Assessment
Submission
AI Processing
& Analysis
Key Controls
Review
4
Final
Results
Search & Add Controls
AI-powered search finds controls based on meaning and context
AI Search Results

Found semantically similar controls

0 results

Current Key Controls

155 Total
Scoping Question 1

Will the entity’s staff operate on-site at entity facilities? Determines whether the entity’s personnel need to be co-located with your teams, impacting coordination and oversight. Increases insider/physical-security risk (tailgating, unauthorised access); adds complexity for facility management and supervision. Badge-based physical access controls Escort and visitor logging policy Segregated work areas with monitoring cameras

41 Controls
NIST PE-3
Physical Access Control

Physical access control applies to employees and visitors. Individuals with permanent physical access authorizations are not considered visitors. Physical access controls for publicly accessible areas...

Auto-Generated Generated during job processing
PE-3 Physical Access Control is directly relevant to the scoping question because it establishes requirements for managing and monitoring staff and visitor access to on-site facilities. This control is important for compliance as it mitigates insider...
NIST AT-3 Found
Role-based Training

Organizations determine the content of training based on the assigned roles and responsibilities of individuals as well as the security and privacy requirements of organizations and the systems to whi...

Auto-Generated Generated during job processing
1. Role-based training (AT-3) ensures that staff operating on-site receive tailored instruction on physical security protocols, such as badge-based access, escorting visitors, and monitoring work areas, directly addressing the risks identified in the...
NIST CA-6
Authorization

Authorizations are official management decisions by senior officials to authorize operation of systems, authorize the use of common controls for inheritance by organizational systems, and explicitly a...

Auto-Generated Generated during job processing
CA-6 (Authorization) is relevant to the scoping question because when staff operate on-site, senior management must formally authorize the associated physical and operational risks, including those arising from insider threats and facility access. Th...
NIST PE-2
Physical Access Authorizations

Physical access authorizations apply to employees and visitors. Individuals with permanent physical access authorization credentials are not considered visitors. Authorization credentials include ID b...

Auto-Generated Generated during job processing
PE-2 Physical Access Authorizations is directly relevant to the scoping question because it governs how staff and visitors are granted access to on-site entity facilities, ensuring only authorized personnel can enter sensitive areas. This control is ...
NIST AC-3 Found
Access Enforcement

Access control policies control access between active entities or subjects (i.e., users or processes acting on behalf of users) and passive entities or objects (i.e., devices, files, records, domains)...

Auto-Generated Generated during job processing
AC-3 (Access Enforcement) is relevant to the scoping question because when staff operate on-site, it is essential to enforce access control policies that restrict both physical and logical access to systems and data. This control ensures that only au...
NIST CM-5
Access Restrictions for Change

Changes to the hardware, software, or firmware components of systems or the operational procedures related to the system can potentially have significant effects on the security of the systems or indi...

Auto-Generated Generated during job processing
CM-5 (Access Restrictions for Change) is relevant to the scoping question because when staff operate on-site, there is increased potential for unauthorized physical access to systems and the ability to initiate changes directly. This control ensures ...
NIST PM-10
Authorization Process

Authorization processes for organizational systems and environments of operation require the implementation of an organization-wide risk management process and associated security and privacy standard...

Auto-Generated Generated during job processing
1. PM-10 (Authorization Process) is relevant to the scoping question because it ensures that the risks associated with on-site staff operations—such as insider threats and physical access—are formally assessed, authorized, and continuously monitored ...
NIST PS-3 Found
Personnel Screening

Personnel screening and rescreening activities reflect applicable laws, executive orders, directives, regulations, policies, standards, guidelines, and specific criteria established for the risk desig...

Auto-Generated Generated during job processing
The PS-3 Personnel Screening control is directly relevant to the scoping question because when staff operate on-site at entity facilities, there is increased risk of insider threats and unauthorized physical access. This control ensures that individu...
NIST IA-2 Found
Identification and Authentication (Organizational Users)

Organizations can satisfy the identification and authentication requirements by complying with the requirements in HSPD 12. Organizational users include employees or individuals who organizations cons...

Auto-Generated Generated during job processing
Control IA-2 is relevant to the scoping question because when staff operate on-site at entity facilities, it is essential to uniquely identify and authenticate each individual accessing systems and resources. This control ensures that only authorized...
NIST PE-6
Monitoring Physical Access

Physical access monitoring includes publicly accessible areas within organizational facilities. Examples of physical access monitoring include the employment of guards, video surveillance equipment (i...

Auto-Generated Generated during job processing
1. This control is directly relevant to the scoping question because when staff operate on-site at entity facilities, monitoring physical access (PE-6) is essential to detect and deter unauthorized entry and suspicious activities. 2. Implementing t...
NIST MP-5
Media Transport

System media includes digital and non-digital media. Digital media includes flash drives, diskettes, magnetic tapes, external or removable hard disk drives (e.g., solid state and magnetic), compact d...

Auto-Generated Generated during job processing
1. The MP-5 Media Transport control is relevant to the scoping question because on-site staff may handle or move sensitive media within or outside entity facilities, increasing the risk of unauthorized access or loss during transport. 2. This control...
NIST AC-2 Found
Account Management

Examples of system account types include individual, shared, group, system, guest, anonymous, emergency, developer, temporary, and service. Identification of authorized system users and the specificat...

Auto-Generated Generated during job processing
1. AC-2 Account Management is relevant to the scoping question because it ensures that only authorized staff operating on-site are provisioned with appropriate system accounts and access privileges, reducing the risk of unauthorized access within ent...
NIST MA-5
Maintenance Personnel

Maintenance personnel refers to individuals who perform hardware or software maintenance on organizational systems, while PE-2 addresses physical access for individuals whose maintenance duties place ...

Auto-Generated Generated during job processing
MA-5 (Maintenance Personnel) is relevant to the scoping question because it governs how maintenance staff—who may operate on-site—are identified, authorized, and supervised within entity facilities. This control is important for compliance as it miti...
NIST PT-7
Specific Categories of Personally Identifiable Information

Organizations apply any conditions or protections that may be necessary for specific categories of personally identifiable information. These conditions may be required by laws, executive orders, dire...

Auto-Generated Generated during job processing
Control PT-7 is relevant to the scoping question because on-site staff may have direct access to facilities and systems where sensitive categories of personally identifiable information (PII) are stored or processed. This control ensures that appropr...
NIST PE-17
Alternate Work Site

Alternate work sites include government facilities or the private residences of employees. While distinct from alternative processing sites, alternate work sites can provide readily available alternat...

Auto-Generated Generated during job processing
Control PE-17 (Alternate Work Site) is relevant to the scoping question because it ensures that security and contingency measures are in place when staff operate at locations other than the primary entity facility, such as remote offices or private r...
NIST PE-18 Found
Location of System Components

Physical and environmental hazards include floods, fires, tornadoes, earthquakes, hurricanes, terrorism, vandalism, an electromagnetic pulse, electrical interference, and other forms of incoming elect...

Auto-Generated Generated during job processing
1. Control PE-18 is directly relevant to the scoping question because it requires organizations to assess and manage the physical location of system components, especially when staff operate on-site, to mitigate risks from unauthorized proximity and ...
NIST MA-6 Found
Timely Maintenance

Organizations specify the system components that result in increased risk to organizational operations and assets, individuals, other organizations, or the Nation when the functionality provided by th...

