-essential functions are enhanced to verify and authenticate the identity and qualifications of personnel accessing them. This contro...
NIST PS-7 Found
External Personnel Security

External provider refers to organizations other than the organization operating or acquiring the system. External providers include service bureaus, contractors, and other organizations that provide s...

Auto-Generated Generated during job processing
1. This control addresses the scoping question by requiring organizations to explicitly define and enforce personnel security requirements—including specialized clearances or certifications—for external personnel in acquisition and contracting proces...
NIST AC-2 Found
Account Management

Examples of system account types include individual, shared, group, system, guest, anonymous, emergency, developer, temporary, and service. Identification of authorized system users and the specificat...

Auto-Generated Generated during job processing
1. AC-2 (Account Management) directly addresses the scoping question by requiring organizations to identify and authorize system users based on specific attributes, such as specialized clearances or certifications, before granting access to accounts....
NIST PS-2 Found
Position Risk Designation

Position risk designations reflect Office of Personnel Management (OPM) policy and guidance. Proper position designation is the foundation of an effective and consistent suitability and personnel secu...

Auto-Generated Generated during job processing
1. Control PS-2 (Position Risk Designation) directly addresses the scoping question by requiring organizations to formally assess and designate the risk and sensitivity levels of each position, which determines whether specialized clearances, backgro...
NIST MA-5 Found
Maintenance Personnel

Maintenance personnel refers to individuals who perform hardware or software maintenance on organizational systems, while PE-2 addresses physical access for individuals whose maintenance duties place ...

Auto-Generated Generated during job processing
MA-5 (Maintenance Personnel) directly addresses the scoping question by requiring that individuals performing maintenance on organizational systems possess appropriate access authorizations and, where necessary, specialized credentials or clearances....
NIST PT-7 Found
Specific Categories of Personally Identifiable Information

Organizations apply any conditions or protections that may be necessary for specific categories of personally identifiable information. These conditions may be required by laws, executive orders, dire...

Auto-Generated Generated during job processing
1. Control PT-7 is relevant to the scoping question because verifying personnel clearances or certifications often involves collecting and handling sensitive categories of personally identifiable information (PII), such as background check results or...
NIST CA-7 Found
Continuous Monitoring

Continuous monitoring at the system level facilitates ongoing awareness of the system security and privacy posture to support organizational risk management decisions. The terms continuous and ongoing...

Auto-Generated Generated during job processing
CA-7 Continuous Monitoring is directly relevant to the scoping question because it ensures ongoing oversight of personnel clearances and certifications, promptly identifying lapses or expirations that could impact compliance. This control is importan...
NIST IA-7 Found
Cryptographic Module Authentication

Authentication mechanisms may be required within a cryptographic module to authenticate an operator accessing the module and to verify that the operator is authorized to assume the requested role and ...

Auto-Generated Generated during job processing
1. Control IA-7 addresses the scoping question by ensuring that only personnel with the required clearances or certifications can access cryptographic modules, using authentication mechanisms to verify their authorization. 2. This control is importan...
NIST PM-21 Found
Accounting of Disclosures

The purpose of accounting of disclosures is to allow individuals to learn to whom their personally identifiable information has been disclosed, to provide a basis for subsequently advising recipients ...

Auto-Generated Generated during job processing
1. **How this control addresses the scoping question:** PM-21 (Accounting of Disclosures) is relevant because verifying personnel clearances or certifications often requires sharing personally identifiable information (PII) with external credential...
NIST PS-4 Found
Personnel Termination

System property includes hardware authentication tokens, system administration technical manuals, keys, identification cards, and building passes. Exit interviews ensure that terminated individuals un...

Auto-Generated Generated during job processing
1. Control PS-4 (Personnel Termination) addresses the scoping question by ensuring that when personnel with specialized clearances or certifications leave the organization, their access to sensitive systems and information is promptly revoked and all...
NIST AC-5 Found
Separation of Duties

Separation of duties addresses the potential for abuse of authorized privileges and helps to reduce the risk of malevolent activity without collusion. Separation of duties includes dividing mission or...

Auto-Generated Generated during job processing
1. The AC-5 Separation of Duties control addresses the scoping question by ensuring that only personnel with the appropriate clearances or certifications are assigned to specific roles, thereby preventing unauthorized individuals from performing regu...
NIST PT-3 Found
Personally Identifiable Information Processing Purposes

Identifying and documenting the purpose for processing provides organizations with a basis for understanding why personally identifiable information may be processed. The term process includes every s...

Auto-Generated Generated during job processing
1. This control is relevant to the scoping question because verifying personnel clearances or certifications often involves processing personally identifiable information (PII), such as background checks or professional license details. 2. It is im...
NIST IA-11 Found
Re-authentication

In addition to the re-authentication requirements associated with device locks, organizations may require re-authentication of individuals in certain situations, including when roles, authenticators o...

Auto-Generated Generated during job processing
1. This control addresses the scoping question by ensuring that personnel with specialized clearances or certifications are re-authenticated when their roles or credentials change, preventing unauthorized access by individuals whose qualifications ma...
NIST CA-1 Found
Policy and Procedures

Assessment, authorization, and monitoring policy and procedures address the controls in the CA family that are implemented within systems and organizations. The risk management strategy is an importan...

Auto-Generated Generated during job processing
CA-1 (Policy and Procedures) is directly relevant to the scoping question because it requires the organization to formally establish and document policies and procedures for assessment, authorization, and monitoring—including those governing personne...
NIST AC-25 Found
Reference Monitor

A reference monitor is a set of design requirements on a reference validation mechanism that, as a key component of an operating system, enforces an access control policy over all subjects and objects...

Auto-Generated Generated during job processing
AC-25 (Reference Monitor) is relevant to the scoping question because it enforces access control policies that can restrict system access based on personnel clearances, certifications, or authorizations. This control is important for compliance as it...
NIST IA-1 Found
Policy and Procedures

Identification and authentication policy and procedures address the controls in the IA family that are implemented within systems and organizations. The risk management strategy is an important factor...

Auto-Generated Generated during job processing
Control IA-1 (Policy and Procedures) is relevant to the scoping question because it requires the organization to formally establish and document identification and authentication policies and procedures, including those governing personnel clearances...
NIST PS-1 Found
Policy and Procedures

Personnel security policy and procedures for the controls in the PS family that are implemented within systems and organizations. The risk management strategy is an important factor in establishing su...

Auto-Generated Generated during job processing
Control PS-1 (Policy and Procedures) is relevant to the scoping question because it requires the organization to formally document and implement personnel security policies and procedures, including those related to verifying specialized clearances o...
NIST PM-11 Found
Mission and Business Process Definition

Protection needs are technology-independent capabilities that are required to counter threats to organizations, individuals, systems, and the Nation through the compromise of information (i.e., loss o...

Auto-Generated Generated during job processing
1. PM-11 (Mission and Business Process Definition) ensures that the organization formally identifies and documents its mission requirements, including the need for personnel with specialized clearances or certifications, as part of its protection nee...
NIST CP-7 Found
Alternate Processing Site

Alternate processing sites are geographically distinct from primary processing sites and provide processing capability if the primary processing site is not available. The alternate processing capabil...

Auto-Generated Generated during job processing
1. Control CP-7 (Alternate Processing Site) addresses the scoping question by requiring that personnel assigned to alternate sites meet the same specialized clearances or certifications as those at the primary site, ensuring continuity of compliance ...
NIST RA-3 Found
Risk Assessment

Risk assessments consider threats, vulnerabilities, likelihood, and impact to organizational operations and assets, individuals, other organizations, and the Nation. Risk assessments also consider ris...

Auto-Generated Generated during job processing
1. **How this control addresses the scoping question:** RA-3 (Risk Assessment) ensures that the organization systematically evaluates risks associated with personnel who require specialized clearances or certifications, including the potential impa...
NIST PL-4 Found
Rules of Behavior

Rules of behavior represent a type of access agreement for organizational users. Other types of access agreements include nondisclosure agreements, conflict-of-interest agreements, and acceptable use ...

Auto-Generated Generated during job processing
1. PL-4 (Rules of Behavior) addresses the scoping question by requiring personnel to formally acknowledge and adhere to organizational policies, including those related to specialized clearances or certifications. 2. This control is important for com...
NIST PS-9 Found
Position Descriptions

Specification of security and privacy roles in individual organizational position descriptions facilitates clarity in understanding the security or privacy responsibilities associated with the roles a...

Auto-Generated Generated during job processing
1. Control PS-9 ensures that position descriptions clearly define the security and privacy responsibilities, including any required clearances or certifications, directly addressing whether personnel need specialized credentials. 2. This control is i...
NIST SR-4
Provenance

Every system and system component has a point of origin and may be changed throughout its existence. Provenance is the chronology of the origin, development, ownership, location, and changes to a syst...

Auto-Generated Generated during job processing
Control SR-4 (Provenance) is relevant to the scoping question because it requires organizations to document and monitor the origin and changes related to personnel and processes interacting with systems, including those requiring specialized clearanc...
NIST PE-16 Found
Delivery and Removal

Enforcing authorizations for entry and exit of system components may require restricting access to delivery areas and isolating the areas from the system and media libraries.

Auto-Generated Generated during job processing
PE-16 (Delivery and Removal) is relevant to the scoping question because it ensures that only authorized personnel with the required clearances or certifications can access sensitive delivery and removal areas, preventing unauthorized handling of sys...
NIST CA-2 Found
Control Assessments

Organizations ensure that control assessors possess the required skills and technical expertise to develop effective assessment plans and to conduct assessments of system-specific, hybrid, common, and...

Auto-Generated Generated during job processing
1. **How this control addresses the scoping question:** CA-2 (Control Assessments) ensures that individuals conducting security and privacy control assessments possess the necessary skills, certifications, and expertise, directly addressing whether...
NIST AT-1 Found
Policy and Procedures

Awareness and training policy and procedures address the controls in the AT family that are implemented within systems and organizations. The risk management strategy is an important factor in establi...

Auto-Generated Generated during job processing
Control AT-1 (Policy and Procedures) is relevant to the scoping question because it ensures the organization formally documents and maintains policies and procedures for verifying personnel credentials, tracking certification expirations, and managin...
NIST IA-8 Found
Identification and Authentication (Non-organizational Users)

Non-organizational users include system users other than organizational users explicitly covered by IA-2. Non-organizational users are uniquely identified and authenticated for accesses other than tho...

Auto-Generated Generated during job processing
Control IA-8 is relevant to the scoping question because it ensures that non-organizational users—such as contractors or third-party personnel—are uniquely identified and authenticated before accessing systems, which is critical when specialized clea...
NIST AC-14 Found
Permitted Actions Without Identification or Authentication

Specific user actions may be permitted without identification or authentication if organizations determine that identification and authentication are not required for the specified user actions. Organ...

Auto-Generated Generated during job processing
AC-14 is relevant to the scoping question because it defines which actions, if any, can be performed by personnel without identification or authentication, directly impacting whether specialized clearances or certifications are required before access...
NIST IA-12 Found
Identity Proofing

Identity proofing is the process of collecting, validating, and verifying a user’s identity information for the purposes of establishing credentials for accessing a system. Identity proofing is ...

Auto-Generated Generated during job processing
1. Control IA-12 (Identity Proofing) addresses the scoping question by ensuring that personnel identities are thoroughly verified before granting access, which is essential when specialized clearances or certifications are required. 2. This control...
NIST PE-8 Found
Visitor Access Records

Visitor access records include the names and organizations of individuals visiting, visitor signatures, forms of identification, dates of access, entry and departure times, purpose of visits, and the ...

Auto-Generated Generated during job processing
PE-8 Visitor Access Records is relevant to the scoping question because it ensures that only authorized personnel—those with required clearances or certifications—are granted access to sensitive areas. Maintaining and reviewing visitor access records...
NIST IA-5 Found
Authenticator Management

Authenticators include passwords, cryptographic devices, biometrics, certificates, one-time password devices, and ID badges. Device authenticators include certificates and passwords. Initial authentic...

Auto-Generated Generated during job processing
1. Control IA-5 (Authenticator Management) addresses the scoping question by ensuring that only personnel with the required clearances or certifications are issued authenticators (such as ID badges or access credentials), and that these authenticator...
NIST PM-31 Found
Continuous Monitoring Strategy

Continuous monitoring at the organization level facilitates ongoing awareness of the security and privacy posture across the organization to support organizational risk management decisions. The terms...

Auto-Generated Generated during job processing
Control PM-31 (Continuous Monitoring Strategy) is relevant to the scoping question because it ensures ongoing oversight of personnel clearances and certifications, enabling timely detection of expired or missing credentials. This control is important...
NIST AT-4 Found
Training Records

Documentation for specialized training may be maintained by individual supervisors at the discretion of the organization. The National Archives and Records Administration provides guidance on records ...

Auto-Generated Generated during job processing
Control AT-4 (Training Records) is relevant to the scoping question because it ensures that documentation of personnel’s specialized training, certifications, and clearances is properly maintained and accessible. This control is important for complia...
NIST RA-1 Found
Policy and Procedures

Risk assessment policy and procedures address the controls in the RA family that are implemented within systems and organizations. The risk management strategy is an important factor in establishing s...

Auto-Generated Generated during job processing
Control RA-1 (Policy and Procedures) is relevant to the scoping question because it requires the organization to establish formal policies and procedures for risk assessment, which includes identifying and managing personnel risks such as the need fo...
NIST CP-1 Found
Policy and Procedures

Contingency planning policy and procedures address the controls in the CP family that are implemented within systems and organizations. The risk management strategy is an important factor in establish...

Auto-Generated Generated during job processing
Control CP-1 (Policy and Procedures) is relevant to the scoping question because it requires the organization to formally establish and document processes for contingency planning, including those related to personnel clearances and certifications. T...
NIST SA-3 Found
System Development Life Cycle

A system development life cycle process provides the foundation for the successful development, implementation, and operation of organizational systems. The integration of security and privacy conside...

Auto-Generated Generated during job processing
1. Control SA-3 is relevant to the scoping question because it requires the inclusion of qualified personnel with appropriate security and privacy expertise throughout the system development life cycle, which may necessitate specialized clearances or...
NIST PM-12 Found
Insider Threat Program

Organizations that handle classified information are required, under Executive Order 13587 EO 13587 and the National Insider Threat Policy ODNI NITP, to establish insider threat programs. The same sta...

Auto-Generated Generated during job processing
1. The Insider Threat Program (PM-12) addresses the scoping question by requiring organizations to monitor and verify personnel credentials, clearances, and certifications as part of their insider threat mitigation efforts. 2. This control is importa...
NIST PT-5
Privacy Notice

Privacy notices help inform individuals about how their personally identifiable information is being processed by the system or organization. Organizations use privacy notices to inform individuals ab...

Auto-Generated Generated during job processing
1. The PT-5 Privacy Notice control addresses the scoping question by ensuring that personnel are informed about how their personally identifiable information—such as background checks, certifications, and clearance status—is collected, processed, and...
NIST AC-1 Found
Policy and Procedures

Access control policy and procedures address the controls in the AC family that are implemented within systems and organizations. The risk management strategy is an important factor in establishing su...

Auto-Generated Generated during job processing
AC-1 (Policy and Procedures) is directly relevant to the scoping question because it requires the organization to formally document and implement access control policies and procedures, which include requirements for personnel clearances, certificati...
NIST SR-5 Found
Acquisition Strategies, Tools, and Methods

The use of the acquisition process provides an important vehicle to protect the supply chain. There are many useful tools and techniques available, including obscuring the end use of a system or syste...

Auto-Generated Generated during job processing
Control SR-5 is relevant to the scoping question because it ensures that acquisition processes include requirements for personnel clearances and certifications, helping to prevent unauthorized or unqualified staff from accessing sensitive supply chai...
NIST PL-10 Found
Baseline Selection

Control baselines are predefined sets of controls specifically assembled to address the protection needs of a group, organization, or community of interest. Controls are chosen for baselines to either...

Auto-Generated Generated during job processing
1. PL-10 (Baseline Selection) addresses the scoping question by ensuring that the organization selects appropriate security and privacy controls—including those related to personnel clearances and certifications—based on legal, regulatory, and busine...
NIST PS-5 Found
Personnel Transfer

Personnel transfer applies when reassignments or transfers of individuals are permanent or of such extended duration as to make the actions warranted. Organizations define actions appropriate for the ...

Auto-Generated Generated during job processing
1. Control PS-5 (Personnel Transfer) addresses the scoping question by ensuring that when personnel are reassigned or transferred, their access rights, credentials, and certifications are reviewed and updated to match the requirements of their new ro...
NIST SA-1 Found
Policy and Procedures

System and services acquisition policy and procedures address the controls in the SA family that are implemented within systems and organizations. The risk management strategy is an important factor i...

Auto-Generated Generated during job processing
Control SA-1 (Policy and Procedures) is relevant to the scoping question because it ensures the organization formally defines and documents requirements for personnel clearances and certifications within its system and services acquisition policies. ...
NIST CM-4 Found
Impact Analyses

Organizational personnel with security or privacy responsibilities conduct impact analyses. Individuals conducting impact analyses possess the necessary skills and technical expertise to analyze the c...

Auto-Generated Generated during job processing
Control CM-4 (Impact Analyses) is relevant to the scoping question because it ensures that personnel conducting impact analyses possess the necessary clearances, certifications, or expertise required for their roles. This control is important for com...
NIST SI-18 Found
Personally Identifiable Information Quality Operations

Personally identifiable information quality operations include the steps that organizations take to confirm the accuracy and relevance of personally identifiable information throughout the information...