Auto-Generated Generated during job processing
1. MA-6 (Timely Maintenance) addresses the scoping question by ensuring that critical physical and technical security systems (such as badge readers, surveillance cameras, and access controls) at on-site facilities are maintained and operational, red...
NIST AC-5 Found
Separation of Duties

Separation of duties addresses the potential for abuse of authorized privileges and helps to reduce the risk of malevolent activity without collusion. Separation of duties includes dividing mission or...

Auto-Generated Generated during job processing
AC-5 (Separation of Duties) is relevant to the scoping question because when staff operate on-site, there is increased risk of unauthorized or collusive activities due to physical proximity and access. This control is important for compliance as it e...
NIST PE-20
Asset Monitoring and Tracking

Asset location technologies can help ensure that critical assets—including vehicles, equipment, and system components—remain in authorized locations. Organizations consult with the Office ...

Auto-Generated Generated during job processing
Control PE-20 (Asset Monitoring and Tracking) is relevant to the scoping question because when staff operate on-site, there is increased risk of unauthorized movement or removal of critical assets within the facility. This control ensures that assets...
NIST SC-50 Found
Software-enforced Separation and Policy Enforcement

System owners may require additional strength of mechanism to ensure domain separation and policy enforcement for specific types of threats and environments of operation.

Auto-Generated Generated during job processing
SC-50 (Software-enforced Separation and Policy Enforcement) is relevant to the scoping question because when staff operate on-site, there is increased risk of unauthorized access to sensitive systems or data, whether intentional or accidental. This c...
NIST AC-4 Found
Information Flow Enforcement

Information flow control regulates where information can travel within a system and between systems (in contrast to who is allowed to access the information) and without regard to subsequent accesses ...

Auto-Generated Generated during job processing
1. AC-4 (Information Flow Enforcement) is relevant to the scoping question because when staff operate on-site, there is increased risk of unauthorized or uncontrolled information transfer between systems or security domains within the facility. 2. Th...
NIST PS-1 Found
Policy and Procedures

Personnel security policy and procedures for the controls in the PS family that are implemented within systems and organizations. The risk management strategy is an important factor in establishing su...

Auto-Generated Generated during job processing
Control PS-1 (Policy and Procedures) is directly relevant to the scoping question because it requires the organization to formally establish and document personnel security policies and procedures that govern staff operating on-site. This control is ...
NIST PS-9 Found
Position Descriptions

Specification of security and privacy roles in individual organizational position descriptions facilitates clarity in understanding the security or privacy responsibilities associated with the roles a...

Auto-Generated Generated during job processing
Control PS-9 (Position Descriptions) is relevant to the scoping question because clearly defined security and privacy responsibilities in staff position descriptions ensure that personnel operating on-site understand and are accountable for physical ...
NIST PE-16
Delivery and Removal

Enforcing authorizations for entry and exit of system components may require restricting access to delivery areas and isolating the areas from the system and media libraries.

Auto-Generated Generated during job processing
PE-16 (Delivery and Removal) is relevant to the scoping question because when staff operate on-site, there is increased movement of system components and media within the facility, raising the risk of unauthorized delivery or removal. This control en...
NIST AT-1 Found
Policy and Procedures

Awareness and training policy and procedures address the controls in the AT family that are implemented within systems and organizations. The risk management strategy is an important factor in establi...

Auto-Generated Generated during job processing
Control AT-1 (Policy and Procedures) is relevant to the scoping question because it ensures that staff operating on-site are governed by formal awareness and training policies and procedures, which address physical security risks such as unauthorized...
NIST SC-37
Out-of-band Channels

Out-of-band channels include local, non-network accesses to systems; network paths physically separate from network paths used for operational traffic; or non-electronic paths, such as the U.S. Postal...

Auto-Generated Generated during job processing
SC-37 (Out-of-band Channels) is relevant to the scoping question because when staff operate on-site, there is increased risk of unauthorized physical access to systems and sensitive materials. This control ensures that critical transmissions—such as ...
NIST AU-16
Cross-organizational Audit Logging

When organizations use systems or services of external organizations, the audit logging capability necessitates a coordinated, cross-organization approach. For example, maintaining the identity of ind...

Auto-Generated Generated during job processing
1. AU-16 (Cross-organizational Audit Logging) is relevant to the scoping question because when entity staff operate on-site, their activities may span both your organization’s systems and facilities, requiring coordinated audit logging to track and a...
NIST PE-8
Visitor Access Records

Visitor access records include the names and organizations of individuals visiting, visitor signatures, forms of identification, dates of access, entry and departure times, purpose of visits, and the ...

Auto-Generated Generated during job processing
PE-8 (Visitor Access Records) is directly relevant to the scoping question because when staff operate on-site, there is an increased risk of unauthorized physical access and insider threats. Maintaining detailed visitor access records enables the org...
NIST AU-6 Found
Audit Record Review, Analysis, and Reporting

Audit record review, analysis, and reporting covers information security- and privacy-related logging performed by organizations, including logging that results from the monitoring of account usage, r...

Auto-Generated Generated during job processing
AU-6 (Audit Record Review, Analysis, and Reporting) is relevant to the scoping question because when staff operate on-site, there is increased risk of unauthorized physical access and insider threats. This control ensures that all physical access eve...
NIST AU-14
Session Audit

Session audits can include monitoring keystrokes, tracking websites visited, and recording information and/or file transfers. Session audit capability is implemented in addition to event logging and m...

Auto-Generated Generated during job processing
1. **How this control addresses the scoping question:** AU-14 (Session Audit) is relevant because when staff operate on-site, there is increased risk of unauthorized or inappropriate system activity that may not be visible through physical controls...
NIST PM-31
Continuous Monitoring Strategy

Continuous monitoring at the organization level facilitates ongoing awareness of the security and privacy posture across the organization to support organizational risk management decisions. The terms...

Auto-Generated Generated during job processing
1. The Continuous Monitoring Strategy (PM-31) is relevant to the scoping question because it ensures ongoing oversight of physical and insider risks associated with staff operating on-site, such as unauthorized access or tailgating. 2. This control i...
NIST PE-14
Environmental Controls

The provision of environmental controls applies primarily to organizational facilities that contain concentrations of system resources (e.g., data centers, mainframe computer rooms, and server rooms)....

Auto-Generated Generated during job processing
1. **How this control addresses the scoping question:** PE-14 (Environmental Controls) is relevant because when staff operate on-site, the physical environment must be maintained to ensure the safety and availability of critical systems and resourc...
NIST PM-12 Found
Insider Threat Program

Organizations that handle classified information are required, under Executive Order 13587 EO 13587 and the National Insider Threat Policy ODNI NITP, to establish insider threat programs. The same sta...

Auto-Generated Generated during job processing
1. The Insider Threat Program (PM-12) directly addresses the scoping question by establishing formal processes to detect and mitigate risks associated with staff operating on-site, where insider and physical security threats are heightened. 2. This c...
NIST AC-1 Found
Policy and Procedures

Access control policy and procedures address the controls in the AC family that are implemented within systems and organizations. The risk management strategy is an important factor in establishing su...

Auto-Generated Generated during job processing
AC-1 (Policy and Procedures) is relevant to the scoping question because it requires the organization to formally establish and document access control policies and procedures, including those governing physical access for on-site staff. This control...
NIST PS-5 Found
Personnel Transfer

Personnel transfer applies when reassignments or transfers of individuals are permanent or of such extended duration as to make the actions warranted. Organizations define actions appropriate for the ...

Auto-Generated Generated during job processing
1. The PS-5 Personnel Transfer control addresses the scoping question by ensuring that when staff operate on-site and are reassigned or transferred, their physical and logical access to facilities and systems is properly managed. 2. This control is i...
NIST CM-4
Impact Analyses

Organizational personnel with security or privacy responsibilities conduct impact analyses. Individuals conducting impact analyses possess the necessary skills and technical expertise to analyze the c...

Auto-Generated Generated during job processing
CM-4 (Impact Analyses) is relevant to the scoping question because it ensures that any decision to have staff operate on-site is systematically evaluated for its security and privacy implications, such as increased insider and physical security risks...
NIST SC-46
Cross Domain Policy Enforcement

For logical policy enforcement mechanisms, organizations avoid creating a logical path between interfaces to prevent the ability to bypass the policy enforcement mechanism. For physical policy enforce...

Auto-Generated Generated during job processing
SC-46 (Cross Domain Policy Enforcement) is relevant to the scoping question because when staff operate on-site, there is increased risk of unauthorized access or data transfer between security domains, both physically and logically. This control ensu...
NIST PS-8 Found
Personnel Sanctions

Organizational sanctions reflect applicable laws, executive orders, directives, regulations, policies, standards, and guidelines. Sanctions processes are described in access agreements and can be incl...

Auto-Generated Generated during job processing
1. The Personnel Sanctions (PS-8) control addresses the scoping question by ensuring that staff operating on-site are subject to organizational disciplinary measures if they violate physical security policies, such as unauthorized access or tailgatin...
NIST MP-1 Found
Policy and Procedures

Media protection policy and procedures address the controls in the MP family that are implemented within systems and organizations. The risk management strategy is an important factor in establishing ...

Auto-Generated Generated during job processing
MP-1 (Policy and Procedures) is relevant to the scoping question because when staff operate on-site, there is increased risk of unauthorized physical access to sensitive media. This control ensures that formal media protection policies and procedures...
NIST SC-48 Found
Sensor Relocation

Adversaries may take various paths and use different approaches as they move laterally through an organization (including its systems) to reach their target or as they attempt to exfiltrate informatio...

Auto-Generated Generated during job processing
1. This control addresses the scoping question by ensuring that physical and network monitoring sensors within the facility can be strategically relocated to adapt to evolving threats posed by on-site staff, thereby enhancing detection of unauthorize...
NIST SC-49
Hardware-enforced Separation and Policy Enforcement

System owners may require additional strength of mechanism and robustness to ensure domain separation and policy enforcement for specific types of threats and environments of operation. Hardware-enfor...

Auto-Generated Generated during job processing
SC-49 (Hardware-enforced Separation and Policy Enforcement) is relevant to the scoping question because when staff operate on-site, there is increased risk of unauthorized physical access and insider threats. This control ensures that critical system...
Scoping Question 2

Will the entity’s personnel require specialized clearances or certifications? Determines if staff need background checks, professional licenses, or industry certifications before starting work. Delays onboarding if certifications lapse; compliance risk if unauthorised staff perform regulated tasks. Credential-verification process Expiration-tracking of certifications Backup resource plan for lapsed clearances

70 Controls
NIST PE-3
Physical Access Control

Physical access control applies to employees and visitors. Individuals with permanent physical access authorizations are not considered visitors. Physical access controls for publicly accessible areas...

Auto-Generated Generated during job processing
PE-3 Physical Access Control is directly relevant to the scoping question because it ensures that only personnel with the required specialized clearances or certifications can access sensitive or restricted areas. This control is important for compli...
NIST AT-3 Found
Role-based Training

Organizations determine the content of training based on the assigned roles and responsibilities of individuals as well as the security and privacy requirements of organizations and the systems to whi...

Auto-Generated Generated during job processing
1. Control AT-3 (Role-based Training) directly addresses the scoping question by ensuring personnel receive training tailored to their specific roles, including any specialized clearances or certifications required for regulated tasks. 2. This contro...
NIST SA-9
External System Services

External system services are provided by an external provider, and the organization has no direct control over the implementation of the required controls or the assessment of control effectiveness. O...

Auto-Generated Generated during job processing
Control SA-9 is relevant to the scoping question because it requires organizations to ensure that external service providers meet personnel clearance and certification requirements through documented agreements and service-level expectations. This co...
NIST SA-21
Developer Screening

Developer screening is directed at external developers. Internal developer screening is addressed by PS-3. Because the system, system component, or system service may be used in critical activities es...

Auto-Generated Generated during job processing
Control SA-21 (Developer Screening) directly addresses the scoping question by requiring that external developers meet specific authorization and personnel screening criteria, such as background checks and clearances, before being allowed to work on ...
NIST CP-3
Contingency Training

Contingency training provided by organizations is linked to the assigned roles and responsibilities of organizational personnel to ensure that the appropriate content and level of detail is included i...

Auto-Generated Generated during job processing
1. CP-3 (Contingency Training) addresses the scoping question by ensuring personnel receive role-specific training, which includes verifying that staff assigned to contingency roles possess the required clearances or certifications. 2. This control i...
NIST CA-6
Authorization

Authorizations are official management decisions by senior officials to authorize operation of systems, authorize the use of common controls for inheritance by organizational systems, and explicitly a...

Auto-Generated Generated during job processing
CA-6 (Authorization) is relevant to the scoping question because it requires senior officials to formally authorize system operations, including verifying that personnel meet necessary clearances and certifications. This control is important for comp...
NIST PE-2
Physical Access Authorizations

Physical access authorizations apply to employees and visitors. Individuals with permanent physical access authorization credentials are not considered visitors. Authorization credentials include ID b...

Auto-Generated Generated during job processing
PE-2 Physical Access Authorizations is directly relevant to the scoping question because it ensures that only personnel with the required clearances or certifications are granted physical access to sensitive areas. This control is important for compl...
NIST AC-3 Found
Access Enforcement

Access control policies control access between active entities or subjects (i.e., users or processes acting on behalf of users) and passive entities or objects (i.e., devices, files, records, domains)...

Auto-Generated Generated during job processing
1. AC-3 (Access Enforcement) addresses the scoping question by ensuring that only personnel with the required clearances or certifications are granted access to sensitive systems, data, or functions, in accordance with organizational policies. 2. Thi...
NIST PM-10
Authorization Process

Authorization processes for organizational systems and environments of operation require the implementation of an organization-wide risk management process and associated security and privacy standard...

Auto-Generated Generated during job processing
PM-10 (Authorization Process) is directly relevant to the scoping question because it ensures that only personnel with the required clearances, certifications, and background checks are formally authorized to access organizational systems and perform...
NIST PS-3 Found
Personnel Screening

Personnel screening and rescreening activities reflect applicable laws, executive orders, directives, regulations, policies, standards, guidelines, and specific criteria established for the risk desig...

Auto-Generated Generated during job processing
Control PS-3 (Personnel Screening) directly addresses the scoping question by requiring organizations to conduct background checks and verify specialized clearances or certifications for personnel, ensuring only authorized and qualified staff perform...
NIST IA-2 Found
Identification and Authentication (Organizational Users)

Organizations can satisfy the identification and authentication requirements by complying with the requirements in HSPD 12. Organizational users include employees or individuals who organizations cons...

Auto-Generated Generated during job processing
1. Control IA-2 ensures that only properly identified and authenticated personnel—those with the required clearances or certifications—can access organizational systems, directly addressing the need to verify specialized credentials before granting a...
NIST PE-6
Monitoring Physical Access

Physical access monitoring includes publicly accessible areas within organizational facilities. Examples of physical access monitoring include the employment of guards, video surveillance equipment (i...

Auto-Generated Generated during job processing
PE-6 (Monitoring Physical Access) is relevant to the scoping question because it ensures that only personnel with the required specialized clearances or certifications can physically access sensitive areas. This control is important for compliance as...
NIST CP-9
System Backup

System-level information includes system state information, operating system software, middleware, application software, and licenses. User-level information includes information other than system-lev...