Auto-Generated Generated during job processing
Control SI-18 is relevant to the scoping question because it ensures the accuracy and validity of personally identifiable information (PII), such as background check results, professional licenses, and certifications, which are critical for verifying...
NIST PM-25 Found
Minimization of Personally Identifiable Information Used in Testing, Training, and Research

The use of personally identifiable information in testing, research, and training increases the risk of unauthorized disclosure or misuse of such information. Organizations consult with the senior age...

Auto-Generated Generated during job processing
1. This control addresses the scoping question by ensuring that, when verifying personnel clearances or certifications—which may involve handling sensitive personal data—organizations minimize the use of actual personally identifiable information (PI...
NIST SI-1 Found
Policy and Procedures

System and information integrity policy and procedures address the controls in the SI family that are implemented within systems and organizations. The risk management strategy is an important factor ...

Auto-Generated Generated during job processing
1. SI-1 (Policy and Procedures) ensures that the organization formally documents and enforces requirements for personnel clearances and certifications, including background checks and credential verification processes. 2. This control is important fo...
NIST SI-6 Found
Security and Privacy Function Verification

Transitional states for systems include system startup, restart, shutdown, and abort. System notifications include hardware indicator lights, electronic alerts to system administrators, and messages t...

Auto-Generated Generated during job processing
1. SI-6 (Security and Privacy Function Verification) is relevant to the scoping question because it ensures that system functions—such as credential verification and access controls—operate correctly during transitional states, preventing unauthorize...
NIST PT-1 Found
Policy and Procedures

Personally identifiable information processing and transparency policy and procedures address the controls in the PT family that are implemented within systems and organizations. The risk management s...

Auto-Generated Generated during job processing
Control PT-1 (Policy and Procedures) is relevant to the scoping question because it requires the organization to formally document and implement policies and procedures for processing personally identifiable information, including requirements for pe...
NIST PM-13 Found
Security and Privacy Workforce

Security and privacy workforce development and improvement programs include defining the knowledge, skills, and abilities needed to perform security and privacy duties and tasks; developing role-based...

Auto-Generated Generated during job processing
Control PM-13 is directly relevant to the scoping question because it requires organizations to define and verify the qualifications, certifications, and clearances necessary for personnel in security and privacy roles. This control is important for ...
NIST MA-1 Found
Policy and Procedures

Maintenance policy and procedures address the controls in the MA family that are implemented within systems and organizations. The risk management strategy is an important factor in establishing such ...

Auto-Generated Generated during job processing
1. MA-1 (Policy and Procedures) ensures that the organization formally documents and maintains policies and procedures for personnel credentialing, including requirements for specialized clearances or certifications. 2. This control is important for ...
NIST AT-2 Found
Literacy Training and Awareness

Organizations provide basic and advanced levels of literacy training to system users, including measures to test the knowledge level of users. Organizations determine the content of literacy training ...

Auto-Generated Generated during job processing
1. Control AT-2 addresses the scoping question by ensuring personnel receive targeted literacy training and awareness based on their roles, including requirements for specialized clearances or certifications. 2. This control is important for complian...
NIST PS-8 Found
Personnel Sanctions

Organizational sanctions reflect applicable laws, executive orders, directives, regulations, policies, standards, and guidelines. Sanctions processes are described in access agreements and can be incl...

Auto-Generated Generated during job processing
PS-8 (Personnel Sanctions) is relevant to the scoping question because it ensures that there are formal consequences for personnel who fail to obtain or maintain required clearances or certifications. This control is important for compliance as it en...
NIST PE-1 Found
Policy and Procedures

Physical and environmental protection policy and procedures address the controls in the PE family that are implemented within systems and organizations. The risk management strategy is an important fa...

Auto-Generated Generated during job processing
1. Control PE-1 ensures that the organization establishes and maintains documented policies and procedures for physical and environmental protection, which should include requirements for personnel clearances, certifications, and credential verificat...
Scoping Question 2

Will the entity have physical access to the entity’s managed devices (e.g., laptops, smartphones, tablets)? Determines if the entity’s personnel will handle or use corporate-owned endpoints, which may store sensitive data. Direct device access can lead to data leakage, malware introduction, or unauthorised configuration changes. Device inventory and tracking Endpoint security policies (e.g., MDM enforcement) Access logging and tamper-evident seals

60 Controls
CIS 4.11 Found
Enforce Remote Wipe Capability on Portable End-User Devices

Remotely wipe enterprise data from enterprise-owned portable end-user devices when deemed appropriate such as lost or stolen devices, or when an individual no longer supports the enterprise.

Auto-Generated Generated during job processing
1. This control addresses the scoping question by ensuring that, if personnel have physical access to managed devices, the organization can remotely remove sensitive data in cases of loss, theft, or personnel changes. 2. It is important for complianc...
CIS 3.14 Found
Log Sensitive Data Access

Log sensitive data access, including modification and disposal.

Auto-Generated Generated during job processing
Control 3.14, "Log Sensitive Data Access," is relevant to the scoping question because it ensures that all access, modification, or disposal of sensitive data on managed devices is recorded when personnel have physical access. This control is importa...
CIS 1.1 Found
Establish and Maintain Detailed Enterprise Asset Inventory

Establish and maintain an accurate, detailed, and up-to-date inventory of all enterprise assets with the potential to store or process data, to include: end-user devices (including portable and mobile...

Auto-Generated Generated during job processing
Control 1.1 is directly relevant to the scoping question because maintaining a detailed and up-to-date inventory of all managed devices ensures the organization knows which endpoints personnel can physically access. This control is important for comp...
CIS 4.1 Found
Establish and Maintain a Secure Configuration Process

Establish and maintain a documented secure configuration process for enterprise assets (end-user devices, including portable and mobile, non-computing/IoT devices, and servers) and software (operating...

Auto-Generated Generated during job processing
Control 4.1 is directly relevant to the scoping question because it ensures that all managed devices with physical access are configured securely, reducing risks associated with unauthorized access, data leakage, or malware introduction. This control...
CIS 3.5 Found
Securely Dispose of Data

Securely dispose of data as outlined in the enterprise’s documented data management process. Ensure the disposal process and method are commensurate with the data sensitivity.

Auto-Generated Generated during job processing
Control 3.5 (Securely Dispose of Data) is relevant to the scoping question because personnel with physical access to managed devices may need to dispose of sensitive data stored on those endpoints. This control ensures that data is irretrievably dest...
CIS 4.6 Found
Securely Manage Enterprise Assets and Software

Securely manage enterprise assets and software. Example implementations include managing configuration through version-controlled Infrastructure-as-Code (IaC) and accessing administrative interfaces o...

Auto-Generated Generated during job processing
Control 4.6 is relevant to the scoping question because it ensures that all enterprise assets, including managed devices with physical access, are securely configured and managed using secure protocols. This control is important for compliance as it ...
CIS 4.12 Found
Separate Enterprise Workspaces on Mobile End-User Devices

Ensure separate enterprise workspaces are used on mobile end-user devices, where supported. Example implementations include using an Apple® Configuration Profile or Android™ Work Profile to separate e...

Auto-Generated Generated during job processing
Control 4.12 is relevant to the scoping question because it ensures that when personnel have physical access to managed mobile devices, enterprise data is logically separated from personal data, reducing the risk of data leakage or unauthorized acces...
CIS 4.2 Found
Establish and Maintain a Secure Configuration Process for Network Infrastructure

Establish and maintain a documented secure configuration process for network devices. Review and update documentation annually, or when significant enterprise changes occur that could impact this Safe...

Auto-Generated Generated during job processing
Control 4.2 is relevant to the scoping question because establishing and maintaining secure configurations for network infrastructure helps ensure that managed devices connecting to the network are protected from unauthorized access and configuration...
NIST AU-6 Found
Audit Record Review, Analysis, and Reporting

Audit record review, analysis, and reporting covers information security- and privacy-related logging performed by organizations, including logging that results from the monitoring of account usage, r...

Auto-Generated Generated during job processing
AU-6 (Audit Record Review, Analysis, and Reporting) is relevant to the scoping question because it ensures that all physical access to managed devices is logged, reviewed, and analyzed for potential security incidents or unauthorized activities. This...
NIST PE-3 Found
Physical Access Control

Physical access control applies to employees and visitors. Individuals with permanent physical access authorizations are not considered visitors. Physical access controls for publicly accessible areas...

Auto-Generated Generated during job processing
PE-3 Physical Access Control is directly relevant to the scoping question because it governs how personnel and visitors access areas where managed devices are stored or used. This control is essential for compliance as it helps prevent unauthorized p...
NIST PE-2 Found
Physical Access Authorizations

Physical access authorizations apply to employees and visitors. Individuals with permanent physical access authorization credentials are not considered visitors. Authorization credentials include ID b...

Auto-Generated Generated during job processing
PE-2 (Physical Access Authorizations) is directly relevant to the scoping question because it governs who is permitted to physically access managed devices, such as laptops and smartphones, within an organization’s facilities. This control is importa...
NIST AC-3 Found
Access Enforcement

Access control policies control access between active entities or subjects (i.e., users or processes acting on behalf of users) and passive entities or objects (i.e., devices, files, records, domains)...

Auto-Generated Generated during job processing
AC-3 (Access Enforcement) is relevant to the scoping question because it ensures that only authorized personnel can access managed devices, thereby reducing the risk of data leakage, malware introduction, or unauthorized configuration changes when ph...
NIST CM-5 Found
Access Restrictions for Change

Changes to the hardware, software, or firmware components of systems or the operational procedures related to the system can potentially have significant effects on the security of the systems or indi...

Auto-Generated Generated during job processing
CM-5 (Access Restrictions for Change) is relevant to the scoping question because it ensures that only authorized personnel can make changes to managed devices, whether through physical or logical access. This control is important for compliance as i...
NIST PM-10 Found
Authorization Process

Authorization processes for organizational systems and environments of operation require the implementation of an organization-wide risk management process and associated security and privacy standard...

Auto-Generated Generated during job processing
1. **How this control addresses the scoping question:** PM-10 (Authorization Process) ensures that only authorized personnel are granted physical access to managed devices by requiring formal risk management and approval processes for system access...
NIST SC-42 Found
Sensor Capability and Data

Sensor capability and data applies to types of systems or system components characterized as mobile devices, such as cellular telephones, smart phones, and tablets. Mobile devices often include sensor...

Auto-Generated Generated during job processing
SC-42 is relevant to the scoping question because it addresses the risks associated with physical access to managed mobile devices that contain embedded sensors, such as cameras and microphones. This control is important for compliance as it helps pr...
NIST IA-2 Found
Identification and Authentication (Organizational Users)

Organizations can satisfy the identification and authentication requirements by complying with the requirements in HSPD 12. Organizational users include employees or individuals who organizations cons...

Auto-Generated Generated during job processing
Control IA-2 is directly relevant to the scoping question because it ensures that only authorized organizational users can access managed devices, whether physically or through local/network connections. This control is important for compliance as it...
NIST PE-6 Found
Monitoring Physical Access

Physical access monitoring includes publicly accessible areas within organizational facilities. Examples of physical access monitoring include the employment of guards, video surveillance equipment (i...

Auto-Generated Generated during job processing
PE-6 (Monitoring Physical Access) is directly relevant to the scoping question because it ensures that any physical access to managed devices is actively monitored and logged, helping to detect and respond to unauthorized or suspicious activities. Th...
NIST CP-9 Found
System Backup

System-level information includes system state information, operating system software, middleware, application software, and licenses. User-level information includes information other than system-lev...

Auto-Generated Generated during job processing
1. **How this control addresses the scoping question:** CP-9 (System Backup) is relevant because if personnel have physical access to managed devices, there is an increased risk of data loss or corruption due to theft, tampering, or accidental dama...
NIST PT-2 Found
Authority to Process Personally Identifiable Information

The processing of personally identifiable information is an operation or set of operations that the information system or organization performs with respect to personally identifiable information acro...

Auto-Generated Generated during job processing
Control PT-2 is relevant to the scoping question because physical access to managed devices may allow personnel to process personally identifiable information (PII) stored on those devices. This control ensures that only authorized individuals are pe...
NIST SC-28 Found
Protection of Information at Rest

Information at rest refers to the state of information when it is not in process or in transit and is located on system components. Such components include internal or external hard disk drives, stora...

Auto-Generated Generated during job processing
SC-28 (Protection of Information at Rest) is directly relevant to the scoping question because personnel with physical access to managed devices may be able to access or compromise sensitive data stored on those devices. This control ensures that inf...
NIST PM-23 Found
Data Governance Body

A Data Governance Body can help ensure that the organization has coherent policies and the ability to balance the utility of data with security and privacy requirements. The Data Governance Body estab...

Auto-Generated Generated during job processing
The PM-23 Data Governance Body control is relevant to the scoping question because it ensures that organizational policies and procedures are established for managing sensitive data on managed devices, including those physically accessed by personnel...
NIST MP-5 Found
Media Transport

System media includes digital and non-digital media. Digital media includes flash drives, diskettes, magnetic tapes, external or removable hard disk drives (e.g., solid state and magnetic), compact d...

Auto-Generated Generated during job processing
MP-5 (Media Transport) is relevant to the scoping question because managed devices often contain sensitive data stored on digital media, and physical access by personnel introduces the risk of unauthorized removal, transport, or loss of such media. T...
NIST PS-7 Found
External Personnel Security

External provider refers to organizations other than the organization operating or acquiring the system. External providers include service bureaus, contractors, and other organizations that provide s...

Auto-Generated Generated during job processing
Control PS-7 (External Personnel Security) is relevant to the scoping question because it ensures that external personnel—such as contractors or service providers—who may have physical access to managed devices are subject to appropriate personnel se...
NIST AC-2 Found
Account Management

Examples of system account types include individual, shared, group, system, guest, anonymous, emergency, developer, temporary, and service. Identification of authorized system users and the specificat...

Auto-Generated Generated during job processing
AC-2 Account Management is relevant to the scoping question because it ensures that only authorized personnel have system accounts and appropriate access privileges on managed devices, which may be physically accessed by the entity. This control is i...
NIST MP-7 Found
Media Use

System media includes both digital and non-digital media. Digital media includes diskettes, magnetic tapes, flash drives, compact discs, digital versatile discs, and removable hard disk drives. Non-di...

Auto-Generated Generated during job processing
MP-7 (Media Use) is relevant to the scoping question because it governs how personnel may use removable media and storage devices on managed endpoints to which they have physical access. This control is important for compliance as it helps prevent da...
NIST PT-7 Found
Specific Categories of Personally Identifiable Information

Organizations apply any conditions or protections that may be necessary for specific categories of personally identifiable information. These conditions may be required by laws, executive orders, dire...

Auto-Generated Generated during job processing
Control PT-7 is relevant to the scoping question because physical access to managed devices increases the risk of exposure or compromise of specific categories of personally identifiable information (PII) stored on those devices. This control ensures...
NIST IA-3 Found
Device Identification and Authentication

Devices that require unique device-to-device identification and authentication are defined by type, device, or a combination of type and device. Organization-defined device types include devices that ...

Auto-Generated Generated during job processing
1. This control addresses the scoping question by ensuring that only uniquely identified and authenticated devices—whether corporate-owned or otherwise—are permitted to access the organization’s systems and networks, thereby managing the risks associ...
NIST AU-9 Found
Protection of Audit Information

Audit information includes all information needed to successfully audit system activity, such as audit records, audit log settings, audit reports, and personally identifiable information. Audit loggin...

Auto-Generated Generated during job processing
Control AU-9 (Protection of Audit Information) is relevant to the scoping question because if personnel have physical access to managed devices, they could potentially tamper with or delete audit logs stored locally on those devices. This control ens...
NIST PE-18 Found
Location of System Components

Physical and environmental hazards include floods, fires, tornadoes, earthquakes, hurricanes, terrorism, vandalism, an electromagnetic pulse, electrical interference, and other forms of incoming elect...

Auto-Generated Generated during job processing
PE-18 (Location of System Components) is relevant to the scoping question because it ensures that managed devices are placed in secure locations, minimizing the risk of unauthorized physical access or proximity that could lead to data leakage or comp...
NIST CA-9 Found
Internal System Connections

Internal system connections are connections between organizational systems and separate constituent system components (i.e., connections between components that are part of the same system) including ...

Auto-Generated Generated during job processing
CA-9 (Internal System Connections) is relevant to the scoping question because it governs how managed devices—such as laptops, smartphones, and tablets—connect internally within the organization’s systems. This control ensures that only authorized de...
NIST AC-19 Found
Access Control for Mobile Devices

A mobile device is a computing device that has a small form factor such that it can easily be carried by a single individual; is designed to operate without a physical connection; possesses local, non...

Auto-Generated Generated during job processing
AC-19 (Access Control for Mobile Devices) is directly relevant to the scoping question because it establishes requirements for managing and securing mobile devices that personnel physically access and use. This control is important for compliance as ...
NIST PS-4 Found
Personnel Termination

System property includes hardware authentication tokens, system administration technical manuals, keys, identification cards, and building passes. Exit interviews ensure that terminated individuals un...

Auto-Generated Generated during job processing
Control PS-4 (Personnel Termination) is relevant to the scoping question because it ensures that when personnel with physical access to managed devices leave the organization, all system-related property (such as laptops, smartphones, and authenticat...
NIST IA-11 Found
Re-authentication

In addition to the re-authentication requirements associated with device locks, organizations may require re-authentication of individuals in certain situations, including when roles, authenticators o...

Auto-Generated Generated during job processing
The IA-11 Re-authentication control is relevant to the scoping question because it ensures that only authorized personnel can access managed devices, especially after device locks or changes in roles and credentials. This control is important for com...
NIST AC-16 Found
Security and Privacy Attributes

Information is represented internally within systems using abstractions known as data structures. Internal data structures can represent different types of entities, both active and passive. Active en...