Auto-Generated Generated during job processing
1. **How this control addresses the scoping question:** CP-9 (System Backup) is relevant to the scoping question because it ensures that critical personnel credential and certification records are regularly backed up and protected, supporting the o...
NIST PT-2
Authority to Process Personally Identifiable Information

The processing of personally identifiable information is an operation or set of operations that the information system or organization performs with respect to personally identifiable information acro...

Auto-Generated Generated during job processing
1. Control PT-2 is relevant to the scoping question because it requires organizations to ensure that only authorized personnel with appropriate clearances or certifications process personally identifiable information (PII). 2. This control is importa...
NIST PM-23
Data Governance Body

A Data Governance Body can help ensure that the organization has coherent policies and the ability to balance the utility of data with security and privacy requirements. The Data Governance Body estab...

Auto-Generated Generated during job processing
1. The Data Governance Body (PM-23) addresses the scoping question by establishing and enforcing policies that require personnel to have appropriate clearances or certifications for handling sensitive data, ensuring only authorized staff perform regu...
NIST SA-23
Specialization

It is often necessary for a system or system component that supports mission-essential services or functions to be enhanced to maximize the trustworthiness of the resource. Sometimes this enhancement ...

Auto-Generated Generated during job processing
Control SA-23 (Specialization) is relevant to the scoping question because it ensures that systems supporting mission-essential functions are enhanced to verify and authenticate the credentials of personnel, thereby enforcing specialized clearances o...
NIST PS-7
External Personnel Security

External provider refers to organizations other than the organization operating or acquiring the system. External providers include service bureaus, contractors, and other organizations that provide s...

Auto-Generated Generated during job processing
Control PS-7 is directly relevant to the scoping question because it ensures that external personnel, such as contractors or service providers, meet the same specialized clearance or certification requirements as internal staff. This control is impor...
NIST AC-2 Found
Account Management

Examples of system account types include individual, shared, group, system, guest, anonymous, emergency, developer, temporary, and service. Identification of authorized system users and the specificat...

Auto-Generated Generated during job processing
Control AC-2 (Account Management) is directly relevant to the scoping question because it requires organizations to identify and authorize system users based on specific attributes, such as specialized clearances or certifications. This control is im...
NIST PS-2
Position Risk Designation

Position risk designations reflect Office of Personnel Management (OPM) policy and guidance. Proper position designation is the foundation of an effective and consistent suitability and personnel secu...

Auto-Generated Generated during job processing
Control PS-2 (Position Risk Designation) directly addresses the scoping question by requiring organizations to formally assess and designate the risk and sensitivity level of each position, thereby determining whether specialized clearances or certif...
NIST MA-5
Maintenance Personnel

Maintenance personnel refers to individuals who perform hardware or software maintenance on organizational systems, while PE-2 addresses physical access for individuals whose maintenance duties place ...

Auto-Generated Generated during job processing
MA-5 (Maintenance Personnel) is directly relevant to the scoping question because it requires organizations to verify that individuals performing maintenance—whether internal staff or external vendors—possess the necessary clearances or certification...
NIST PT-7
Specific Categories of Personally Identifiable Information

Organizations apply any conditions or protections that may be necessary for specific categories of personally identifiable information. These conditions may be required by laws, executive orders, dire...

Auto-Generated Generated during job processing
1. Control PT-7 is relevant to the scoping question because verifying personnel clearances or certifications often involves handling sensitive categories of personally identifiable information (PII), such as background check results or professional l...
NIST CA-7 Found
Continuous Monitoring

Continuous monitoring at the system level facilitates ongoing awareness of the system security and privacy posture to support organizational risk management decisions. The terms continuous and ongoing...

Auto-Generated Generated during job processing
1. **How this control addresses the scoping question:** CA-7 (Continuous Monitoring) ensures that the organization maintains ongoing oversight of personnel credentials, clearances, and certifications, promptly identifying lapses or expirations that...
NIST IA-7 Found
Cryptographic Module Authentication

Authentication mechanisms may be required within a cryptographic module to authenticate an operator accessing the module and to verify that the operator is authorized to assume the requested role and ...

Auto-Generated Generated during job processing
Control IA-7 (Cryptographic Module Authentication) is relevant to the scoping question because it ensures that only personnel with the required clearances or certifications can access sensitive cryptographic modules. This control is important for com...
NIST PS-4 Found
Personnel Termination

System property includes hardware authentication tokens, system administration technical manuals, keys, identification cards, and building passes. Exit interviews ensure that terminated individuals un...

Auto-Generated Generated during job processing
1. This control addresses the scoping question by ensuring that when personnel with specialized clearances or certifications leave the organization, their access and credentials are promptly revoked and accounted for. 2. This is important for complia...
NIST AC-5 Found
Separation of Duties

Separation of duties addresses the potential for abuse of authorized privileges and helps to reduce the risk of malevolent activity without collusion. Separation of duties includes dividing mission or...

Auto-Generated Generated during job processing
1. AC-5 (Separation of Duties) addresses the scoping question by ensuring that personnel with specialized clearances or certifications are assigned roles and responsibilities that prevent any single individual from having unchecked authority or the a...
NIST PT-3
Personally Identifiable Information Processing Purposes

Identifying and documenting the purpose for processing provides organizations with a basis for understanding why personally identifiable information may be processed. The term process includes every s...

Auto-Generated Generated during job processing
1. This control is relevant to the scoping question because verifying personnel clearances or certifications often involves processing personally identifiable information (PII), such as background checks and license details. 2. It is important for ...
NIST IA-11 Found
Re-authentication

In addition to the re-authentication requirements associated with device locks, organizations may require re-authentication of individuals in certain situations, including when roles, authenticators o...

Auto-Generated Generated during job processing
1. The IA-11 Re-authentication control addresses the scoping question by ensuring that personnel are re-verified when their roles, credentials, or clearances change, which is critical when specialized certifications or clearances are required for cer...
NIST CA-1 Found
Policy and Procedures

Assessment, authorization, and monitoring policy and procedures address the controls in the CA family that are implemented within systems and organizations. The risk management strategy is an importan...

Auto-Generated Generated during job processing
CA-1 (Policy and Procedures) is relevant to the scoping question because it requires the organization to establish formal policies and procedures for assessment, authorization, and monitoring—including those governing personnel clearances and certifi...
NIST AC-25 Found
Reference Monitor

A reference monitor is a set of design requirements on a reference validation mechanism that, as a key component of an operating system, enforces an access control policy over all subjects and objects...

Auto-Generated Generated during job processing
1. AC-25 (Reference Monitor) addresses the scoping question by enforcing access control policies that can restrict system access to only personnel with the required clearances or certifications. 2. This control is important for compliance because it ...
NIST IA-1 Found
Policy and Procedures

Identification and authentication policy and procedures address the controls in the IA family that are implemented within systems and organizations. The risk management strategy is an important factor...

Auto-Generated Generated during job processing
1. IA-1 (Policy and Procedures) ensures that the organization formally defines and documents processes for verifying personnel credentials, tracking certification expirations, and managing access based on specialized clearances or certifications. 2. ...
NIST PS-1 Found
Policy and Procedures

Personnel security policy and procedures for the controls in the PS family that are implemented within systems and organizations. The risk management strategy is an important factor in establishing su...

Auto-Generated Generated during job processing
Control PS-1 (Policy and Procedures) is directly relevant to the scoping question because it requires the organization to formally establish and document personnel security policies and procedures, including those governing specialized clearances and...
NIST PM-11 Found
Mission and Business Process Definition

Protection needs are technology-independent capabilities that are required to counter threats to organizations, individuals, systems, and the Nation through the compromise of information (i.e., loss o...

Auto-Generated Generated during job processing
1. PM-11 requires organizations to define mission and business processes, including the protection needs and regulatory requirements associated with those processes. 2. This control is important for compliance because it ensures that personnel qual...
NIST CP-7
Alternate Processing Site

Alternate processing sites are geographically distinct from primary processing sites and provide processing capability if the primary processing site is not available. The alternate processing capabil...

Auto-Generated Generated during job processing
1. Control CP-7 (Alternate Processing Site) addresses the scoping question by requiring that personnel assigned to alternate sites meet the same clearance or certification requirements as those at the primary site, ensuring only authorized and qualif...
NIST RA-3 Found
Risk Assessment

Risk assessments consider threats, vulnerabilities, likelihood, and impact to organizational operations and assets, individuals, other organizations, and the Nation. Risk assessments also consider ris...

Auto-Generated Generated during job processing
1. **How this control addresses the scoping question:** RA-3 (Risk Assessment) is relevant because it requires the organization to identify and evaluate risks associated with personnel who may need specialized clearances or certifications, includin...
NIST PL-4 Found
Rules of Behavior

Rules of behavior represent a type of access agreement for organizational users. Other types of access agreements include nondisclosure agreements, conflict-of-interest agreements, and acceptable use ...

Auto-Generated Generated during job processing
1. PL-4 (Rules of Behavior) addresses the scoping question by requiring personnel to formally acknowledge and adhere to documented expectations, including the need for specialized clearances or certifications relevant to their roles. 2. This control ...
NIST PS-9 Found
Position Descriptions

Specification of security and privacy roles in individual organizational position descriptions facilitates clarity in understanding the security or privacy responsibilities associated with the roles a...

Auto-Generated Generated during job processing
Control PS-9 (Position Descriptions) is relevant to the scoping question because it ensures that security and privacy responsibilities—including requirements for specialized clearances or certifications—are clearly defined in job descriptions. This c...
NIST SR-4
Provenance

Every system and system component has a point of origin and may be changed throughout its existence. Provenance is the chronology of the origin, development, ownership, location, and changes to a syst...

Auto-Generated Generated during job processing
Control SR-4 (Provenance) is relevant to the scoping question because it requires organizations to document and monitor the origin, ownership, and changes related to systems, components, and associated personnel. This control is important for complia...
NIST PE-16
Delivery and Removal

Enforcing authorizations for entry and exit of system components may require restricting access to delivery areas and isolating the areas from the system and media libraries.

Auto-Generated Generated during job processing
1. PE-16 (Delivery and Removal) addresses the scoping question by ensuring that only authorized personnel—those with required clearances or certifications—can access areas where system components are delivered or removed, thereby enforcing credential...
NIST CA-2
Control Assessments

Organizations ensure that control assessors possess the required skills and technical expertise to develop effective assessment plans and to conduct assessments of system-specific, hybrid, common, and...

Auto-Generated Generated during job processing
1. Control CA-2 ensures that personnel conducting control assessments possess the necessary skills, expertise, and certifications, directly addressing the scoping question regarding specialized clearances or certifications required for staff. 2. This...
NIST AT-1 Found
Policy and Procedures

Awareness and training policy and procedures address the controls in the AT family that are implemented within systems and organizations. The risk management strategy is an important factor in establi...

Auto-Generated Generated during job processing
Control AT-1 (Policy and Procedures) is directly relevant to the scoping question because it requires the organization to formally document and implement policies and procedures for verifying personnel credentials, tracking certification expirations,...
NIST IA-8 Found
Identification and Authentication (Non-organizational Users)

Non-organizational users include system users other than organizational users explicitly covered by IA-2. Non-organizational users are uniquely identified and authenticated for accesses other than tho...

Auto-Generated Generated during job processing
1. Control IA-8 is relevant to the scoping question because it requires the unique identification and authentication of non-organizational users, ensuring that only individuals with the appropriate clearances or certifications can access sensitive sy...
NIST AC-14
Permitted Actions Without Identification or Authentication

Specific user actions may be permitted without identification or authentication if organizations determine that identification and authentication are not required for the specified user actions. Organ...

Auto-Generated Generated during job processing
AC-14 is relevant to the scoping question because it defines which actions, if any, can be performed by personnel without identification or authentication, directly impacting whether specialized clearances or certifications are required before access...
NIST IA-12 Found
Identity Proofing

Identity proofing is the process of collecting, validating, and verifying a user’s identity information for the purposes of establishing credentials for accessing a system. Identity proofing is ...

Auto-Generated Generated during job processing
1. Control IA-12 (Identity Proofing) addresses the scoping question by ensuring that personnel identities are thoroughly validated before granting access, which is essential when specialized clearances or certifications are required. 2. This contro...
NIST PE-8
Visitor Access Records

Visitor access records include the names and organizations of individuals visiting, visitor signatures, forms of identification, dates of access, entry and departure times, purpose of visits, and the ...

Auto-Generated Generated during job processing
PE-8 Visitor Access Records is relevant to the scoping question because it ensures that only authorized individuals—whose credentials, clearances, or certifications have been verified—are permitted access to sensitive areas. This control is important...
NIST IA-5 Found
Authenticator Management

Authenticators include passwords, cryptographic devices, biometrics, certificates, one-time password devices, and ID badges. Device authenticators include certificates and passwords. Initial authentic...

Auto-Generated Generated during job processing
1. Control IA-5 (Authenticator Management) addresses the scoping question by ensuring that only personnel with the required clearances or certifications are issued authenticators (such as ID badges or access credentials), and that these authenticator...
NIST PM-31
Continuous Monitoring Strategy

Continuous monitoring at the organization level facilitates ongoing awareness of the security and privacy posture across the organization to support organizational risk management decisions. The terms...

Auto-Generated Generated during job processing
1. PM-31 (Continuous Monitoring Strategy) addresses the scoping question by ensuring that personnel clearances, certifications, and related requirements are regularly tracked and assessed, enabling timely identification of lapses or expirations. 2. T...
NIST AT-4
Training Records

Documentation for specialized training may be maintained by individual supervisors at the discretion of the organization. The National Archives and Records Administration provides guidance on records ...

Auto-Generated Generated during job processing
Control AT-4 (Training Records) is relevant to the scoping question because it ensures that documentation of specialized training, certifications, and clearances is properly maintained and accessible. This control is important for compliance as it pr...
NIST RA-1 Found
Policy and Procedures

Risk assessment policy and procedures address the controls in the RA family that are implemented within systems and organizations. The risk management strategy is an important factor in establishing s...

Auto-Generated Generated during job processing
RA-1 (Policy and Procedures) is relevant to the scoping question because it ensures the organization formally defines and documents processes for assessing risks related to personnel clearances and certifications. This control is important for compli...
NIST CP-1 Found
Policy and Procedures

Contingency planning policy and procedures address the controls in the CP family that are implemented within systems and organizations. The risk management strategy is an important factor in establish...

Auto-Generated Generated during job processing
Control CP-1 (Policy and Procedures) is relevant to the scoping question because it requires the organization to formally establish and document policies and procedures for contingency planning, including those related to personnel clearances and cer...
NIST SA-3 Found
System Development Life Cycle

A system development life cycle process provides the foundation for the successful development, implementation, and operation of organizational systems. The integration of security and privacy conside...