Auto-Generated Generated during job processing
1. **How this control addresses the scoping question:** AC-16 ensures that security and privacy attributes are assigned to devices and data, enabling the organization to enforce access controls and information flow restrictions on managed endpoints...
NIST PE-20 Found
Asset Monitoring and Tracking

Asset location technologies can help ensure that critical assets—including vehicles, equipment, and system components—remain in authorized locations. Organizations consult with the Office ...

Auto-Generated Generated during job processing
PE-20 (Asset Monitoring and Tracking) is directly relevant to the scoping question because it ensures that managed devices, such as laptops and smartphones, remain in authorized locations and are accounted for when personnel have physical access. Thi...
NIST PE-5 Found
Access Control for Output Devices

Controlling physical access to output devices includes placing output devices in locked rooms or other secured areas with keypad or card reader access controls and allowing access to authorized indivi...

Auto-Generated Generated during job processing
Control PE-5 is relevant to the scoping question because it ensures that only authorized personnel have physical access to output devices that may be connected to managed endpoints, such as laptops and smartphones. This control is important for compl...
NIST AU-14 Found
Session Audit

Session audits can include monitoring keystrokes, tracking websites visited, and recording information and/or file transfers. Session audit capability is implemented in addition to event logging and m...

Auto-Generated Generated during job processing
1. AU-14 Session Audit is relevant to the scoping question because it enables monitoring and recording of user activities on managed devices to detect unauthorized access, data leakage, or policy violations when personnel have physical access to endp...
NIST AC-25 Found
Reference Monitor

A reference monitor is a set of design requirements on a reference validation mechanism that, as a key component of an operating system, enforces an access control policy over all subjects and objects...

Auto-Generated Generated during job processing
AC-25 (Reference Monitor) is relevant to the scoping question because it ensures that all access to managed devices and their data is strictly controlled and enforced by a tamper-proof mechanism, even when personnel have physical access. This control...
NIST AC-4 Found
Information Flow Enforcement

Information flow control regulates where information can travel within a system and between systems (in contrast to who is allowed to access the information) and without regard to subsequent accesses ...

Auto-Generated Generated during job processing
1. AC-4 (Information Flow Enforcement) is relevant to the scoping question because physical access to managed devices increases the risk of unauthorized data transfer or leakage between systems or networks, making it essential to control and monitor ...
NIST SI-7 Found
Software, Firmware, and Information Integrity

Unauthorized changes to software, firmware, and information can occur due to errors or malicious activity. Software includes operating systems (with key internal components, such as kernels or drivers...

Auto-Generated Generated during job processing
Control SI-7 is relevant to the scoping question because it ensures the integrity of software, firmware, and information on managed devices that personnel can physically access. This control is important for compliance as it helps detect and prevent ...
NIST PE-22 Found
Component Marking

Hardware components that may require marking include input and output devices. Input devices include desktop and notebook computers, keyboards, tablets, and smart phones. Output devices include printe...

Auto-Generated Generated during job processing
PE-22 (Component Marking) is relevant to the scoping question because it ensures that managed devices—such as laptops, smartphones, and tablets—are clearly marked to indicate their classification level and the sensitivity of data they handle. This co...
NIST PE-16 Found
Delivery and Removal

Enforcing authorizations for entry and exit of system components may require restricting access to delivery areas and isolating the areas from the system and media libraries.

Auto-Generated Generated during job processing
PE-16 (Delivery and Removal) is relevant to the scoping question because it ensures that only authorized personnel can deliver or remove managed devices, thereby controlling physical access to endpoints that may store sensitive data. This control is ...
NIST AC-21 Found
Information Sharing

Information sharing applies to information that may be restricted in some manner based on some formal or administrative determination. Examples of such information include, contract-sensitive informat...

Auto-Generated Generated during job processing
AC-21 (Information Sharing) is relevant to the scoping question because physical access to managed devices increases the risk of unauthorized sharing or exposure of sensitive information stored on those endpoints. This control ensures that appropriat...
NIST IA-4 Found
Identifier Management

Common device identifiers include Media Access Control (MAC) addresses, Internet Protocol (IP) addresses, or device-unique token identifiers. The management of individual identifiers is not applicable...

Auto-Generated Generated during job processing
1. IA-4 (Identifier Management) addresses the scoping question by ensuring that each managed device with physical access is assigned a unique identifier, such as a MAC address or device token, enabling accurate tracking and accountability of endpoint...
NIST AC-11 Found
Device Lock

Device locks are temporary actions taken to prevent logical access to organizational systems when users stop work and move away from the immediate vicinity of those systems but do not want to log out ...

Auto-Generated Generated during job processing
AC-11 (Device Lock) is relevant to the scoping question because it mitigates risks associated with personnel having physical access to managed devices, such as laptops and smartphones. This control ensures that unattended devices are automatically lo...
NIST AC-14 Found
Permitted Actions Without Identification or Authentication

Specific user actions may be permitted without identification or authentication if organizations determine that identification and authentication are not required for the specified user actions. Organ...

Auto-Generated Generated during job processing
AC-14 is relevant to the scoping question because it governs which actions can be performed on managed devices without user identification or authentication, directly impacting the risks associated with physical access. This control is important for ...
NIST SC-37 Found
Out-of-band Channels

Out-of-band channels include local, non-network accesses to systems; network paths physically separate from network paths used for operational traffic; or non-electronic paths, such as the U.S. Postal...

Auto-Generated Generated during job processing
1. SC-37 (Out-of-band Channels) addresses the scoping question by ensuring that sensitive operations—such as device configuration changes, credential delivery, or security updates—are performed through secure, physically or logically separate channel...
NIST CM-13 Found
Data Action Mapping

Data actions are system operations that process personally identifiable information. The processing of such information encompasses the full information life cycle, which includes collection, generati...

Auto-Generated Generated during job processing
CM-13 (Data Action Mapping) is relevant to the scoping question because it requires organizations to identify and document all system operations involving personally identifiable information (PII) on managed devices. This control is important for com...
NIST AC-20 Found
Use of External Systems

External systems are systems that are used by but not part of organizational systems, and for which the organization has no direct control over the implementation of required controls or the assessmen...

Auto-Generated Generated during job processing
1. AC-20 (Use of External Systems) addresses the scoping question by determining whether personnel are permitted to access organizational devices or data using external, non-corporate systems, such as personally owned laptops or smartphones. 2. Thi...
NIST AC-17 Found
Remote Access

Remote access is access to organizational systems (or processes acting on behalf of users) that communicate through external networks such as the Internet. Types of remote access include dial-up, broa...

Auto-Generated Generated during job processing
AC-17 (Remote Access) is relevant to the scoping question because it governs how personnel can access managed devices when they are not physically present, ensuring that remote connections are secure and authorized. This control is important for comp...
NIST AC-1 Found
Policy and Procedures

Access control policy and procedures address the controls in the AC family that are implemented within systems and organizations. The risk management strategy is an important factor in establishing su...

Auto-Generated Generated during job processing
Control AC-1 (Policy and Procedures) is relevant to the scoping question because it requires the organization to formally define and document how access to managed devices is governed, including who can physically access endpoints and under what cond...
NIST AC-22 Found
Publicly Accessible Content

In accordance with applicable laws, executive orders, directives, policies, regulations, standards, and guidelines, the public is not authorized to have access to nonpublic information, including info...

Auto-Generated Generated during job processing
AC-22 (Publicly Accessible Content) is relevant to the scoping question because personnel with physical access to managed devices could inadvertently or intentionally post nonpublic or sensitive information to publicly accessible systems. This contro...
NIST SC-34
Non-modifiable Executable Programs

The operating environment for a system contains the code that hosts applications, including operating systems, executives, or virtual machine monitors (i.e., hypervisors). It can also include certain ...

Auto-Generated Generated during job processing
Control SC-34 (Non-modifiable Executable Programs) is relevant to the scoping question because it ensures that the software environment on managed devices cannot be altered by personnel with physical access. This control is important for compliance a...
NIST SC-4 Found
Information in Shared System Resources

Preventing unauthorized and unintended information transfer via shared system resources stops information produced by the actions of prior users or roles (or the actions of processes acting on behalf ...

Auto-Generated Generated during job processing
SC-4 (Information in Shared System Resources) is relevant to the scoping question because it ensures that sensitive information is not inadvertently exposed to unauthorized users when managed devices are shared or reused by different personnel. This ...
NIST SC-43 Found
Usage Restrictions

Usage restrictions apply to all system components including but not limited to mobile code, mobile devices, wireless access, and wired and wireless peripheral components (e.g., copiers, printers, scan...

Auto-Generated Generated during job processing
Control SC-43 (Usage Restrictions) is directly relevant to the scoping question because it establishes rules for how managed devices—such as laptops, smartphones, and tablets—can be used by personnel with physical access. This control is important fo...
NIST SI-8 Found
Spam Protection

System entry and exit points include firewalls, remote-access servers, electronic mail servers, web servers, proxy servers, workstations, notebook computers, and mobile devices. Spam can be transporte...

Auto-Generated Generated during job processing
1. SI-8 (Spam Protection) is relevant to the scoping question because managed devices with physical access are potential entry points for spam, which can introduce malware or facilitate data leakage. 2. Implementing spam protection is important for c...
NIST PM-25 Found
Minimization of Personally Identifiable Information Used in Testing, Training, and Research

The use of personally identifiable information in testing, research, and training increases the risk of unauthorized disclosure or misuse of such information. Organizations consult with the senior age...

Auto-Generated Generated during job processing
PM-25 is relevant to the scoping question because physical access to managed devices increases the risk that personally identifiable information (PII) stored on endpoints could be exposed during testing, training, or research activities. This control...
NIST MP-4 Found
Media Storage

System media includes digital and non-digital media. Digital media includes flash drives, diskettes, magnetic tapes, external or removable hard disk drives (e.g., solid state, magnetic), compact discs...

Auto-Generated Generated during job processing
MP-4 (Media Storage) is relevant to the scoping question because it ensures that any physical access to managed devices and their associated media is strictly controlled, inventoried, and securely stored. This control is important for compliance as i...
NIST SC-16 Found
Transmission of Security and Privacy Attributes

Security and privacy attributes can be explicitly or implicitly associated with the information contained in organizational systems or system components. Attributes are abstractions that represent the...

Auto-Generated Generated during job processing
SC-16 is relevant to the scoping question because it ensures that security and privacy attributes are consistently transmitted and enforced on managed devices that personnel physically access. This control is important for compliance as it helps main...
NIST CM-12 Found
Information Location

Information location addresses the need to understand where information is being processed and stored. Information location includes identifying where specific information types and information reside...

Auto-Generated Generated during job processing
1. **How this control addresses the scoping question:** CM-12 (Information Location) ensures the organization knows where sensitive information is stored and processed, including on managed devices to which personnel have physical access. 2. **Why...
Scoping Question 3

Does the entity use proprietary or third-party technology that must be licensed separately? Flags dependencies on paid tools, platforms, or IP that add cost or complicate your management landscape. Creates unexpected cost, version-mismatch risk, and additional vendor-management overhead. License-management tracking and renewal reminders Proof-of-license audits Evaluation of alternative open-source options

16 Controls
CIS 2.1 Found
Establish and Maintain a Software Inventory

Establish and maintain a detailed inventory of all licensed software installed on enterprise assets. The software inventory must document the title, publisher, initial install/use date, and business p...

Auto-Generated Generated during job processing
Control 2.1 is directly relevant to the scoping question because maintaining a detailed software inventory enables the organization to identify all proprietary and third-party technologies in use, including those requiring separate licenses. This con...
CIS 2.2 Found
Ensure Authorized Software is Currently Supported

Ensure that only currently supported software is designated as authorized in the software inventory for enterprise assets. If software is unsupported, yet necessary for the fulfillment of the enterpri...

Auto-Generated Generated during job processing
Control 2.2 is directly relevant to the scoping question because it requires organizations to maintain an inventory of authorized, currently supported software, including proprietary or third-party technologies that may require separate licensing. Th...
NIST AU-16 Found
Cross-organizational Audit Logging

When organizations use systems or services of external organizations, the audit logging capability necessitates a coordinated, cross-organization approach. For example, maintaining the identity of ind...

Auto-Generated Generated during job processing
1. AU-16 is relevant to the scoping question because using proprietary or third-party technology often involves cross-organizational interactions, requiring coordinated audit logging to track user activity and access across different systems. 2. This...
NIST SR-8 Found
Notification Agreements

The establishment of agreements and procedures facilitates communications among supply chain entities. Early notification of compromises and potential compromises in the supply chain that can potentia...

Auto-Generated Generated during job processing
Control SR-8 (Notification Agreements) is relevant to the scoping question because it ensures that entities using proprietary or third-party technology have formalized procedures for timely communication with vendors regarding licensing issues, compr...
NIST SR-6 Found
Supplier Assessments and Reviews

An assessment and review of supplier risk includes security and supply chain risk management processes, foreign ownership, control or influence (FOCI), and the ability of the supplier to effectively a...

Auto-Generated Generated during job processing
Control SR-6 (Supplier Assessments and Reviews) is directly relevant to the scoping question because it ensures that any proprietary or third-party technology used—especially those requiring separate licensing—is subject to thorough risk assessment, ...
NIST SA-9 Found
External System Services

External system services are provided by an external provider, and the organization has no direct control over the implementation of the required controls or the assessment of control effectiveness. O...

Auto-Generated Generated during job processing
Control SA-9 (External System Services) is directly relevant to the scoping question because it requires organizations to formally manage and document relationships with external technology providers, including those involving licensed proprietary or...
NIST CM-10 Found
Software Usage Restrictions

Software license tracking can be accomplished by manual or automated methods, depending on organizational needs. Examples of contract agreements include software license agreements and non-disclosure ...

Auto-Generated Generated during job processing
Control CM-10 (Software Usage Restrictions) directly addresses the scoping question by requiring organizations to track and manage software licenses, ensuring that all proprietary or third-party technologies are properly licensed and compliant with c...
NIST PS-7 Found
External Personnel Security

External provider refers to organizations other than the organization operating or acquiring the system. External providers include service bureaus, contractors, and other organizations that provide s...

Auto-Generated Generated during job processing
1. **How this control addresses the scoping question:** PS-7 is relevant because using proprietary or third-party technology often involves engaging external providers whose personnel may have access to sensitive systems or data. 2. **Why this con...
NIST SC-50 Found
Software-enforced Separation and Policy Enforcement

System owners may require additional strength of mechanism to ensure domain separation and policy enforcement for specific types of threats and environments of operation.

Auto-Generated Generated during job processing
1. SC-50 (Software-enforced Separation and Policy Enforcement) is relevant to the scoping question because proprietary or third-party technologies often require strict separation and policy enforcement to prevent unauthorized access, misuse, or licen...
NIST SA-22 Found
Unsupported System Components

Support for system components includes software patches, firmware updates, replacement parts, and maintenance contracts. An example of unsupported components includes when vendors no longer provide cr...

Auto-Generated Generated during job processing
Control SA-22 is relevant to the scoping question because it requires organizations to identify and manage unsupported system components, which often arise from the use of proprietary or third-party technologies that require separate licensing. This ...
NIST SR-4
Provenance

Every system and system component has a point of origin and may be changed throughout its existence. Provenance is the chronology of the origin, development, ownership, location, and changes to a syst...

Auto-Generated Generated during job processing
Control SR-4 (Provenance) is directly relevant to the scoping question because it requires organizations to document and track the origin, ownership, and changes of all system components, including proprietary or third-party technologies that may req...
NIST CM-8 Found
System Component Inventory

System components are discrete, identifiable information technology assets that include hardware, software, and firmware. Organizations may choose to implement centralized system component inventories...

Auto-Generated Generated during job processing
Control CM-8 (System Component Inventory) directly addresses the scoping question by requiring organizations to maintain a comprehensive inventory of all IT assets, including detailed software license information. This control is important for compli...
NIST SA-20 Found
Customized Development of Critical Components

Organizations determine that certain system components likely cannot be trusted due to specific threats to and vulnerabilities in those components for which there are no viable security controls to ad...

Auto-Generated Generated during job processing
1. **How this control addresses the scoping question:** SA-20 is relevant because it requires organizations to assess the trustworthiness of proprietary or third-party technologies, which are often subject to separate licensing and may introduce un...
NIST AC-20 Found
Use of External Systems

External systems are systems that are used by but not part of organizational systems, and for which the organization has no direct control over the implementation of required controls or the assessmen...

Auto-Generated Generated during job processing
1. **How this control addresses the scoping question:** AC-20 (Use of External Systems) directly addresses the scoping question by requiring organizations to identify, manage, and set terms for the use of external or third-party technologies, inclu...
NIST SR-5 Found
Acquisition Strategies, Tools, and Methods

The use of the acquisition process provides an important vehicle to protect the supply chain. There are many useful tools and techniques available, including obscuring the end use of a system or syste...

Auto-Generated Generated during job processing
Control SR-5 is relevant to the scoping question because it ensures that the acquisition of proprietary or third-party technology is managed through secure and compliant processes, addressing risks associated with licensing, vendor management, and su...
NIST CM-11 Found
User-installed Software

If provided the necessary privileges, users can install software in organizational systems. To maintain control over the software installed, organizations identify permitted and prohibited actions reg...

Auto-Generated Generated during job processing
CM-11 (User-installed Software) is directly relevant to the scoping question because it governs what software users are allowed to install, helping the organization track and control the use of proprietary or third-party technology that may require s...
Scoping Question 4

Will the service integrate directly with core business processes or systems? Identifies if the entity’s outputs plug into mission-critical workflows (order processing, billing, manufacturing, etc.). A faulty integration can cascade failures into critical operations, causing downtime, data corruption, or billing errors. Formal change-management process Pre-/post-integration validation testing Role-based access controls on integrated interfaces

33 Controls
CIS 3.1 Found
Establish and Maintain a Data Management Process

Establish and maintain a documented data management process. In the process, address data sensitivity, data owner, handling of data, data retention limits, and disposal requirements, based on sensitiv...