Auto-Generated Generated during job processing
1. **How this control addresses the scoping question:** SA-3 requires that only qualified personnel with appropriate expertise and credentials are involved in system development life cycle (SDLC) activities, directly supporting the need to verify s...
NIST PM-12 Found
Insider Threat Program

Organizations that handle classified information are required, under Executive Order 13587 EO 13587 and the National Insider Threat Policy ODNI NITP, to establish insider threat programs. The same sta...

Auto-Generated Generated during job processing
1. The Insider Threat Program (PM-12) addresses the scoping question by requiring organizations to monitor and manage personnel with specialized clearances or certifications, ensuring only authorized and properly vetted individuals have access to sen...
NIST PT-5
Privacy Notice

Privacy notices help inform individuals about how their personally identifiable information is being processed by the system or organization. Organizations use privacy notices to inform individuals ab...

Auto-Generated Generated during job processing
1. The PT-5 Privacy Notice control addresses the scoping question by ensuring that personnel are informed about how their personally identifiable information—such as background checks, certifications, and clearances—will be collected, processed, and ...
NIST PM-21
Accounting of Disclosures

The purpose of accounting of disclosures is to allow individuals to learn to whom their personally identifiable information has been disclosed, to provide a basis for subsequently advising recipients ...

Auto-Generated Generated during job processing
1. The PM-21 Accounting of Disclosures control addresses the scoping question by ensuring that any personnel information related to specialized clearances or certifications—such as background checks or professional licenses—is tracked and documented ...
NIST AC-1 Found
Policy and Procedures

Access control policy and procedures address the controls in the AC family that are implemented within systems and organizations. The risk management strategy is an important factor in establishing su...

Auto-Generated Generated during job processing
AC-1 (Policy and Procedures) is directly relevant to the scoping question because it requires the organization to formally define and document access control policies and procedures, including requirements for personnel clearances and certifications....
NIST SR-5
Acquisition Strategies, Tools, and Methods

The use of the acquisition process provides an important vehicle to protect the supply chain. There are many useful tools and techniques available, including obscuring the end use of a system or syste...

Auto-Generated Generated during job processing
SR-5 is relevant to the scoping question because it ensures that acquisition processes include requirements for personnel clearances and certifications, helping verify that only authorized and qualified staff are engaged in supply chain activities. T...
NIST PL-10
Baseline Selection

Control baselines are predefined sets of controls specifically assembled to address the protection needs of a group, organization, or community of interest. Controls are chosen for baselines to either...

Auto-Generated Generated during job processing
Control PL-10 (Baseline Selection) is relevant to the scoping question because it ensures that the organization selects a set of security controls—including those related to personnel clearances and certifications—based on applicable laws, regulation...
NIST PS-5 Found
Personnel Transfer

Personnel transfer applies when reassignments or transfers of individuals are permanent or of such extended duration as to make the actions warranted. Organizations define actions appropriate for the ...

Auto-Generated Generated during job processing
The PS-5 Personnel Transfer control is relevant to the scoping question because it ensures that when staff are reassigned or transferred, their access rights, credentials, and certifications are reviewed and updated according to their new roles. This...
NIST SA-1 Found
Policy and Procedures

System and services acquisition policy and procedures address the controls in the SA family that are implemented within systems and organizations. The risk management strategy is an important factor i...

Auto-Generated Generated during job processing
1. Control SA-1 ensures that the organization establishes formal policies and procedures for system and services acquisition, which include requirements for personnel clearances and certifications. 2. This control is important for compliance because ...
NIST CM-4
Impact Analyses

Organizational personnel with security or privacy responsibilities conduct impact analyses. Individuals conducting impact analyses possess the necessary skills and technical expertise to analyze the c...

Auto-Generated Generated during job processing
CM-4 (Impact Analyses) is relevant to the scoping question because it ensures that personnel conducting impact analyses possess the necessary clearances, certifications, and expertise required for evaluating security and privacy risks associated with...
NIST SI-18
Personally Identifiable Information Quality Operations

Personally identifiable information quality operations include the steps that organizations take to confirm the accuracy and relevance of personally identifiable information throughout the information...

Auto-Generated Generated during job processing
1. SI-18 addresses the scoping question by ensuring that the personally identifiable information (PII) used to verify personnel clearances, certifications, and licenses is accurate and up-to-date throughout its lifecycle. 2. This control is important...
NIST PM-25
Minimization of Personally Identifiable Information Used in Testing, Training, and Research

The use of personally identifiable information in testing, research, and training increases the risk of unauthorized disclosure or misuse of such information. Organizations consult with the senior age...

Auto-Generated Generated during job processing
1. This control addresses the scoping question by ensuring that, when verifying personnel clearances or certifications, any personally identifiable information (PII) used in related testing, training, or research is minimized and protected. 2. It is ...
NIST SI-1
Policy and Procedures

System and information integrity policy and procedures address the controls in the SI family that are implemented within systems and organizations. The risk management strategy is an important factor ...

Auto-Generated Generated during job processing
1. **How this control addresses the scoping question:** SI-1 requires the organization to establish policies and procedures for system and information integrity, which includes defining requirements for personnel clearances, certifications, and cre...
NIST AU-1
Policy and Procedures

Audit and accountability policy and procedures address the controls in the AU family that are implemented within systems and organizations. The risk management strategy is an important factor in estab...

Auto-Generated Generated during job processing
1. Control AU-1 ensures that the organization establishes formal policies and procedures for audit and accountability, which include requirements for verifying personnel credentials, tracking certification expirations, and managing access based on sp...
NIST SI-6
Security and Privacy Function Verification

Transitional states for systems include system startup, restart, shutdown, and abort. System notifications include hardware indicator lights, electronic alerts to system administrators, and messages t...

Auto-Generated Generated during job processing
1. SI-6 Security and Privacy Function Verification ensures that systems consistently verify and notify administrators about the operational status of security and privacy functions, including those related to personnel credentialing and access contro...
NIST PT-1 Found
Policy and Procedures

Personally identifiable information processing and transparency policy and procedures address the controls in the PT family that are implemented within systems and organizations. The risk management s...

Auto-Generated Generated during job processing
Control PT-1 (Policy and Procedures) is relevant to the scoping question because it requires the organization to formally document and implement policies and procedures for processing personally identifiable information, including requirements for pe...
NIST PM-13
Security and Privacy Workforce

Security and privacy workforce development and improvement programs include defining the knowledge, skills, and abilities needed to perform security and privacy duties and tasks; developing role-based...

Auto-Generated Generated during job processing
Control PM-13 is directly relevant to the scoping question because it requires organizations to define and verify the qualifications, clearances, and certifications needed for personnel in security and privacy roles. This control is important for com...
NIST MA-1 Found
Policy and Procedures

Maintenance policy and procedures address the controls in the MA family that are implemented within systems and organizations. The risk management strategy is an important factor in establishing such ...

Auto-Generated Generated during job processing
MA-1 (Policy and Procedures) is relevant to the scoping question because it ensures that the organization establishes formal policies and procedures for verifying personnel credentials, tracking certification expirations, and managing backup resource...
NIST AT-2 Found
Literacy Training and Awareness

Organizations provide basic and advanced levels of literacy training to system users, including measures to test the knowledge level of users. Organizations determine the content of literacy training ...

Auto-Generated Generated during job processing
1. AT-2 (Literacy Training and Awareness) addresses the scoping question by ensuring that personnel receive targeted training based on their roles, including the need for specialized clearances or certifications, and understand the importance of main...
NIST PS-8 Found
Personnel Sanctions

Organizational sanctions reflect applicable laws, executive orders, directives, regulations, policies, standards, and guidelines. Sanctions processes are described in access agreements and can be incl...

Auto-Generated Generated during job processing
Control PS-8 (Personnel Sanctions) is relevant to the scoping question because it ensures that personnel who fail to obtain or maintain required clearances or certifications are subject to appropriate organizational sanctions. This control is importa...
NIST PE-1 Found
Policy and Procedures

Physical and environmental protection policy and procedures address the controls in the PE family that are implemented within systems and organizations. The risk management strategy is an important fa...

Auto-Generated Generated during job processing
Control PE-1 (Policy and Procedures) is relevant to the scoping question because it ensures that the organization formally documents and enforces requirements for personnel clearances, certifications, and credential verification processes. This contr...
Scoping Question 3

Will the entity have physical access to the entity’s managed devices (e.g., laptops, smartphones, tablets)? Determines if the entity’s personnel will handle or use corporate-owned endpoints, which may store sensitive data. Direct device access can lead to data leakage, malware introduction, or unauthorised configuration changes. Device inventory and tracking Endpoint security policies (e.g., MDM enforcement) Access logging and tamper-evident seals

52 Controls
NIST PE-3
Physical Access Control

Physical access control applies to employees and visitors. Individuals with permanent physical access authorizations are not considered visitors. Physical access controls for publicly accessible areas...

Auto-Generated Generated during job processing
PE-3 Physical Access Control is directly relevant to the scoping question because it establishes safeguards to restrict and monitor who can physically access managed devices such as laptops, smartphones, and tablets. This control is important for com...
NIST PE-2
Physical Access Authorizations

Physical access authorizations apply to employees and visitors. Individuals with permanent physical access authorization credentials are not considered visitors. Authorization credentials include ID b...

Auto-Generated Generated during job processing
PE-2 (Physical Access Authorizations) is directly relevant to the scoping question because it governs who is permitted to physically access managed devices, such as laptops and smartphones, within the organization’s facilities. This control is import...
NIST AC-3 Found
Access Enforcement

Access control policies control access between active entities or subjects (i.e., users or processes acting on behalf of users) and passive entities or objects (i.e., devices, files, records, domains)...

Auto-Generated Generated during job processing
AC-3 (Access Enforcement) is relevant to the scoping question because it ensures that only authorized personnel can access managed devices, thereby reducing the risk of unauthorized data access, configuration changes, or malware introduction. This co...
NIST CM-5
Access Restrictions for Change

Changes to the hardware, software, or firmware components of systems or the operational procedures related to the system can potentially have significant effects on the security of the systems or indi...

Auto-Generated Generated during job processing
CM-5 (Access Restrictions for Change) is relevant to the scoping question because it ensures that only authorized personnel can make changes to managed devices’ hardware, software, or firmware, thereby reducing the risk of unauthorized configuration ...
NIST PM-10
Authorization Process

Authorization processes for organizational systems and environments of operation require the implementation of an organization-wide risk management process and associated security and privacy standard...

Auto-Generated Generated during job processing
1. The PM-10 Authorization Process control ensures that physical access to managed devices is formally assessed and approved through an organization-wide risk management process, addressing whether personnel are permitted to handle corporate-owned en...
NIST SC-42
Sensor Capability and Data

Sensor capability and data applies to types of systems or system components characterized as mobile devices, such as cellular telephones, smart phones, and tablets. Mobile devices often include sensor...

Auto-Generated Generated during job processing
SC-42 is relevant to the scoping question because it addresses the risks associated with physical access to managed mobile devices that contain embedded sensors (e.g., cameras, microphones, GPS). This control is important for compliance as it ensures...
NIST IA-2 Found
Identification and Authentication (Organizational Users)

Organizations can satisfy the identification and authentication requirements by complying with the requirements in HSPD 12. Organizational users include employees or individuals who organizations cons...

Auto-Generated Generated during job processing
Control IA-2 is relevant to the scoping question because it ensures that only authorized and uniquely identified personnel can access managed devices, whether physically or through local connections. This control is important for compliance as it mit...
NIST PE-6
Monitoring Physical Access

Physical access monitoring includes publicly accessible areas within organizational facilities. Examples of physical access monitoring include the employment of guards, video surveillance equipment (i...

Auto-Generated Generated during job processing
1. **How this control addresses the scoping question:** PE-6 (Monitoring Physical Access) is directly relevant because it ensures that any physical access to managed devices—such as laptops, smartphones, or tablets—is monitored and logged, helping ...
NIST CP-9
System Backup

System-level information includes system state information, operating system software, middleware, application software, and licenses. User-level information includes information other than system-lev...

Auto-Generated Generated during job processing
Control CP-9 (System Backup) is relevant to the scoping question because physical access to managed devices increases the risk of data loss or corruption, making reliable system backups essential for recovery and continuity. This control is important...
NIST PT-2
Authority to Process Personally Identifiable Information

The processing of personally identifiable information is an operation or set of operations that the information system or organization performs with respect to personally identifiable information acro...

Auto-Generated Generated during job processing
Control PT-2 is relevant to the scoping question because physical access to managed devices increases the likelihood that personnel will process personally identifiable information (PII) directly on those endpoints. This control ensures that only aut...
NIST SC-28
Protection of Information at Rest

Information at rest refers to the state of information when it is not in process or in transit and is located on system components. Such components include internal or external hard disk drives, stora...

Auto-Generated Generated during job processing
SC-28 (Protection of Information at Rest) is directly relevant to the scoping question because physical access to managed devices increases the risk of unauthorized access to sensitive data stored on those endpoints. This control ensures that data re...
NIST PM-23
Data Governance Body

A Data Governance Body can help ensure that the organization has coherent policies and the ability to balance the utility of data with security and privacy requirements. The Data Governance Body estab...

Auto-Generated Generated during job processing
The PM-23 Data Governance Body control is relevant to the scoping question because it ensures that organizational policies and procedures are established for managing sensitive data on managed devices, including those physically accessed by personnel...
NIST MP-5
Media Transport

System media includes digital and non-digital media. Digital media includes flash drives, diskettes, magnetic tapes, external or removable hard disk drives (e.g., solid state and magnetic), compact d...

Auto-Generated Generated during job processing
1. **How this control addresses the scoping question:** MP-5 (Media Transport) is relevant because if personnel have physical access to managed devices, there is a risk that digital media (e.g., removable drives, external hard disks) could be physi...
NIST PS-7
External Personnel Security

External provider refers to organizations other than the organization operating or acquiring the system. External providers include service bureaus, contractors, and other organizations that provide s...

Auto-Generated Generated during job processing
Control PS-7 (External Personnel Security) is relevant to the scoping question because it ensures that external personnel—such as contractors or service providers—who may have physical access to managed devices are subject to appropriate personnel se...
NIST AC-2 Found
Account Management

Examples of system account types include individual, shared, group, system, guest, anonymous, emergency, developer, temporary, and service. Identification of authorized system users and the specificat...

Auto-Generated Generated during job processing
AC-2 (Account Management) is relevant to the scoping question because it ensures that only authorized personnel have user accounts and appropriate access privileges on managed devices, which may be physically accessed by the entity. This control is i...
NIST MP-7 Found
Media Use

System media includes both digital and non-digital media. Digital media includes diskettes, magnetic tapes, flash drives, compact discs, digital versatile discs, and removable hard disk drives. Non-di...

Auto-Generated Generated during job processing
MP-7 (Media Use) is relevant to the scoping question because it governs how personnel can use removable media on managed devices to prevent unauthorized data transfer or introduction of malware. This control is important for compliance as it reduces ...
NIST PT-7
Specific Categories of Personally Identifiable Information

Organizations apply any conditions or protections that may be necessary for specific categories of personally identifiable information. These conditions may be required by laws, executive orders, dire...