Auto-Generated Generated during job processing
1. This control ensures that data flowing through integrations with core business processes is properly managed, classified, and handled according to organizational standards. 2. It is important for compliance because it enforces consistent data go...
CIS 4.1 Found
Establish and Maintain a Secure Configuration Process

Establish and maintain a documented secure configuration process for enterprise assets (end-user devices, including portable and mobile, non-computing/IoT devices, and servers) and software (operating...

Auto-Generated Generated during job processing
Control 4.1 is relevant to the scoping question because integrating services with core business processes requires that all involved systems and applications are securely configured to prevent vulnerabilities that could disrupt mission-critical workf...
CIS 3.8 Found
Document Data Flows

Document data flows. Data flow documentation includes service provider data flows and should be based on the enterprise’s data management process. Review and update documentation annually, or when sig...

Auto-Generated Generated during job processing
Control 3.8, Document Data Flows, directly addresses the scoping question by ensuring that all integrations with core business processes are clearly mapped and understood, reducing the risk of unintended disruptions or data mishandling. This control ...
NIST SR-8 Found
Notification Agreements

The establishment of agreements and procedures facilitates communications among supply chain entities. Early notification of compromises and potential compromises in the supply chain that can potentia...

Auto-Generated Generated during job processing
1. **How this control addresses the scoping question:** SR-8 (Notification Agreements) ensures that if the service integrates directly with core business processes or systems, there are established procedures for timely communication of supply chai...
NIST SA-9 Found
External System Services

External system services are provided by an external provider, and the organization has no direct control over the implementation of the required controls or the assessment of control effectiveness. O...

Auto-Generated Generated during job processing
1. **How this control addresses the scoping question:** SA-9 (External System Services) is directly relevant because it ensures that when a service integrates with core business processes or systems—especially through external providers—the organiz...
NIST CA-6 Found
Authorization

Authorizations are official management decisions by senior officials to authorize operation of systems, authorize the use of common controls for inheritance by organizational systems, and explicitly a...

Auto-Generated Generated during job processing
Control CA-6 (Authorization) is directly relevant to the scoping question because it ensures that senior management formally approves the integration of services with core business processes, explicitly accepting and managing associated risks. This c...
NIST PM-10 Found
Authorization Process

Authorization processes for organizational systems and environments of operation require the implementation of an organization-wide risk management process and associated security and privacy standard...

Auto-Generated Generated during job processing
1. PM-10 ensures that any integration with core business processes or systems undergoes a formal authorization process, incorporating risk management and continuous monitoring to assess and mitigate potential impacts on mission-critical workflows. 2....
NIST SA-23 Found
Specialization

It is often necessary for a system or system component that supports mission-essential services or functions to be enhanced to maximize the trustworthiness of the resource. Sometimes this enhancement ...

Auto-Generated Generated during job processing
1. **How this control addresses the scoping question:** Control SA-23 (Specialization) ensures that systems integrating directly with core business processes are enhanced to maximize their trustworthiness, which is critical when these integrations ...
NIST PS-7 Found
External Personnel Security

External provider refers to organizations other than the organization operating or acquiring the system. External providers include service bureaus, contractors, and other organizations that provide s...

Auto-Generated Generated during job processing
1. PS-7 (External Personnel Security) addresses the scoping question by ensuring that external personnel involved in integrating with core business processes or systems are subject to appropriate security requirements and oversight. 2. This control i...
NIST CA-9 Found
Internal System Connections

Internal system connections are connections between organizational systems and separate constituent system components (i.e., connections between components that are part of the same system) including ...

Auto-Generated Generated during job processing
Control CA-9 (Internal System Connections) is directly relevant to the scoping question because it ensures that all internal connections between systems—especially those integrating with core business processes—are properly authorized, managed, and p...
NIST MA-6
Timely Maintenance

Organizations specify the system components that result in increased risk to organizational operations and assets, individuals, other organizations, or the Nation when the functionality provided by th...

Auto-Generated Generated during job processing
1. MA-6 (Timely Maintenance) addresses the scoping question by ensuring that integrated components supporting core business processes are maintained and operational, reducing the risk of failures that could disrupt mission-critical workflows. 2. This...
NIST AC-5 Found
Separation of Duties

Separation of duties addresses the potential for abuse of authorized privileges and helps to reduce the risk of malevolent activity without collusion. Separation of duties includes dividing mission or...

Auto-Generated Generated during job processing
The AC-5 Separation of Duties control is directly relevant to the scoping question because integrating a service with core business processes increases the risk that a single individual could misuse privileged access, potentially causing widespread o...
NIST CP-8 Found
Telecommunications Services

Telecommunications services (for data and voice) for primary and alternate processing and storage sites are in scope for CP-8. Alternate telecommunications services reflect the continuity requirements...

Auto-Generated Generated during job processing
1. **How this control addresses the scoping question:** CP-8 ensures that telecommunications services supporting both primary and alternate processing sites are resilient and aligned with business continuity requirements, which is critical when a s...
NIST SI-22 Found
Information Diversity

Actions taken by a system service or a function are often driven by the information it receives. Corruption, fabrication, modification, or deletion of that information could impact the ability of the ...

Auto-Generated Generated during job processing
1. SI-22 (Information Diversity) is relevant to the scoping question because integrating a service with core business processes increases the risk that corrupted or unavailable data from a single source could disrupt mission-critical workflows. 2. Th...
NIST CM-3 Found
Configuration Change Control

Configuration change control for organizational systems involves the systematic proposal, justification, implementation, testing, review, and disposition of system changes, including system upgrades a...

Auto-Generated Generated during job processing
1. CM-3 Configuration Change Control directly addresses the scoping question by ensuring that any integration with core business processes or systems is systematically managed, reviewed, and validated before implementation. 2. This control is impor...
NIST CP-7 Found
Alternate Processing Site

Alternate processing sites are geographically distinct from primary processing sites and provide processing capability if the primary processing site is not available. The alternate processing capabil...

Auto-Generated Generated during job processing
1. **How this control addresses the scoping question:** CP-7 (Alternate Processing Site) is relevant because if the service integrates directly with core business processes or systems, any disruption to the primary processing site could critically ...
NIST SA-22 Found
Unsupported System Components

Support for system components includes software patches, firmware updates, replacement parts, and maintenance contracts. An example of unsupported components includes when vendors no longer provide cr...

Auto-Generated Generated during job processing
1. Control SA-22 ensures that all system components integrated with core business processes are actively supported, reducing the risk of vulnerabilities from outdated or unsupported software and hardware. 2. This control is important for compliance b...
NIST MA-2 Found
Controlled Maintenance

Controlling system maintenance addresses the information security aspects of the system maintenance program and applies to all types of maintenance to system components conducted by local or nonlocal ...

Auto-Generated Generated during job processing
1. **How this control addresses the scoping question:** MA-2 (Controlled Maintenance) ensures that all maintenance activities on systems integrated with core business processes are properly documented, authorized, and monitored, reducing the risk o...
NIST IA-9 Found
Service Identification and Authentication

Services that may require identification and authentication include web applications using digital certificates or services or applications that query a database. Identification and authentication met...

Auto-Generated Generated during job processing
1. This control ensures that any service integrating directly with core business processes or systems is properly identified and authenticated before access is granted, reducing the risk of unauthorized or malicious integrations. 2. It is important f...
NIST SR-4
Provenance

Every system and system component has a point of origin and may be changed throughout its existence. Provenance is the chronology of the origin, development, ownership, location, and changes to a syst...

Auto-Generated Generated during job processing
1. The Provenance control (SR-4) ensures that all system components integrated with core business processes have a documented and traceable history, including origin, changes, and ownership, which directly addresses the scoping question about integra...
NIST RA-9 Found
Criticality Analysis

Not all system components, functions, or services necessarily require significant protections. For example, criticality analysis is a key tenet of supply chain risk management and informs the prioriti...

Auto-Generated Generated during job processing
1. **How this control addresses the scoping question:** RA-9 (Criticality Analysis) directly addresses whether the service integrates with core business processes by systematically identifying which system components and integrations are mission-cr...
NIST PL-9 Found
Central Management

Central management refers to organization-wide management and implementation of selected controls and processes. This includes planning, implementing, assessing, authorizing, and monitoring the organi...

Auto-Generated Generated during job processing
1. **How this control addresses the scoping question:** PL-9 (Central Management) ensures that controls and processes related to integrations with core business systems are consistently planned, implemented, and monitored across the organization, r...
NIST SI-17
Fail-safe Procedures

Failure conditions include the loss of communications among critical system components or between system components and operational facilities. Fail-safe procedures include alerting operator personnel...

Auto-Generated Generated during job processing
1. SI-17 (Fail-safe Procedures) is relevant to the scoping question because it ensures that, if the service integration with core business processes fails, there are predefined procedures to minimize operational disruption and prevent cascading failu...
NIST PM-32 Found
Purposing

Systems are designed to support a specific mission or business function. However, over time, systems and system components may be used to support services and functions that are outside of the scope o...

Auto-Generated Generated during job processing
Control PM-32 (Purposing) is relevant to the scoping question because it ensures that systems integrated with core business processes are only used for their intended mission or business function. This control is important for compliance as it helps ...
NIST SI-2 Found
Flaw Remediation

The need to remediate system flaws applies to all types of software and firmware. Organizations identify systems affected by software flaws, including potential vulnerabilities resulting from those fl...

Auto-Generated Generated during job processing
1. **How this control addresses the scoping question:** SI-2 (Flaw Remediation) is relevant because when a service integrates directly with core business processes or systems, any unaddressed software flaws or vulnerabilities in the integrated comp...
NIST MA-3
Maintenance Tools

Approving, controlling, monitoring, and reviewing maintenance tools address security-related issues associated with maintenance tools that are not within system authorization boundaries and are used s...

Auto-Generated Generated during job processing
1. MA-3 (Maintenance Tools) is relevant to the scoping question because when a service integrates directly with core business processes or systems, any maintenance tools used during integration or ongoing support can introduce security risks if not p...
NIST SA-1 Found
Policy and Procedures

System and services acquisition policy and procedures address the controls in the SA family that are implemented within systems and organizations. The risk management strategy is an important factor i...

Auto-Generated Generated during job processing
Control SA-1 (Policy and Procedures) is directly relevant to the scoping question because it ensures that formalized policies and procedures govern the acquisition and integration of services with core business systems. This control is important for ...
NIST SA-10 Found
Developer Configuration Management

Organizations consider the quality and completeness of configuration management activities conducted by developers as direct evidence of applying effective security controls. Controls include protecti...

Auto-Generated Generated during job processing
1. **How this control addresses the scoping question:** SA-10 (Developer Configuration Management) ensures that any integration with core business processes or systems is performed using rigorously managed and authorized system components, reducing...
NIST IR-8 Found
Incident Response Plan

It is important that organizations develop and implement a coordinated approach to incident response. Organizational mission and business functions determine the structure of incident response capabil...

Auto-Generated Generated during job processing
1. The Incident Response Plan (IR-8) is relevant to the scoping question because direct integration with core business processes increases the risk that incidents—such as data breaches or system failures—could significantly disrupt mission-critical o...
NIST CM-9 Found
Configuration Management Plan

Configuration management activities occur throughout the system development life cycle. As such, there are developmental configuration management activities (e.g., the control of code and software lib...

Auto-Generated Generated during job processing
1. The Configuration Management Plan (CM-9) ensures that any integration with core business processes or systems is systematically managed, documented, and controlled throughout the system development life cycle. 2. This control is important for co...
NIST CP-13 Found
Alternative Security Mechanisms

Use of alternative security mechanisms supports system resiliency, contingency planning, and continuity of operations. To ensure mission and business continuity, organizations can implement alternativ...

Auto-Generated Generated during job processing
1. Control CP-13 (Alternative Security Mechanisms) addresses the scoping question by ensuring that if the service integrates with core business processes or systems, there are backup security measures in place to maintain operations in the event prim...
NIST PL-7
Concept of Operations

The CONOPS may be included in the security or privacy plans for the system or in other system development life cycle documents. The CONOPS is a living document that requires updating throughout the sy...

Auto-Generated Generated during job processing
1. PL-7 (Concept of Operations) addresses the scoping question by ensuring that the integration of the service with core business processes is clearly defined, documented, and kept up to date throughout the system’s life cycle. 2. This control is imp...
NIST CP-12
Safe Mode

For systems that support critical mission and business functions—including military operations, civilian space operations, nuclear power plant operations, and air traffic control operations (esp...

Auto-Generated Generated during job processing
1. Control CP-12 (Safe Mode) is relevant to the scoping question because it ensures that systems integrated with core business processes can automatically revert to a predefined safe operational state during critical failures, minimizing the risk of ...
Scoping Question 5

Will the entity’s services be subject to periodic audits by us or third parties? Identifies whether you must audit their performance, controls, or compliance on a recurring basis. Audit preparation consumes internal resources; findings may require remediation and renegotiation of contract terms. Audit schedule and scoping document Right-to-audit clauses in contract Remediation-tracking and closure reporting

29 Controls
CIS 3.1 Found
Establish and Maintain a Data Management Process

Establish and maintain a documented data management process. In the process, address data sensitivity, data owner, handling of data, data retention limits, and disposal requirements, based on sensitiv...

Auto-Generated Generated during job processing
1. This control ensures that the entity has a documented and regularly updated data management process, which is essential for demonstrating compliance during periodic audits by your organization or third parties. 2. Maintaining clear data manageme...
NIST AU-6 Found
Audit Record Review, Analysis, and Reporting

Audit record review, analysis, and reporting covers information security- and privacy-related logging performed by organizations, including logging that results from the monitoring of account usage, r...

Auto-Generated Generated during job processing
Control AU-6 is directly relevant to the scoping question because it ensures that the entity systematically reviews, analyzes, and reports on audit records, which is essential for supporting periodic audits by your organization or third parties. This...
NIST PE-3 Found
Physical Access Control

Physical access control applies to employees and visitors. Individuals with permanent physical access authorizations are not considered visitors. Physical access controls for publicly accessible areas...

Auto-Generated Generated during job processing
1. PE-3 (Physical Access Control) addresses the scoping question by ensuring that physical access to sensitive areas is controlled, monitored, and logged, which is essential for supporting periodic audits by your organization or third parties. 2. Thi...
NIST AU-16 Found
Cross-organizational Audit Logging

When organizations use systems or services of external organizations, the audit logging capability necessitates a coordinated, cross-organization approach. For example, maintaining the identity of ind...

Auto-Generated Generated during job processing
AU-16 (Cross-organizational Audit Logging) is directly relevant to the scoping question because it ensures that audit logs are coordinated and maintained across both the entity and any external service providers, supporting effective periodic audits....
NIST SR-8 Found
Notification Agreements

The establishment of agreements and procedures facilitates communications among supply chain entities. Early notification of compromises and potential compromises in the supply chain that can potentia...

Auto-Generated Generated during job processing
SR-8 (Notification Agreements) is relevant to the scoping question because it ensures that supply chain entities have established procedures to promptly communicate audit findings, compromises, or potential issues to your organization. This control i...
NIST AU-5 Found
Response to Audit Logging Process Failures

Audit logging process failures include software and hardware errors, failures in audit log capturing mechanisms, and reaching or exceeding audit log storage capacity. Organization-defined actions incl...

Auto-Generated Generated during job processing
1. AU-5 ensures that audit logging failures are detected and appropriately managed, directly supporting the requirement for periodic audits by maintaining the integrity and availability of audit records. 2. This control is important for compliance be...
NIST SR-6 Found
Supplier Assessments and Reviews

An assessment and review of supplier risk includes security and supply chain risk management processes, foreign ownership, control or influence (FOCI), and the ability of the supplier to effectively a...

Auto-Generated Generated during job processing
Control SR-6 is directly relevant to the scoping question because it establishes the requirement for periodic assessments and reviews of suppliers, which may be conducted by your organization or independent third parties. This control is important fo...
NIST SA-9 Found
External System Services

External system services are provided by an external provider, and the organization has no direct control over the implementation of the required controls or the assessment of control effectiveness. O...

Auto-Generated Generated during job processing
Control SA-9 is directly relevant to the scoping question because it requires organizations to formally document and manage relationships with external service providers, including establishing service-level agreements (SLAs) that define audit rights...
NIST AU-11 Found
Audit Record Retention

Organizations retain audit records until it is determined that the records are no longer needed for administrative, legal, audit, or other operational purposes. This includes the retention and availab...

Auto-Generated Generated during job processing
1. **How this control addresses the scoping question:** AU-11 ensures that audit records are retained and available for review during periodic audits conducted by your organization or third parties. 2. **Why this control is important for complianc...
NIST CA-6 Found
Authorization

Authorizations are official management decisions by senior officials to authorize operation of systems, authorize the use of common controls for inheritance by organizational systems, and explicitly a...

Auto-Generated Generated during job processing
1. Control CA-6 (Authorization) addresses the scoping question by ensuring that senior management formally authorizes system operations based on ongoing evidence from continuous monitoring, which aligns with the need for periodic audits and ongoing o...
NIST PE-6 Found
Monitoring Physical Access

Physical access monitoring includes publicly accessible areas within organizational facilities. Examples of physical access monitoring include the employment of guards, video surveillance equipment (i...

Auto-Generated Generated during job processing
1. PE-6 (Monitoring Physical Access) addresses the scoping question by ensuring that physical access to facilities is logged, monitored, and reviewable, which supports the ability to conduct periodic audits of physical security controls. 2. This cont...
NIST AU-1 Found
Policy and Procedures

Audit and accountability policy and procedures address the controls in the AU family that are implemented within systems and organizations. The risk management strategy is an important factor in estab...

Auto-Generated Generated during job processing
AU-1 (Policy and Procedures) is directly relevant to the scoping question because it requires the organization to formally establish and maintain audit and accountability policies and procedures, which are foundational for supporting periodic audits ...
NIST AU-3 Found
Content of Audit Records

Audit record content that may be necessary to support the auditing function includes event descriptions (item a), time stamps (item b), source and destination addresses (item c), user or process ident...

Auto-Generated Generated during job processing
1. This control addresses the scoping question by ensuring that audit records contain sufficient detail—such as event descriptions, timestamps, user identifiers, and outcomes—to support effective periodic audits by your organization or third parties....
NIST AU-9 Found
Protection of Audit Information

Audit information includes all information needed to successfully audit system activity, such as audit records, audit log settings, audit reports, and personally identifiable information. Audit loggin...

Auto-Generated Generated during job processing
AU-9: Protection of Audit Information is directly relevant to the scoping question because it ensures that audit records and related data are securely maintained and accessible only to authorized personnel, supporting the integrity and confidentialit...
NIST CA-7 Found
Continuous Monitoring

Continuous monitoring at the system level facilitates ongoing awareness of the system security and privacy posture to support organizational risk management decisions. The terms continuous and ongoing...

Auto-Generated Generated during job processing
Control CA-7 (Continuous Monitoring) is directly relevant to the scoping question because it ensures that the entity maintains ongoing visibility into its security and privacy posture, which supports and streamlines periodic audits by providing up-to...
NIST PM-21 Found
Accounting of Disclosures

The purpose of accounting of disclosures is to allow individuals to learn to whom their personally identifiable information has been disclosed, to provide a basis for subsequently advising recipients ...

Auto-Generated Generated during job processing
1. Control PM-21 (Accounting of Disclosures) directly supports the scoping question by providing a documented audit trail of all disclosures of personally identifiable information, which is essential for periodic audits by your organization or third ...
NIST AU-4 Found
Audit Log Storage Capacity

Organizations consider the types of audit logging to be performed and the audit log processing requirements when allocating audit log storage capacity. Allocating sufficient audit log storage capacity...

Auto-Generated Generated during job processing
1. This control ensures that sufficient storage is allocated for audit logs, supporting the ability to retain and access records necessary for periodic audits by your organization or third parties. 2. Maintaining adequate audit log storage is critica...
NIST CA-1 Found
Policy and Procedures

Assessment, authorization, and monitoring policy and procedures address the controls in the CA family that are implemented within systems and organizations. The risk management strategy is an importan...

Auto-Generated Generated during job processing
1. **How this control addresses the scoping question:** CA-1 requires the organization to establish and maintain formal policies and procedures for assessment, authorization, and monitoring, which directly support the planning and execution of peri...
NIST AU-14 Found
Session Audit

Session audits can include monitoring keystrokes, tracking websites visited, and recording information and/or file transfers. Session audit capability is implemented in addition to event logging and m...

Auto-Generated Generated during job processing
1. AU-14 (Session Audit) addresses the scoping question by ensuring that detailed records of user sessions—such as keystrokes, website visits, and file transfers—are available for review during periodic audits by your organization or third parties. ...
NIST AU-7 Found
Audit Record Reduction and Report Generation

Audit record reduction is a process that manipulates collected audit log information and organizes it into a summary format that is more meaningful to analysts. Audit record reduction and report gener...

Auto-Generated Generated during job processing
Control AU-7 is directly relevant to the scoping question because it ensures that audit records can be efficiently reduced and organized into meaningful, customizable reports for periodic audits by your organization or third parties. This capability ...
NIST CM-3 Found
Configuration Change Control

Configuration change control for organizational systems involves the systematic proposal, justification, implementation, testing, review, and disposition of system changes, including system upgrades a...

Auto-Generated Generated during job processing
CM-3 (Configuration Change Control) is directly relevant to the scoping question because it ensures that all system changes are systematically documented, reviewed, and auditable, supporting periodic audits by your organization or third parties. This...
NIST MA-2 Found
Controlled Maintenance

Controlling system maintenance addresses the information security aspects of the system maintenance program and applies to all types of maintenance to system components conducted by local or nonlocal ...

Auto-Generated Generated during job processing
1. MA-2 (Controlled Maintenance) is relevant to the scoping question because periodic audits often require evidence that system maintenance is performed securely and properly documented, ensuring ongoing compliance and operational integrity. 2. This ...
NIST SR-4
Provenance

Every system and system component has a point of origin and may be changed throughout its existence. Provenance is the chronology of the origin, development, ownership, location, and changes to a syst...

Auto-Generated Generated during job processing
1. The Provenance control (SR-4) ensures that all changes, ownership, and interactions with systems and components are thoroughly documented and monitored, directly supporting the ability to conduct periodic audits as identified in the scoping questi...
NIST AU-2 Found
Event Logging

An event is an observable occurrence in a system. The types of events that require logging are those events that are significant and relevant to the security of systems and the privacy of individuals....

Auto-Generated Generated during job processing
1. AU-2 (Event Logging) directly supports the scoping question by ensuring that significant system events are recorded, which provides the necessary evidence for periodic audits conducted by your organization or third parties. 2. This control is esse...
NIST SI-2 Found
Flaw Remediation

The need to remediate system flaws applies to all types of software and firmware. Organizations identify systems affected by software flaws, including potential vulnerabilities resulting from those fl...

Auto-Generated Generated during job processing
1. **How this control addresses the scoping question:** SI-2 Flaw Remediation is directly relevant to the scoping question because periodic audits will assess whether the entity effectively identifies, tracks, and remediates system flaws, including...
NIST SA-1 Found
Policy and Procedures

System and services acquisition policy and procedures address the controls in the SA family that are implemented within systems and organizations. The risk management strategy is an important factor i...

Auto-Generated Generated during job processing
Control SA-1 (Policy and Procedures) is directly relevant to the scoping question because it ensures the organization has documented policies and procedures for system and services acquisition, including requirements for periodic audits and audit pre...
NIST SI-1 Found
Policy and Procedures

System and information integrity policy and procedures address the controls in the SI family that are implemented within systems and organizations. The risk management strategy is an important factor ...

Auto-Generated Generated during job processing
1. SI-1 (Policy and Procedures) addresses the scoping question by ensuring the organization has documented, up-to-date policies and procedures for system and information integrity, which are essential for preparing for and responding to periodic audi...
NIST MA-1 Found
Policy and Procedures

Maintenance policy and procedures address the controls in the MA family that are implemented within systems and organizations. The risk management strategy is an important factor in establishing such ...

Auto-Generated Generated during job processing
MA-1 (Policy and Procedures) is directly relevant to the scoping question because it ensures the organization has documented, up-to-date maintenance policies and procedures that can be reviewed during periodic audits. This control is important for co...
NIST PM-27
Privacy Reporting

Through internal and external reporting, organizations promote accountability and transparency in organizational privacy operations. Reporting can also help organizations to determine progress in meet...

Auto-Generated Generated during job processing
PM-27 Privacy Reporting is directly relevant to the scoping question because it ensures that the entity maintains robust internal and external privacy reporting mechanisms, which are essential for supporting periodic audits by your organization or th...
Scoping Question 6

Will the entity host entity, partner, or customer data in their own network environment? Determines if your data will reside on the provider’s infrastructure rather than your controlled systems. Loss of direct control over data storage, potential co-tenant risks, and challenges in meeting data-sovereignty or compliance requirements. Contractual data-hosting SLA and security requirements Data-segregation (logical/physical) and encryption at rest Periodic network and configuration audits Defined backup, retention, and e-discovery procedures

32 Controls
CIS 3.1 Found
Establish and Maintain a Data Management Process

Establish and maintain a documented data management process. In the process, address data sensitivity, data owner, handling of data, data retention limits, and disposal requirements, based on sensitiv...

Auto-Generated Generated during job processing
Control 3.1 is directly relevant to the scoping question because hosting data in a provider’s environment requires a documented data management process to ensure proper handling, retention, and disposal of sensitive information outside the entity’s d...
CIS 1.1 Found
Establish and Maintain Detailed Enterprise Asset Inventory

Establish and maintain an accurate, detailed, and up-to-date inventory of all enterprise assets with the potential to store or process data, to include: end-user devices (including portable and mobile...

Auto-Generated Generated during job processing
1. This control addresses the scoping question by ensuring the organization maintains a comprehensive inventory of all assets that may store or process entity, partner, or customer data, including those hosted within the provider’s network environmen...
CIS 4.1 Found
Establish and Maintain a Secure Configuration Process

Establish and maintain a documented secure configuration process for enterprise assets (end-user devices, including portable and mobile, non-computing/IoT devices, and servers) and software (operating...

Auto-Generated Generated during job processing
1. This control ensures that any systems hosting entity, partner, or customer data—whether in your own environment or a provider’s—are securely configured and regularly reviewed, directly addressing the risk of losing direct control over data storage...
CIS 3.5 Found
Securely Dispose of Data

Securely dispose of data as outlined in the enterprise’s documented data management process. Ensure the disposal process and method are commensurate with the data sensitivity.

Auto-Generated Generated during job processing
Control 3.5, "Securely Dispose of Data," is directly relevant to the scoping question because hosting data in a provider’s environment requires assurance that data is properly destroyed when no longer needed, mitigating risks associated with loss of ...
CIS 3.4 Found
Enforce Data Retention

Retain data according to the enterprise’s documented data management process. Data retention must include both minimum and maximum timelines.

Auto-Generated Generated during job processing
Control 3.4 (Enforce Data Retention) is directly relevant to the scoping question because hosting data in a provider’s environment requires assurance that data is retained and disposed of according to your organization’s documented policies, even whe...
CIS 4.6 Found
Securely Manage Enterprise Assets and Software

Securely manage enterprise assets and software. Example implementations include managing configuration through version-controlled Infrastructure-as-Code (IaC) and accessing administrative interfaces o...

Auto-Generated Generated during job processing
Control 4.6 is relevant to the scoping question because securely managing enterprise assets and software ensures that any data hosted in the provider’s network environment is protected from unauthorized access and misconfiguration. This control is im...
CIS 3.2 Found
Establish and Maintain a Data Inventory

Establish and maintain a data inventory based on the enterprise’s data management process. Inventory sensitive data annually, at a minimum. Review and update inventory annually, at a minimum, with a p...

Auto-Generated Generated during job processing
Control 3.2 (Establish and Maintain a Data Inventory) is directly relevant to the scoping question because it ensures the organization knows what data is being hosted, where it resides, and who is responsible for it—critical when data is stored on a ...
CIS 3.11 Found
Encrypt Sensitive Data at Rest

Encrypt sensitive data at rest on servers, applications, and databases. Storage-layer encryption, also known as server-side encryption, meets the minimum requirement of this Safeguard. Additional encr...

Auto-Generated Generated during job processing
Control 3.11, "Encrypt Sensitive Data at Rest," directly addresses the scoping question by ensuring that sensitive data hosted in a provider’s network environment remains protected, even when stored outside the entity’s direct control. This control i...
CIS 4.2 Found
Establish and Maintain a Secure Configuration Process for Network Infrastructure

Establish and maintain a documented secure configuration process for network devices. Review and update documentation annually, or when significant enterprise changes occur that could impact this Safe...

Auto-Generated Generated during job processing
1. This control ensures that network infrastructure hosting entity, partner, or customer data is securely configured and regularly reviewed, directly addressing the risk of hosting sensitive data outside your own controlled systems. 2. It is importan...
CIS 3.13 Found
Deploy a Data Loss Prevention Solution

Implement an automated tool, such as a host-based Data Loss Prevention (DLP) tool to identify all sensitive data stored, processed, or transmitted through enterprise assets, including those located on...

Auto-Generated Generated during job processing
Deploying a Data Loss Prevention (DLP) solution (Control ID: 3.13) is directly relevant to the scoping question because it enables the entity to monitor and protect sensitive data regardless of whether it is hosted on the provider’s infrastructure or...
NIST SA-9 Found
External System Services

External system services are provided by an external provider, and the organization has no direct control over the implementation of the required controls or the assessment of control effectiveness. O...

Auto-Generated Generated during job processing
Control SA-9 (External System Services) directly addresses the scoping question by requiring organizations to formally manage and document the risks associated with hosting data on external provider infrastructure, where direct control over security ...
NIST CP-9 Found
System Backup

System-level information includes system state information, operating system software, middleware, application software, and licenses. User-level information includes information other than system-lev...

Auto-Generated Generated during job processing
Control CP-9 (System Backup) is directly relevant to the scoping question because it ensures that entity, partner, or customer data hosted in the provider’s network environment is regularly backed up and protected against loss or corruption. This con...
NIST PT-2 Found
Authority to Process Personally Identifiable Information

The processing of personally identifiable information is an operation or set of operations that the information system or organization performs with respect to personally identifiable information acro...

Auto-Generated Generated during job processing
Control PT-2 is directly relevant to the scoping question because hosting entity, partner, or customer data in the provider’s network environment requires clear authority to process personally identifiable information (PII) under applicable laws and ...
NIST SC-28 Found
Protection of Information at Rest

Information at rest refers to the state of information when it is not in process or in transit and is located on system components. Such components include internal or external hard disk drives, stora...

Auto-Generated Generated during job processing
SC-28 (Protection of Information at Rest) is directly relevant to the scoping question because, when an entity hosts data in its own network environment or on behalf of partners/customers, it assumes responsibility for safeguarding that data while st...
NIST PM-23 Found
Data Governance Body

A Data Governance Body can help ensure that the organization has coherent policies and the ability to balance the utility of data with security and privacy requirements. The Data Governance Body estab...

Auto-Generated Generated during job processing
1. The PM-23 Data Governance Body control addresses the scoping question by ensuring that organizational policies and oversight are in place to manage data hosted in external environments, including partner or provider networks. 2. This control is im...
NIST CA-3 Found
Information Exchange

System information exchange requirements apply to information exchanges between two or more systems. System information exchanges include connections via leased lines or virtual private networks, conn...

Auto-Generated Generated during job processing
1. **How this control addresses the scoping question:** CA-3 (Information Exchange) is directly relevant because hosting entity, partner, or customer data in your own network environment inherently involves exchanging information between your syste...
NIST PT-7 Found
Specific Categories of Personally Identifiable Information

Organizations apply any conditions or protections that may be necessary for specific categories of personally identifiable information. These conditions may be required by laws, executive orders, dire...

Auto-Generated Generated during job processing
Control PT-7 is relevant to the scoping question because when an entity hosts partner or customer data in its own network environment, it assumes responsibility for applying appropriate protections to specific categories of personally identifiable in...
NIST CP-8 Found
Telecommunications Services

Telecommunications services (for data and voice) for primary and alternate processing and storage sites are in scope for CP-8. Alternate telecommunications services reflect the continuity requirements...

Auto-Generated Generated during job processing
1. **How this control addresses the scoping question:** CP-8 ensures that telecommunications services supporting data hosting—whether in the entity’s own network or a provider’s infrastructure—are resilient and available, directly impacting where a...
NIST CP-6 Found
Alternate Storage Site

Alternate storage sites are geographically distinct from primary storage sites and maintain duplicate copies of information and data if the primary storage site is not available. Similarly, alternate ...

Auto-Generated Generated during job processing
1. **How this control addresses the scoping question:** CP-6 (Alternate Storage Site) is relevant because, when an entity hosts data in its own network environment or on behalf of customers/partners, it must ensure data availability and resilience ...
NIST AC-4 Found
Information Flow Enforcement

Information flow control regulates where information can travel within a system and between systems (in contrast to who is allowed to access the information) and without regard to subsequent accesses ...

Auto-Generated Generated during job processing
**Justification:** 1. AC-4 (Information Flow Enforcement) is directly relevant to the scoping question because it ensures that when entity, partner, or customer data is hosted in the provider’s network environment, the movement of data within and be...
NIST IA-9 Found
Service Identification and Authentication

Services that may require identification and authentication include web applications using digital certificates or services or applications that query a database. Identification and authentication met...

Auto-Generated Generated during job processing
1. **How this control addresses the scoping question:** IA-9 ensures that all services and applications accessing or hosting entity, partner, or customer data in the provider’s network environment are properly identified and authenticated, reducing...
NIST CM-8 Found
System Component Inventory

System components are discrete, identifiable information technology assets that include hardware, software, and firmware. Organizations may choose to implement centralized system component inventories...

Auto-Generated Generated during job processing
CM-8 (System Component Inventory) is relevant to the scoping question because maintaining a comprehensive inventory of all system components ensures the organization can accurately identify where entity, partner, or customer data is stored within its...
NIST AC-21 Found
Information Sharing

Information sharing applies to information that may be restricted in some manner based on some formal or administrative determination. Examples of such information include, contract-sensitive informat...

Auto-Generated Generated during job processing
AC-21 (Information Sharing) is relevant to the scoping question because hosting entity, partner, or customer data in a provider’s environment introduces the need to control and monitor how sensitive information is shared and accessed across organizat...
NIST SC-20 Found
Secure Name/Address Resolution Service (Authoritative Source)

Providing authoritative source information enables external clients, including remote Internet clients, to obtain origin authentication and integrity verification assurances for the host/service name ...

Auto-Generated Generated during job processing
1. SC-20 is relevant to the scoping question because hosting data in the provider’s network requires secure and trustworthy name/address resolution to ensure clients can reliably locate and access data and services. 2. This control is important for c...
NIST SC-37 Found
Out-of-band Channels

Out-of-band channels include local, non-network accesses to systems; network paths physically separate from network paths used for operational traffic; or non-electronic paths, such as the U.S. Postal...

Auto-Generated Generated during job processing
**Justification:** 1. SC-37 (Out-of-band Channels) addresses the scoping question by ensuring that critical data transmissions—such as backups, credentials, and configuration changes—can be securely managed even when data is hosted on a provider’s i...
NIST CM-13 Found
Data Action Mapping

Data actions are system operations that process personally identifiable information. The processing of such information encompasses the full information life cycle, which includes collection, generati...

Auto-Generated Generated during job processing
1. **How this control addresses the scoping question:** CM-13 (Data Action Mapping) directly addresses the scoping question by requiring a detailed understanding of where and how personally identifiable information (PII) is processed, including whe...
NIST AC-17 Found
Remote Access

Remote access is access to organizational systems (or processes acting on behalf of users) that communicate through external networks such as the Internet. Types of remote access include dial-up, broa...

Auto-Generated Generated during job processing
1. AC-17 (Remote Access) is relevant to the scoping question because, when an entity hosts partner or customer data in its own network environment, secure remote access controls are essential to protect that data from unauthorized access over externa...
NIST SA-10 Found
Developer Configuration Management

Organizations consider the quality and completeness of configuration management activities conducted by developers as direct evidence of applying effective security controls. Controls include protecti...

Auto-Generated Generated during job processing
1. **How this control addresses the scoping question:** SA-10 Developer Configuration Management ensures that any systems or services hosting entity, partner, or customer data in the provider’s environment are securely managed throughout their life...
NIST SC-36
Distributed Processing and Storage

Distributing processing and storage across multiple physical locations or logical domains provides a degree of redundancy or overlap for organizations. The redundancy and overlap increase the work fac...

Auto-Generated Generated during job processing
SC-36 (Distributed Processing and Storage) is relevant to the scoping question because it addresses how and where data is stored and processed when hosted in a provider’s environment, potentially across multiple locations or domains outside the entit...
NIST SA-2 Found
Allocation of Resources

Resource allocation for information security and privacy includes funding for system and services acquisition, sustainment, and supply chain-related risks throughout the system development life cycle.

Auto-Generated Generated during job processing
Control SA-2 ensures that adequate resources are allocated to manage information security and privacy risks, including those arising from hosting data in the provider’s network environment. This control is important for compliance because it supports...
NIST SC-8 Found
Transmission Confidentiality and Integrity

Protecting the confidentiality and integrity of transmitted information applies to internal and external networks as well as any system components that can transmit information, including servers, not...

Auto-Generated Generated during job processing
SC-8 (Transmission Confidentiality and Integrity) is relevant to the scoping question because, when an entity hosts data in its own network environment, it assumes responsibility for protecting data as it traverses internal and external networks. Thi...
NIST SC-7 Found
Boundary Protection

Managed interfaces include gateways, routers, firewalls, guards, network-based malicious code analysis, virtualization systems, or encrypted tunnels implemented within a security architecture. Subnetw...

Auto-Generated Generated during job processing
SC-7 (Boundary Protection) is directly relevant to the scoping question because hosting data in the entity’s own network environment introduces risks related to data exposure and unauthorized access across network boundaries. This control ensures tha...
Scoping Question 7

Does the service require handling or custody of the entity’s physical assets (e.g., hardware, inventory)? Flags responsibility for equipment, shipments, or on-site physical items under the entity’s care. Asset damage, loss, or theft can disrupt operations and lead to replacement costs or insurance claims. Asset-tagging and inventory management system Insurance and liability clauses Chain-of-custody documentation for transfers

22 Controls
CIS 1.1 Found
Establish and Maintain Detailed Enterprise Asset Inventory

Establish and maintain an accurate, detailed, and up-to-date inventory of all enterprise assets with the potential to store or process data, to include: end-user devices (including portable and mobile...

Auto-Generated Generated during job processing
Control 1.1 is directly relevant to the scoping question because it ensures the organization maintains a comprehensive and accurate inventory of all physical assets under its custody, including hardware and devices. This control is important for comp...
NIST SA-9 Found
External System Services

External system services are provided by an external provider, and the organization has no direct control over the implementation of the required controls or the assessment of control effectiveness. O...

Auto-Generated Generated during job processing
1. Control SA-9 addresses the scoping question by ensuring that when physical assets are managed by external service providers, the organization maintains oversight through documented agreements, defined responsibilities, and a chain of trust. 2. Thi...
NIST AC-3 Found
Access Enforcement

Access control policies control access between active entities or subjects (i.e., users or processes acting on behalf of users) and passive entities or objects (i.e., devices, files, records, domains)...

Auto-Generated Generated during job processing
AC-3 (Access Enforcement) is relevant to the scoping question because it ensures that only authorized users or processes can access physical assets such as hardware or inventory under the entity’s custody. This control is important for compliance as ...
NIST CP-9 Found
System Backup

System-level information includes system state information, operating system software, middleware, application software, and licenses. User-level information includes information other than system-lev...

Auto-Generated Generated during job processing
1. **How this control addresses the scoping question:** CP-9 (System Backup) is relevant because physical assets such as hardware often store critical system and user-level information that must be backed up to ensure operational continuity in case...
NIST MP-5 Found
Media Transport

System media includes digital and non-digital media. Digital media includes flash drives, diskettes, magnetic tapes, external or removable hard disk drives (e.g., solid state and magnetic), compact d...

Auto-Generated Generated during job processing
Control MP-5 (Media Transport) is relevant to the scoping question because it establishes requirements for protecting and tracking physical assets—such as hardware or media—during transport, directly addressing the risks of asset damage, loss, or the...
NIST PS-7 Found
External Personnel Security

External provider refers to organizations other than the organization operating or acquiring the system. External providers include service bureaus, contractors, and other organizations that provide s...

Auto-Generated Generated during job processing
Control PS-7 (External Personnel Security) is relevant to the scoping question because it ensures that external personnel who may handle or have access to the entity’s physical assets are subject to appropriate security requirements and oversight. Th...
NIST SR-3 Found
Supply Chain Controls and Processes

Supply chain elements include organizations, entities, or tools employed for the research and development, design, manufacturing, acquisition, delivery, integration, operations and maintenance, and di...

Auto-Generated Generated during job processing
Control SR-3 is relevant to the scoping question because it establishes requirements for managing and securing physical assets throughout the supply chain, including acquisition, handling, and transfer processes. This control is important for complia...
NIST MA-6
Timely Maintenance

Organizations specify the system components that result in increased risk to organizational operations and assets, individuals, other organizations, or the Nation when the functionality provided by th...

Auto-Generated Generated during job processing
Control MA-6 (Timely Maintenance) is relevant to the scoping question because it ensures that physical assets—such as hardware or inventory—are maintained and supported to prevent operational disruptions due to equipment failure. This control is impo...
NIST AC-5 Found
Separation of Duties

Separation of duties addresses the potential for abuse of authorized privileges and helps to reduce the risk of malevolent activity without collusion. Separation of duties includes dividing mission or...

Auto-Generated Generated during job processing
1. AC-5 (Separation of Duties) is relevant to the scoping question because it ensures that responsibilities for handling or custody of physical assets are divided among multiple individuals or roles, reducing the risk of asset misuse, theft, or unaut...
NIST PE-20 Found
Asset Monitoring and Tracking

Asset location technologies can help ensure that critical assets—including vehicles, equipment, and system components—remain in authorized locations. Organizations consult with the Office ...

Auto-Generated Generated during job processing
The PE-20 Asset Monitoring and Tracking control directly addresses the scoping question by ensuring that any physical assets under the entity’s custody are continuously tracked and remain in authorized locations, thereby reducing the risk of loss, th...
NIST MA-2 Found
Controlled Maintenance

Controlling system maintenance addresses the information security aspects of the system maintenance program and applies to all types of maintenance to system components conducted by local or nonlocal ...

Auto-Generated Generated during job processing
Control MA-2 (Controlled Maintenance) is relevant to the scoping question because it ensures that all maintenance activities involving physical assets—such as hardware and peripherals—are properly documented, tracked, and controlled. This control is ...
NIST SR-4
Provenance

Every system and system component has a point of origin and may be changed throughout its existence. Provenance is the chronology of the origin, development, ownership, location, and changes to a syst...

Auto-Generated Generated during job processing
Control SR-4 (Provenance) is directly relevant to the scoping question because it ensures that the origin, ownership, location, and changes to physical assets (such as hardware or inventory) are thoroughly documented and tracked throughout their life...
NIST CM-8 Found
System Component Inventory

System components are discrete, identifiable information technology assets that include hardware, software, and firmware. Organizations may choose to implement centralized system component inventories...

Auto-Generated Generated during job processing
Control CM-8 (System Component Inventory) directly addresses the scoping question by requiring organizations to maintain a detailed and accurate inventory of all physical assets, such as hardware, under their custody. This control is crucial for comp...
NIST SR-7 Found
Supply Chain Operations Security

Supply chain OPSEC expands the scope of OPSEC to include suppliers and potential suppliers. OPSEC is a process that includes identifying critical information, analyzing friendly actions related to ope...

Auto-Generated Generated during job processing
Control SR-7 (Supply Chain Operations Security) is relevant to the scoping question because it ensures that physical assets under the entity’s custody are protected throughout the supply chain, including during transfers and interactions with supplie...
NIST PS-5 Found
Personnel Transfer

Personnel transfer applies when reassignments or transfers of individuals are permanent or of such extended duration as to make the actions warranted. Organizations define actions appropriate for the ...

Auto-Generated Generated during job processing
Control PS-5 (Personnel Transfer) is relevant to the scoping question because it ensures that when personnel are reassigned or transferred, their access to physical assets—such as hardware, inventory, or equipment—is properly managed. This control is...
NIST SA-1 Found
Policy and Procedures

System and services acquisition policy and procedures address the controls in the SA family that are implemented within systems and organizations. The risk management strategy is an important factor i...

Auto-Generated Generated during job processing
Control SA-1 (Policy and Procedures) is relevant to the scoping question because it ensures the organization establishes formal policies and procedures for the acquisition and management of physical assets, such as hardware and inventory. This contro...
NIST IR-8 Found
Incident Response Plan

It is important that organizations develop and implement a coordinated approach to incident response. Organizational mission and business functions determine the structure of incident response capabil...

Auto-Generated Generated during job processing
1. The Incident Response Plan (IR-8) is relevant to the scoping question because it ensures the organization is prepared to respond effectively to incidents involving physical assets, such as asset damage, loss, or theft. 2. This control is important...
NIST SR-1 Found
Policy and Procedures

Supply chain risk management policy and procedures address the controls in the SR family as well as supply chain-related controls in other families that are implemented within systems and organization...

Auto-Generated Generated during job processing
Control SR-1 (Policy and Procedures) is relevant to the scoping question because it requires organizations to formally define and document how physical assets—such as hardware and inventory—are managed and protected throughout the supply chain. This ...
NIST SR-2 Found
Supply Chain Risk Management Plan

The dependence on products, systems, and services from external providers, as well as the nature of the relationships with those providers, present an increasing level of risk to an organization. Thre...

Auto-Generated Generated during job processing
1. The Supply Chain Risk Management Plan (SR-2) directly addresses the scoping question by requiring organizations to identify, assess, and mitigate risks associated with the handling or custody of physical assets, including hardware and inventory, t...
NIST MA-1 Found
Policy and Procedures

Maintenance policy and procedures address the controls in the MA family that are implemented within systems and organizations. The risk management strategy is an important factor in establishing such ...

Auto-Generated Generated during job processing
MA-1 (Policy and Procedures) is relevant to the scoping question because it requires the organization to formally define and document how physical assets—such as hardware and inventory—are maintained, tracked, and protected. This control is important...
NIST SR-12 Found
Component Disposal

Data, documentation, tools, or system components can be disposed of at any time during the system development life cycle (not only in the disposal or retirement phase of the life cycle). For example, ...

Auto-Generated Generated during job processing
SR-12 (Component Disposal) is directly relevant to the scoping question because it governs the secure disposal of physical assets, such as hardware and documentation, that the entity handles or has custody over. This control is important for complian...
NIST IR-4 Found
Incident Handling

Organizations recognize that incident response capabilities are dependent on the capabilities of organizational systems and the mission and business processes being supported by those systems. Organiz...

Auto-Generated Generated during job processing
1. **How this control addresses the scoping question:** Control IR-4 (Incident Handling) is relevant because handling or custody of physical assets introduces the risk of incidents such as asset loss, theft, or damage, which require a formal respon...
Scoping Question 8

Will the entity’s staff operate on-site at entity facilities? Determines whether the entity’s personnel need to be co-located with your teams, impacting coordination and oversight. Increases insider/physical-security risk (tailgating, unauthorised access); adds complexity for facility management and supervision. Badge-based physical access controls Escort and visitor logging policy Segregated work areas with monitoring cameras

41 Controls
NIST AU-6 Found
Audit Record Review, Analysis, and Reporting

Audit record review, analysis, and reporting covers information security- and privacy-related logging performed by organizations, including logging that results from the monitoring of account usage, r...

Auto-Generated Generated during job processing
AU-6 (Audit Record Review, Analysis, and Reporting) is relevant to the scoping question because when staff operate on-site, there is increased risk of unauthorized physical access and insider threats. This control ensures that physical access logs (s...
NIST PE-3 Found
Physical Access Control

Physical access control applies to employees and visitors. Individuals with permanent physical access authorizations are not considered visitors. Physical access controls for publicly accessible areas...

Auto-Generated Generated during job processing
PE-3 Physical Access Control is directly relevant to the scoping question because it establishes procedures and mechanisms to manage and monitor staff access to on-site facilities. This control is essential for compliance as it mitigates insider and ...
NIST AU-16 Found
Cross-organizational Audit Logging

When organizations use systems or services of external organizations, the audit logging capability necessitates a coordinated, cross-organization approach. For example, maintaining the identity of ind...

Auto-Generated Generated during job processing
AU-16 (Cross-organizational Audit Logging) is relevant to the scoping question because when staff operate on-site at entity facilities, their activities may span systems managed by both the entity and external organizations. This control ensures coor...
NIST AT-3 Found
Role-based Training

Organizations determine the content of training based on the assigned roles and responsibilities of individuals as well as the security and privacy requirements of organizations and the systems to whi...

Auto-Generated Generated during job processing
1. Role-based training (AT-3) ensures that staff operating on-site at entity facilities receive targeted instruction on physical security protocols, such as badge-based access, visitor escort procedures, and monitoring requirements. 2. This control i...
NIST CA-6 Found
Authorization

Authorizations are official management decisions by senior officials to authorize operation of systems, authorize the use of common controls for inheritance by organizational systems, and explicitly a...

Auto-Generated Generated during job processing
1. Control CA-6 (Authorization) addresses the scoping question by ensuring that senior management formally approves and accepts the risks associated with staff operating on-site, including physical and insider threats introduced by co-location. 2. Th...
NIST PE-2 Found
Physical Access Authorizations

Physical access authorizations apply to employees and visitors. Individuals with permanent physical access authorization credentials are not considered visitors. Authorization credentials include ID b...

Auto-Generated Generated during job processing
PE-2 (Physical Access Authorizations) is directly relevant to the scoping question because it governs how staff are granted and managed physical access to on-site facilities, addressing the increased insider and physical security risks associated wit...
NIST AC-3 Found
Access Enforcement

Access control policies control access between active entities or subjects (i.e., users or processes acting on behalf of users) and passive entities or objects (i.e., devices, files, records, domains)...

Auto-Generated Generated during job processing
AC-3 (Access Enforcement) is relevant to the scoping question because it ensures that only authorized staff can access systems and data when operating on-site, thereby mitigating risks associated with insider threats and unauthorized access. This con...
NIST CM-5 Found
Access Restrictions for Change

Changes to the hardware, software, or firmware components of systems or the operational procedures related to the system can potentially have significant effects on the security of the systems or indi...

Auto-Generated Generated during job processing
CM-5 (Access Restrictions for Change) is relevant to the scoping question because when staff operate on-site, there is increased risk of unauthorized physical or logical access to systems during change activities. This control ensures that only quali...
NIST PM-10 Found
Authorization Process

Authorization processes for organizational systems and environments of operation require the implementation of an organization-wide risk management process and associated security and privacy standard...

Auto-Generated Generated during job processing
1. **How this control addresses the scoping question:** PM-10 (Authorization Process) ensures that any decision to allow staff to operate on-site is subject to formal risk management and authorization, considering the increased physical and insider...
NIST PS-3 Found
Personnel Screening

Personnel screening and rescreening activities reflect applicable laws, executive orders, directives, regulations, policies, standards, guidelines, and specific criteria established for the risk desig...

Auto-Generated Generated during job processing
Control PS-3 (Personnel Screening) is directly relevant to the scoping question because when staff operate on-site at entity facilities, they gain physical access to sensitive areas and systems, increasing the risk of insider threats. Implementing pe...
NIST IA-2 Found
Identification and Authentication (Organizational Users)

Organizations can satisfy the identification and authentication requirements by complying with the requirements in HSPD 12. Organizational users include employees or individuals who organizations cons...

Auto-Generated Generated during job processing
1. Control IA-2 is directly relevant to the scoping question because it ensures that all staff operating on-site are uniquely identified and authenticated before accessing organizational systems or facilities, mitigating risks associated with unautho...
NIST PE-6 Found
Monitoring Physical Access

Physical access monitoring includes publicly accessible areas within organizational facilities. Examples of physical access monitoring include the employment of guards, video surveillance equipment (i...

Auto-Generated Generated during job processing
1. **How this control addresses the scoping question:** PE-6 (Monitoring Physical Access) is directly relevant when staff operate on-site, as it ensures that all physical access to facilities is monitored and logged, mitigating risks associated wit...
NIST MP-5 Found
Media Transport

System media includes digital and non-digital media. Digital media includes flash drives, diskettes, magnetic tapes, external or removable hard disk drives (e.g., solid state and magnetic), compact d...

Auto-Generated Generated during job processing
MP-5 (Media Transport) is relevant to the scoping question because on-site staff may handle and transport sensitive media within or outside entity facilities, increasing the risk of unauthorized access or loss. This control ensures that physical and ...
NIST AC-2 Found
Account Management

Examples of system account types include individual, shared, group, system, guest, anonymous, emergency, developer, temporary, and service. Identification of authorized system users and the specificat...

Auto-Generated Generated during job processing
1. AC-2 (Account Management) is relevant to the scoping question because it ensures that only authorized staff operating on-site are granted appropriate system access, and that their accounts are managed, monitored, and revoked as needed based on the...
NIST MA-5 Found
Maintenance Personnel

Maintenance personnel refers to individuals who perform hardware or software maintenance on organizational systems, while PE-2 addresses physical access for individuals whose maintenance duties place ...

Auto-Generated Generated during job processing
MA-5 (Maintenance Personnel) is relevant to the scoping question because it governs how maintenance staff—who may operate on-site—are authorized, supervised, and granted access to sensitive areas within entity facilities. This control is important fo...
NIST PT-7 Found
Specific Categories of Personally Identifiable Information

Organizations apply any conditions or protections that may be necessary for specific categories of personally identifiable information. These conditions may be required by laws, executive orders, dire...

Auto-Generated Generated during job processing
1. Control PT-7 is relevant to the scoping question because on-site staff may have direct access to specific categories of personally identifiable information (PII), increasing the need for tailored protections based on the sensitivity of the data ha...
NIST PE-17 Found
Alternate Work Site

Alternate work sites include government facilities or the private residences of employees. While distinct from alternative processing sites, alternate work sites can provide readily available alternat...

Auto-Generated Generated during job processing
Control PE-17 (Alternate Work Site) is relevant to the scoping question because it ensures that security and contingency controls are extended to any location where staff may operate, including on-site facilities and alternate work sites. This contro...
NIST PE-18 Found
Location of System Components

Physical and environmental hazards include floods, fires, tornadoes, earthquakes, hurricanes, terrorism, vandalism, an electromagnetic pulse, electrical interference, and other forms of incoming elect...

Auto-Generated Generated during job processing
1. This control addresses the scoping question by ensuring that when staff operate on-site, the physical location and layout of system components are evaluated for risks related to unauthorized proximity and environmental hazards. 2. It is important ...
NIST MA-6
Timely Maintenance

Organizations specify the system components that result in increased risk to organizational operations and assets, individuals, other organizations, or the Nation when the functionality provided by th...

Auto-Generated Generated during job processing
MA-6 (Timely Maintenance) is relevant to the scoping question because on-site staff may interact with or rely on physical and technical systems that require regular maintenance to ensure security and operational integrity. This control is important f...
NIST AC-5 Found
Separation of Duties

Separation of duties addresses the potential for abuse of authorized privileges and helps to reduce the risk of malevolent activity without collusion. Separation of duties includes dividing mission or...

Auto-Generated Generated during job processing
The AC-5 Separation of Duties control is relevant to the scoping question because when staff operate on-site, there is increased potential for unauthorized activities or collusion due to physical proximity and access. This control is important for co...
NIST PE-20 Found
Asset Monitoring and Tracking

Asset location technologies can help ensure that critical assets—including vehicles, equipment, and system components—remain in authorized locations. Organizations consult with the Office ...

Auto-Generated Generated during job processing
1. PE-20 (Asset Monitoring and Tracking) addresses the scoping question by ensuring that when staff operate on-site, critical assets remain within authorized areas, reducing the risk of insider threats and unauthorized physical access. 2. This contro...
NIST SC-50 Found
Software-enforced Separation and Policy Enforcement

System owners may require additional strength of mechanism to ensure domain separation and policy enforcement for specific types of threats and environments of operation.

Auto-Generated Generated during job processing
SC-50 (Software-enforced Separation and Policy Enforcement) is relevant to the scoping question because when staff operate on-site, there is increased risk of unauthorized access to sensitive systems and data. This control ensures that even within sh...
NIST AU-14 Found
Session Audit

Session audits can include monitoring keystrokes, tracking websites visited, and recording information and/or file transfers. Session audit capability is implemented in addition to event logging and m...

Auto-Generated Generated during job processing
1. AU-14 Session Audit is relevant to the scoping question because when staff operate on-site, there is increased risk of unauthorized system access and insider threats, making it necessary to monitor and audit user sessions for suspicious activity. ...
NIST AC-4 Found
Information Flow Enforcement

Information flow control regulates where information can travel within a system and between systems (in contrast to who is allowed to access the information) and without regard to subsequent accesses ...

Auto-Generated Generated during job processing
1. AC-4 (Information Flow Enforcement) is relevant to the scoping question because when staff operate on-site, there is increased potential for unauthorized or uncontrolled information flow between systems or security domains within the facility. 2. ...
NIST PS-1 Found
Policy and Procedures

Personnel security policy and procedures for the controls in the PS family that are implemented within systems and organizations. The risk management strategy is an important factor in establishing su...

Auto-Generated Generated during job processing
Control PS-1 (Policy and Procedures) is relevant to the scoping question because it ensures the organization has formal personnel security policies and procedures in place to address risks associated with staff operating on-site. This control is impo...
NIST PS-9 Found
Position Descriptions

Specification of security and privacy roles in individual organizational position descriptions facilitates clarity in understanding the security or privacy responsibilities associated with the roles a...

Auto-Generated Generated during job processing
1. Control PS-9 (Position Descriptions) addresses the scoping question by ensuring that staff operating on-site have clearly defined security and privacy responsibilities in their job descriptions, which is essential for effective coordination and ov...
NIST PE-16 Found
Delivery and Removal

Enforcing authorizations for entry and exit of system components may require restricting access to delivery areas and isolating the areas from the system and media libraries.

Auto-Generated Generated during job processing
Control PE-16 (Delivery and Removal) is relevant to the scoping question because when staff operate on-site, there is increased movement of system components and media within the facility, raising the risk of unauthorized removal or tampering. This c...
NIST AT-1 Found
Policy and Procedures

Awareness and training policy and procedures address the controls in the AT family that are implemented within systems and organizations. The risk management strategy is an important factor in establi...

Auto-Generated Generated during job processing
Control AT-1 (Policy and Procedures) is relevant to the scoping question because it ensures that staff operating on-site are governed by formal awareness and training policies addressing physical security risks, such as unauthorized access and tailga...
NIST SC-37 Found
Out-of-band Channels

Out-of-band channels include local, non-network accesses to systems; network paths physically separate from network paths used for operational traffic; or non-electronic paths, such as the U.S. Postal...

Auto-Generated Generated during job processing
1. SC-37 (Out-of-band Channels) is relevant to the scoping question because when staff operate on-site, there is increased risk of unauthorized physical access to systems, making it critical to use separate, secure channels for transmitting sensitive...
NIST PE-8 Found
Visitor Access Records

Visitor access records include the names and organizations of individuals visiting, visitor signatures, forms of identification, dates of access, entry and departure times, purpose of visits, and the ...

Auto-Generated Generated during job processing
Control PE-8 (Visitor Access Records) is directly relevant to the scoping question because it ensures that all individuals, including entity staff operating on-site, are properly logged and monitored when accessing facilities. This control is importa...
NIST PM-31 Found
Continuous Monitoring Strategy

Continuous monitoring at the organization level facilitates ongoing awareness of the security and privacy posture across the organization to support organizational risk management decisions. The terms...

Auto-Generated Generated during job processing
PM-31 (Continuous Monitoring Strategy) is relevant to the scoping question because it ensures that physical security controls—such as badge-based access, visitor logging, and monitored work areas—are regularly assessed and tracked for effectiveness w...
NIST PE-14 Found
Environmental Controls

The provision of environmental controls applies primarily to organizational facilities that contain concentrations of system resources (e.g., data centers, mainframe computer rooms, and server rooms)....

Auto-Generated Generated during job processing
1. **How this control addresses the scoping question:** PE-14 (Environmental Controls) is relevant because when staff operate on-site, the physical environment must be safeguarded to ensure the continued availability and reliability of critical sys...
NIST PM-12 Found
Insider Threat Program

Organizations that handle classified information are required, under Executive Order 13587 EO 13587 and the National Insider Threat Policy ODNI NITP, to establish insider threat programs. The same sta...

Auto-Generated Generated during job processing
1. The Insider Threat Program (PM-12) directly addresses the scoping question by establishing formal mechanisms to detect and mitigate risks posed by staff operating on-site, where the potential for insider threats and unauthorized physical access is...
NIST AC-1 Found
Policy and Procedures

Access control policy and procedures address the controls in the AC family that are implemented within systems and organizations. The risk management strategy is an important factor in establishing su...

Auto-Generated Generated during job processing
AC-1 (Policy and Procedures) is directly relevant to the scoping question because it requires the organization to formally establish and document access control policies and procedures, including those governing physical access for on-site staff. Thi...
NIST PS-5 Found
Personnel Transfer

Personnel transfer applies when reassignments or transfers of individuals are permanent or of such extended duration as to make the actions warranted. Organizations define actions appropriate for the ...

Auto-Generated Generated during job processing
Control PS-5 (Personnel Transfer) is directly relevant to the scoping question because when staff operate on-site, their physical and logical access must be managed during transfers or reassignments to prevent unauthorized access to facilities and se...
NIST CM-4 Found
Impact Analyses

Organizational personnel with security or privacy responsibilities conduct impact analyses. Individuals conducting impact analyses possess the necessary skills and technical expertise to analyze the c...

Auto-Generated Generated during job processing
CM-4 (Impact Analyses) is relevant to the scoping question because it ensures that any decision to have staff operate on-site is systematically evaluated for its security and privacy implications, including insider and physical security risks. This c...
NIST SC-46 Found
Cross Domain Policy Enforcement

For logical policy enforcement mechanisms, organizations avoid creating a logical path between interfaces to prevent the ability to bypass the policy enforcement mechanism. For physical policy enforce...

Auto-Generated Generated during job processing
1. SC-46 (Cross Domain Policy Enforcement) is relevant to the scoping question because when staff operate on-site, there is increased risk of unauthorized access or data transfer between security domains, whether through physical or logical means. ...
NIST PS-8 Found
Personnel Sanctions

Organizational sanctions reflect applicable laws, executive orders, directives, regulations, policies, standards, and guidelines. Sanctions processes are described in access agreements and can be incl...

Auto-Generated Generated during job processing
1. The PS-8 Personnel Sanctions control addresses the scoping question by ensuring that staff operating on-site are subject to clear disciplinary measures if they violate physical security policies, such as unauthorized access or tailgating. 2. This ...
NIST MP-1 Found
Policy and Procedures

Media protection policy and procedures address the controls in the MP family that are implemented within systems and organizations. The risk management strategy is an important factor in establishing ...

Auto-Generated Generated during job processing
1. MP-1 (Policy and Procedures) is relevant to the scoping question because when staff operate on-site, formalized media protection policies and procedures are essential to govern how physical and digital media are handled, accessed, and protected wi...
NIST SC-48 Found
Sensor Relocation

Adversaries may take various paths and use different approaches as they move laterally through an organization (including its systems) to reach their target or as they attempt to exfiltrate informatio...

Auto-Generated Generated during job processing
**Justification:** 1. The SC-48 Sensor Relocation control is relevant to the scoping question because when staff operate on-site, there is an increased risk of insider threats and unauthorized physical access, making it essential to adapt monitoring...
NIST SC-49 Found
Hardware-enforced Separation and Policy Enforcement

System owners may require additional strength of mechanism and robustness to ensure domain separation and policy enforcement for specific types of threats and environments of operation. Hardware-enfor...

Auto-Generated Generated during job processing
SC-49 (Hardware-enforced Separation and Policy Enforcement) is relevant to the scoping question because when staff operate on-site, there is increased risk of unauthorized physical access and insider threats. This control ensures that critical system...
Scoping Question 9

Will the entity subcontract any portion of this engagement to other providers? Checks if the prime entity relies on fourth parties, affecting visibility into who actually performs the work. Sub-providers may have weaker controls, inconsistent quality, and introduce hidden compliance or contractual gaps. Flow-down contractual requirements Right-to-audit sub-providers Sub-vendor inventory and control reviews

7 Controls
NIST AU-16 Found
Cross-organizational Audit Logging

When organizations use systems or services of external organizations, the audit logging capability necessitates a coordinated, cross-organization approach. For example, maintaining the identity of ind...

Auto-Generated Generated during job processing
AU-16 (Cross-organizational Audit Logging) is relevant to the scoping question because when an entity subcontracts work to other providers, it must ensure that audit logs are coordinated across all involved organizations to maintain visibility and ac...
NIST SR-8 Found
Notification Agreements

The establishment of agreements and procedures facilitates communications among supply chain entities. Early notification of compromises and potential compromises in the supply chain that can potentia...

Auto-Generated Generated during job processing
1. **How this control addresses the scoping question:** SR-8 (Notification Agreements) ensures that if the entity subcontracts any portion of the engagement, there are formal agreements requiring timely notification of security incidents or comprom...
NIST SR-6 Found
Supplier Assessments and Reviews

An assessment and review of supplier risk includes security and supply chain risk management processes, foreign ownership, control or influence (FOCI), and the ability of the supplier to effectively a...

Auto-Generated Generated during job processing
Control SR-6 is directly relevant to the scoping question because it requires the organization to assess and review the risks associated with suppliers, including their ability to manage subcontractors and lower-tier providers. This control is import...
NIST SA-9 Found
External System Services

External system services are provided by an external provider, and the organization has no direct control over the implementation of the required controls or the assessment of control effectiveness. O...

Auto-Generated Generated during job processing
Control SA-9 (External System Services) directly addresses the scoping question by requiring organizations to formally manage and document relationships with external service providers, including subcontractors, ensuring that security and compliance ...
NIST PS-7 Found
External Personnel Security

External provider refers to organizations other than the organization operating or acquiring the system. External providers include service bureaus, contractors, and other organizations that provide s...

Auto-Generated Generated during job processing
1. This control addresses the scoping question by ensuring that when the entity subcontracts work to external providers, personnel security requirements are explicitly defined and enforced for all external staff involved in the engagement. 2. This co...
NIST SR-7 Found
Supply Chain Operations Security

Supply chain OPSEC expands the scope of OPSEC to include suppliers and potential suppliers. OPSEC is a process that includes identifying critical information, analyzing friendly actions related to ope...

Auto-Generated Generated during job processing
SR-7 (Supply Chain Operations Security) directly addresses the scoping question by requiring organizations to assess and manage operational security risks introduced by subcontractors and other supply chain partners. This control is important for com...
NIST SR-5 Found
Acquisition Strategies, Tools, and Methods

The use of the acquisition process provides an important vehicle to protect the supply chain. There are many useful tools and techniques available, including obscuring the end use of a system or syste...

Auto-Generated Generated during job processing
Control SR-5 is directly relevant to the scoping question because it establishes requirements and strategies for managing supply chain risks when subcontracting work to other providers. This control is important for compliance as it ensures that acqu...
Scoping Question 10

Does the entity’s performance depend on access to proprietary processes or intellectual property? Clarifies whether the entity needs to understand or use your unique methodologies, algorithms, or trade secrets. Exposure of IP risks theft or leakage, eroding competitive advantage and complicating future provider transitions. NDAs and IP assignment clauses ACLs on sensitive repositories Periodic IP-use audits

16 Controls
NIST AU-16 Found
Cross-organizational Audit Logging

When organizations use systems or services of external organizations, the audit logging capability necessitates a coordinated, cross-organization approach. For example, maintaining the identity of ind...

Auto-Generated Generated during job processing
AU-16 (Cross-organizational Audit Logging) is relevant to the scoping question because it ensures that access to proprietary processes or intellectual property is traceable across organizational boundaries, helping to detect and investigate unauthori...
NIST SR-8 Found
Notification Agreements

The establishment of agreements and procedures facilitates communications among supply chain entities. Early notification of compromises and potential compromises in the supply chain that can potentia...

Auto-Generated Generated during job processing
SR-8 (Notification Agreements) is relevant to the scoping question because it ensures timely communication of any compromises or risks related to proprietary processes or intellectual property within the supply chain. This control is important for co...
NIST CM-5 Found
Access Restrictions for Change

Changes to the hardware, software, or firmware components of systems or the operational procedures related to the system can potentially have significant effects on the security of the systems or indi...

Auto-Generated Generated during job processing
CM-5 (Access Restrictions for Change) is relevant to the scoping question because it ensures that only authorized personnel can modify systems or processes that may contain or support proprietary methodologies, algorithms, or trade secrets. This cont...
NIST PT-2 Found
Authority to Process Personally Identifiable Information

The processing of personally identifiable information is an operation or set of operations that the information system or organization performs with respect to personally identifiable information acro...

Auto-Generated Generated during job processing
PT-2 is relevant to the scoping question because it ensures that any processing of personally identifiable information (PII) within proprietary processes or intellectual property is authorized and compliant with applicable laws and organizational pol...
NIST PT-7 Found
Specific Categories of Personally Identifiable Information

Organizations apply any conditions or protections that may be necessary for specific categories of personally identifiable information. These conditions may be required by laws, executive orders, dire...

Auto-Generated Generated during job processing
1. This control addresses the scoping question by ensuring that any proprietary processes or intellectual property containing personally identifiable information (PII) are subject to appropriate protections and conditions, as required by law or organ...
NIST PM-21 Found
Accounting of Disclosures

The purpose of accounting of disclosures is to allow individuals to learn to whom their personally identifiable information has been disclosed, to provide a basis for subsequently advising recipients ...

Auto-Generated Generated during job processing
PM-21 (Accounting of Disclosures) is relevant to the scoping question because it ensures that any disclosures of proprietary processes or intellectual property—including those containing personally identifiable information—are tracked and auditable. ...
NIST AC-4 Found
Information Flow Enforcement

Information flow control regulates where information can travel within a system and between systems (in contrast to who is allowed to access the information) and without regard to subsequent accesses ...

Auto-Generated Generated during job processing
AC-4 (Information Flow Enforcement) is directly relevant to the scoping question because it ensures that proprietary processes and intellectual property (IP) are only allowed to flow to authorized systems and users, preventing unauthorized transmissi...
NIST CM-8 Found
System Component Inventory

System components are discrete, identifiable information technology assets that include hardware, software, and firmware. Organizations may choose to implement centralized system component inventories...

Auto-Generated Generated during job processing
1. CM-8 (System Component Inventory) addresses the scoping question by ensuring that all IT assets—including those storing or processing proprietary processes and intellectual property—are accurately identified and tracked. 2. This control is impor...
NIST AC-21 Found
Information Sharing

Information sharing applies to information that may be restricted in some manner based on some formal or administrative determination. Examples of such information include, contract-sensitive informat...

Auto-Generated Generated during job processing
AC-21 (Information Sharing) directly addresses the scoping question by establishing formal mechanisms—such as NDAs and access restrictions—for controlling how proprietary processes and intellectual property are shared and accessed. This control is cr...
NIST IA-8 Found
Identification and Authentication (Non-organizational Users)

Non-organizational users include system users other than organizational users explicitly covered by IA-2. Non-organizational users are uniquely identified and authenticated for accesses other than tho...

Auto-Generated Generated during job processing
Control IA-8 ensures that non-organizational users—such as contractors, partners, or third parties—are uniquely identified and authenticated before accessing systems containing proprietary processes or intellectual property. This control is critical ...
NIST SA-20 Found
Customized Development of Critical Components

Organizations determine that certain system components likely cannot be trusted due to specific threats to and vulnerabilities in those components for which there are no viable security controls to ad...

Auto-Generated Generated during job processing
Control SA-20 is relevant to the scoping question because it ensures that critical system components—especially those involving proprietary processes or intellectual property—are either custom-developed or subject to enhanced protections when standar...
NIST AC-17 Found
Remote Access

Remote access is access to organizational systems (or processes acting on behalf of users) that communicate through external networks such as the Internet. Types of remote access include dial-up, broa...

Auto-Generated Generated during job processing
AC-17 (Remote Access) is relevant to the scoping question because it ensures that remote connections to systems containing proprietary processes or intellectual property are properly secured, typically through encrypted VPNs and strict access control...
NIST SR-5 Found
Acquisition Strategies, Tools, and Methods

The use of the acquisition process provides an important vehicle to protect the supply chain. There are many useful tools and techniques available, including obscuring the end use of a system or syste...

Auto-Generated Generated during job processing
SR-5 is relevant to the scoping question because it establishes acquisition strategies and safeguards that help protect proprietary processes and intellectual property throughout the supply chain. This control is important for compliance as it mitiga...
NIST SI-18 Found
Personally Identifiable Information Quality Operations

Personally identifiable information quality operations include the steps that organizations take to confirm the accuracy and relevance of personally identifiable information throughout the information...

Auto-Generated Generated during job processing
SI-18 (Personally Identifiable Information Quality Operations) is relevant to the scoping question because proprietary processes or intellectual property may involve the use or processing of personally identifiable information (PII) as part of unique...
NIST AU-13 Found
Monitoring for Information Disclosure

Unauthorized disclosure of information is a form of data leakage. Open-source information includes social networking sites and code-sharing platforms and repositories. Examples of organizational infor...

Auto-Generated Generated during job processing
1. AU-13: Monitoring for Information Disclosure directly addresses the scoping question by ensuring that proprietary processes and intellectual property are not inadvertently or maliciously exposed through open-source platforms, social media, or code...
NIST SA-2 Found
Allocation of Resources

Resource allocation for information security and privacy includes funding for system and services acquisition, sustainment, and supply chain-related risks throughout the system development life cycle.

Auto-Generated Generated during job processing
Control SA-2 ensures that sufficient resources are allocated to protect proprietary processes and intellectual property throughout the system development life cycle, directly addressing the need to safeguard unique methodologies and trade secrets ide...
Scoping Question 11

Does the entity use third parties to deliver services outside the United States? Identifies whether any part of service delivery is outsourced internationally, beyond your direct oversight. Offshore third parties can fall under different regulatory regimes, complicate compliance, data-sovereignty, and oversight. International due-diligence and risk assessments Flow-down contract clauses for compliance and data handling Regular third-party audits and SLAs

10 Controls
NIST AU-16 Found
Cross-organizational Audit Logging

When organizations use systems or services of external organizations, the audit logging capability necessitates a coordinated, cross-organization approach. For example, maintaining the identity of ind...

Auto-Generated Generated during job processing
AU-16 (Cross-organizational Audit Logging) is directly relevant to the scoping question because it ensures that audit trails are maintained and coordinated when services are delivered by third parties outside the United States. This control is import...
NIST SR-8 Found
Notification Agreements

The establishment of agreements and procedures facilitates communications among supply chain entities. Early notification of compromises and potential compromises in the supply chain that can potentia...

Auto-Generated Generated during job processing
1. Control SR-8 (Notification Agreements) addresses the scoping question by ensuring that offshore third parties are contractually required to promptly notify the organization of any security incidents or compromises, which is critical when services ...
NIST SR-6 Found
Supplier Assessments and Reviews

An assessment and review of supplier risk includes security and supply chain risk management processes, foreign ownership, control or influence (FOCI), and the ability of the supplier to effectively a...

Auto-Generated Generated during job processing
Control SR-6 (Supplier Assessments and Reviews) directly addresses the scoping question by requiring organizations to assess and review the risks associated with third-party suppliers, including those located outside the United States. This control i...
NIST SA-9 Found
External System Services

External system services are provided by an external provider, and the organization has no direct control over the implementation of the required controls or the assessment of control effectiveness. O...

Auto-Generated Generated during job processing
Control SA-9 is directly relevant to the scoping question because it governs how organizations manage risks and oversight when using external system services, including those delivered by third parties outside the United States. This control is cruci...
NIST SA-21 Found
Developer Screening

Developer screening is directed at external developers. Internal developer screening is addressed by PS-3. Because the system, system component, or system service may be used in critical activities es...

Auto-Generated Generated during job processing
Control SA-21 (Developer Screening) is directly relevant to the scoping question because it ensures that external, potentially offshore developers are properly vetted for trustworthiness, including background checks, citizenship, and company ownershi...
NIST PS-7 Found
External Personnel Security

External provider refers to organizations other than the organization operating or acquiring the system. External providers include service bureaus, contractors, and other organizations that provide s...

Auto-Generated Generated during job processing
Control PS-7 (External Personnel Security) is directly relevant to the scoping question because it ensures that organizations impose personnel security requirements on third-party providers, including those delivering services internationally. This c...
NIST SI-5 Found
Security Alerts, Advisories, and Directives

The Cybersecurity and Infrastructure Security Agency (CISA) generates security alerts and advisories to maintain situational awareness throughout the Federal Government. Security directives are issued...

Auto-Generated Generated during job processing
1. **How this control addresses the scoping question:** SI-5 ensures that security alerts, advisories, and directives are communicated and acted upon not only internally but also with external service providers, including offshore third parties. 2...
NIST AC-20 Found
Use of External Systems

External systems are systems that are used by but not part of organizational systems, and for which the organization has no direct control over the implementation of required controls or the assessmen...

Auto-Generated Generated during job processing
1. Control AC-20 is directly relevant to the scoping question because it governs the use of external systems, including those managed by offshore third parties, to deliver services outside the United States. 2. This control is important for complia...
NIST SR-7 Found
Supply Chain Operations Security

Supply chain OPSEC expands the scope of OPSEC to include suppliers and potential suppliers. OPSEC is a process that includes identifying critical information, analyzing friendly actions related to ope...

Auto-Generated Generated during job processing
Control SR-7 (Supply Chain Operations Security) is directly relevant to the scoping question because it ensures that operational security practices extend to international third-party suppliers, addressing the increased risks and oversight challenges...
NIST IR-8 Found
Incident Response Plan

It is important that organizations develop and implement a coordinated approach to incident response. Organizational mission and business functions determine the structure of incident response capabil...

Auto-Generated Generated during job processing
1. Control IR-8 is relevant to the scoping question because it ensures that incident response plans include coordination and information sharing with offshore third-party service providers, addressing the risks associated with outsourcing services in...
Scoping Question 12

Will the service generate customer-facing deliverables or directly impact end users? Determines if the entity’s outputs (reports, portals, APIs) are visible to or used by your customers or partners. Errors or downtime become public, risking reputational damage, customer churn, and potential SLA penalties. QA review gates Pre-release user-acceptance testing (UAT) Versioned API contracts and rollback procedures

2 Controls
NIST SR-8 Found
Notification Agreements

The establishment of agreements and procedures facilitates communications among supply chain entities. Early notification of compromises and potential compromises in the supply chain that can potentia...

Auto-Generated Generated during job processing
1. SR-8 (Notification Agreements) is relevant to the scoping question because customer-facing deliverables or services directly impact end users, making timely communication about supply chain compromises essential to maintain trust and meet contract...
NIST SA-9 Found
External System Services

External system services are provided by an external provider, and the organization has no direct control over the implementation of the required controls or the assessment of control effectiveness. O...

Auto-Generated Generated during job processing
Control SA-9 (External System Services) is relevant to the scoping question because it ensures that when customer-facing deliverables or end-user impacting services rely on external providers, the organization maintains oversight of security, perform...
Scoping Question 13

Is continuous (24/7) availability required for this service? Establishes whether the service must run without interruption (e.g., call center, global e-commerce). Leaves little maintenance window, higher ops burden, risk of slip-ups or fatigue-related errors in support shifts. SLAs with uptime guarantees Geographically redundant infrastructure Automated alerting and escalation paths

9 Controls
NIST CA-7 Found
Continuous Monitoring

Continuous monitoring at the system level facilitates ongoing awareness of the system security and privacy posture to support organizational risk management decisions. The terms continuous and ongoing...

Auto-Generated Generated during job processing
CA-7 (Continuous Monitoring) is directly relevant to the scoping question regarding 24/7 service availability because it ensures ongoing visibility into the system’s security and operational status, enabling rapid detection and response to incidents ...
NIST MA-6
Timely Maintenance

Organizations specify the system components that result in increased risk to organizational operations and assets, individuals, other organizations, or the Nation when the functionality provided by th...

Auto-Generated Generated during job processing
MA-6 (Timely Maintenance) is directly relevant to the scoping question about 24/7 availability because it ensures that critical system components receive prompt maintenance, minimizing downtime and supporting continuous service operations. This contr...
NIST CP-8 Found
Telecommunications Services

Telecommunications services (for data and voice) for primary and alternate processing and storage sites are in scope for CP-8. Alternate telecommunications services reflect the continuity requirements...

Auto-Generated Generated during job processing
Control CP-8 is directly relevant to the scoping question because continuous (24/7) service availability depends on resilient telecommunications infrastructure at both primary and alternate sites. This control ensures that alternate telecommunication...
NIST CP-7 Found
Alternate Processing Site

Alternate processing sites are geographically distinct from primary processing sites and provide processing capability if the primary processing site is not available. The alternate processing capabil...

Auto-Generated Generated during job processing
1. CP-7 (Alternate Processing Site) directly addresses the scoping question by ensuring that the service can maintain continuous (24/7) availability, even if the primary site becomes unavailable due to disruption or failure. 2. This control is import...
NIST SI-17
Fail-safe Procedures

Failure conditions include the loss of communications among critical system components or between system components and operational facilities. Fail-safe procedures include alerting operator personnel...

Auto-Generated Generated during job processing
1. SI-17 (Fail-safe Procedures) directly addresses the scoping question by ensuring that, in the event of a failure or loss of communication, there are predefined steps to maintain or quickly restore service availability, which is critical for servic...
NIST PM-31 Found
Continuous Monitoring Strategy

Continuous monitoring at the organization level facilitates ongoing awareness of the security and privacy posture across the organization to support organizational risk management decisions. The terms...

Auto-Generated Generated during job processing
1. PM-31 Continuous Monitoring Strategy is directly relevant to the scoping question because continuous (24/7) service availability requires ongoing awareness of system health, security, and privacy risks to promptly detect and respond to issues that...
NIST SI-13 Found
Predictable Failure Prevention

While MTTF is primarily a reliability issue, predictable failure prevention is intended to address potential failures of system components that provide security capabilities. Failure rates reflect ins...

Auto-Generated Generated during job processing
1. SI-13 (Predictable Failure Prevention) directly addresses the scoping question by ensuring that critical security components remain operational and can seamlessly transfer responsibilities to standby systems, supporting the requirement for continu...
NIST CP-2 Found
Contingency Plan

Contingency planning for systems is part of an overall program for achieving continuity of operations for organizational mission and business functions. Contingency planning addresses system restorati...

Auto-Generated Generated during job processing
1. CP-2 (Contingency Plan) directly addresses the scoping question by ensuring that documented procedures and infrastructure are in place to maintain or quickly restore 24/7 service availability in the event of disruptions. 2. This control is importa...
NIST PE-12
Emergency Lighting

The provision of emergency lighting applies primarily to organizational facilities that contain concentrations of system resources, including data centers, server rooms, and mainframe computer rooms. ...

Auto-Generated Generated during job processing
PE-12 Emergency Lighting is directly relevant to the scoping question regarding continuous (24/7) availability, as it ensures that critical facilities such as data centers remain operational and accessible during power outages or emergencies. This co...
Scoping Question 14

Will any part of the work be performed—or deliverables hosted—outside the United States? Reveals cross-border execution or hosting, with implications for time zones, language, and differing regulations. May violate data-sovereignty laws, complicate breach-notification requirements, and introduce communication or time-zone challenges. Data-residency and export-control policies Encryption of data in transit and at rest Jurisdiction-specific compliance attestations

4 Controls
NIST SI-5 Found
Security Alerts, Advisories, and Directives

The Cybersecurity and Infrastructure Security Agency (CISA) generates security alerts and advisories to maintain situational awareness throughout the Federal Government. Security directives are issued...

Auto-Generated Generated during job processing
1. **How this control addresses the scoping question:** SI-5 ensures that organizations promptly receive and act on security alerts, advisories, and directives, which is critical when work or data hosting occurs outside the United States, as cross-...
NIST CP-6 Found
Alternate Storage Site

Alternate storage sites are geographically distinct from primary storage sites and maintain duplicate copies of information and data if the primary storage site is not available. Similarly, alternate ...

Auto-Generated Generated during job processing
1. Control CP-6 (Alternate Storage Site) directly addresses the scoping question by requiring organizations to identify and manage geographically distinct storage and processing locations, which may include sites outside the United States. 2. This co...
NIST AC-4 Found
Information Flow Enforcement

Information flow control regulates where information can travel within a system and between systems (in contrast to who is allowed to access the information) and without regard to subsequent accesses ...

Auto-Generated Generated during job processing
AC-4 (Information Flow Enforcement) is directly relevant to the scoping question because it governs how information is transmitted between systems, particularly across national borders. This control is essential for compliance as it helps prevent una...
NIST CP-7 Found
Alternate Processing Site

Alternate processing sites are geographically distinct from primary processing sites and provide processing capability if the primary processing site is not available. The alternate processing capabil...

Auto-Generated Generated during job processing
Control CP-7 (Alternate Processing Site) is directly relevant to the scoping question because it governs the use of geographically distinct locations—including those outside the United States—for backup or failover operations. This control is importa...
Scoping Question 15

Does the service entail custom or bespoke development unique to entity? Flags projects that require tailored code, configurations, or processes rather than off-the-shelf solutions. Custom solutions are harder to maintain, increase dependency, and may not be supported by other providers or future upgrades. Secure SDLC with code reviews Version-controlled documentation Exit-ready source-code escrow

3 Controls
NIST SA-22 Found
Unsupported System Components

Support for system components includes software patches, firmware updates, replacement parts, and maintenance contracts. An example of unsupported components includes when vendors no longer provide cr...

Auto-Generated Generated during job processing
1. **How this control addresses the scoping question:** SA-22 is relevant because custom or bespoke development often results in unique system components that may not be supported by standard vendor updates or patches, increasing the risk of unsupp...
NIST SA-20 Found
Customized Development of Critical Components

Organizations determine that certain system components likely cannot be trusted due to specific threats to and vulnerabilities in those components for which there are no viable security controls to ad...

Auto-Generated Generated during job processing
Control SA-20 is directly relevant to the scoping question because it addresses the risks associated with custom or bespoke development, specifically when standard security controls are insufficient for unique, tailored components. This control is im...
NIST SA-15 Found
Development Process, Standards, and Tools

Development tools include programming languages and computer-aided design systems. Reviews of development processes include the use of maturity models to determine the potential effectiveness of such ...

Auto-Generated Generated during job processing
Control SA-15 is directly relevant to the scoping question because it ensures that custom or bespoke development follows standardized processes, utilizes approved tools, and maintains strict configuration control throughout the system development lif...
Processing...

Please wait while we process your request