Auto-Generated Generated during job processing
Control PT-7 is relevant to the scoping question because physical access to managed devices increases the risk of unauthorized exposure or misuse of sensitive categories of personally identifiable information (PII) stored on those endpoints. This con...
NIST IA-3
Device Identification and Authentication

Devices that require unique device-to-device identification and authentication are defined by type, device, or a combination of type and device. Organization-defined device types include devices that ...

Auto-Generated Generated during job processing
Control IA-3 (Device Identification and Authentication) is directly relevant to the scoping question because it ensures that only authorized devices—whether managed by the entity or not—can access organizational networks and resources. This control i...
NIST PE-18 Found
Location of System Components

Physical and environmental hazards include floods, fires, tornadoes, earthquakes, hurricanes, terrorism, vandalism, an electromagnetic pulse, electrical interference, and other forms of incoming elect...

Auto-Generated Generated during job processing
PE-18 (Location of System Components) is relevant to the scoping question because it ensures that managed devices are placed in secure physical locations, reducing the risk of unauthorized physical access or proximity-based threats. This control is i...
NIST CA-9
Internal System Connections

Internal system connections are connections between organizational systems and separate constituent system components (i.e., connections between components that are part of the same system) including ...

Auto-Generated Generated during job processing
1. **How this control addresses the scoping question:** CA-9 (Internal System Connections) is relevant because it governs how managed devices—such as laptops, smartphones, and tablets—connect internally within the organization’s systems, ensuring t...
NIST AC-19 Found
Access Control for Mobile Devices

A mobile device is a computing device that has a small form factor such that it can easily be carried by a single individual; is designed to operate without a physical connection; possesses local, non...

Auto-Generated Generated during job processing
AC-19 (Access Control for Mobile Devices) is directly relevant to the scoping question because it establishes requirements for managing and restricting physical access to mobile devices that may store sensitive data. This control is important for com...
NIST PS-4 Found
Personnel Termination

System property includes hardware authentication tokens, system administration technical manuals, keys, identification cards, and building passes. Exit interviews ensure that terminated individuals un...

Auto-Generated Generated during job processing
The PS-4 Personnel Termination control is relevant to the scoping question because it ensures that, when personnel with physical access to managed devices (such as laptops or smartphones) leave the organization, all system-related property—including ...
NIST IA-11 Found
Re-authentication

In addition to the re-authentication requirements associated with device locks, organizations may require re-authentication of individuals in certain situations, including when roles, authenticators o...

Auto-Generated Generated during job processing
1. The IA-11 Re-authentication control is relevant to the scoping question because it ensures that only authorized personnel can access managed devices, especially after certain events or time intervals, thereby reducing the risk of unauthorized acce...
NIST AC-16
Security and Privacy Attributes

Information is represented internally within systems using abstractions known as data structures. Internal data structures can represent different types of entities, both active and passive. Active en...

Auto-Generated Generated during job processing
**Justification:** 1. AC-16 (Security and Privacy Attributes) addresses the scoping question by ensuring that managed devices and the data they store are properly labeled and assigned security attributes, which govern access and handling based on se...
NIST PE-20
Asset Monitoring and Tracking

Asset location technologies can help ensure that critical assets—including vehicles, equipment, and system components—remain in authorized locations. Organizations consult with the Office ...

Auto-Generated Generated during job processing
PE-20 (Asset Monitoring and Tracking) is relevant to the scoping question because it ensures that managed devices, such as laptops and smartphones, remain in authorized locations and are accounted for when personnel have physical access. This control...
NIST PE-5
Access Control for Output Devices

Controlling physical access to output devices includes placing output devices in locked rooms or other secured areas with keypad or card reader access controls and allowing access to authorized indivi...

Auto-Generated Generated during job processing
PE-5 (Access Control for Output Devices) is relevant to the scoping question because it ensures that only authorized personnel can physically access output devices connected to managed endpoints, such as monitors and printers, which may display or pr...
NIST AC-25 Found
Reference Monitor

A reference monitor is a set of design requirements on a reference validation mechanism that, as a key component of an operating system, enforces an access control policy over all subjects and objects...

Auto-Generated Generated during job processing
The AC-25 Reference Monitor control is relevant to the scoping question because it ensures that access to managed devices and the sensitive data they store is strictly enforced through a tamper-proof, always-invoked mechanism. This control is importa...
NIST AC-4 Found
Information Flow Enforcement

Information flow control regulates where information can travel within a system and between systems (in contrast to who is allowed to access the information) and without regard to subsequent accesses ...

Auto-Generated Generated during job processing
1. AC-4 (Information Flow Enforcement) is relevant to the scoping question because if personnel have physical access to managed devices, there is a risk that sensitive data could be transferred or exfiltrated through unauthorized channels or connecti...
NIST SI-7 Found
Software, Firmware, and Information Integrity

Unauthorized changes to software, firmware, and information can occur due to errors or malicious activity. Software includes operating systems (with key internal components, such as kernels or drivers...

Auto-Generated Generated during job processing
Control SI-7 is relevant to the scoping question because it ensures the integrity of software, firmware, and information on managed devices to which personnel have physical access. This control is important for compliance as it helps prevent and dete...
NIST PE-22
Component Marking

Hardware components that may require marking include input and output devices. Input devices include desktop and notebook computers, keyboards, tablets, and smart phones. Output devices include printe...

Auto-Generated Generated during job processing
Control PE-22 (Component Marking) is relevant to the scoping question because it ensures that physical devices, such as laptops, smartphones, and tablets, are clearly marked to indicate their classification or sensitivity level. This control is impor...
NIST PE-16
Delivery and Removal

Enforcing authorizations for entry and exit of system components may require restricting access to delivery areas and isolating the areas from the system and media libraries.

Auto-Generated Generated during job processing
PE-16 (Delivery and Removal) is relevant to the scoping question because it ensures that only authorized personnel can deliver or remove managed devices, thereby controlling physical access to endpoints that may store sensitive data. This control is ...
NIST AC-21 Found
Information Sharing

Information sharing applies to information that may be restricted in some manner based on some formal or administrative determination. Examples of such information include, contract-sensitive informat...

Auto-Generated Generated during job processing
AC-21 (Information Sharing) is relevant to the scoping question because physical access to managed devices increases the risk of unauthorized information sharing or exposure of sensitive data stored on those endpoints. This control is important for c...
NIST IA-4 Found
Identifier Management

Common device identifiers include Media Access Control (MAC) addresses, Internet Protocol (IP) addresses, or device-unique token identifiers. The management of individual identifiers is not applicable...

Auto-Generated Generated during job processing
1. IA-4 (Identifier Management) addresses the scoping question by ensuring that each managed device with physical access is assigned a unique identifier, such as a MAC address or device token, which enables accurate tracking and accountability of dev...
NIST AC-11
Device Lock

Device locks are temporary actions taken to prevent logical access to organizational systems when users stop work and move away from the immediate vicinity of those systems but do not want to log out ...

Auto-Generated Generated during job processing
The AC-11 Device Lock control is relevant to the scoping question because it mitigates risks associated with personnel having physical access to managed devices. By requiring devices to automatically lock when unattended, this control helps prevent u...
NIST AC-14
Permitted Actions Without Identification or Authentication

Specific user actions may be permitted without identification or authentication if organizations determine that identification and authentication are not required for the specified user actions. Organ...

Auto-Generated Generated during job processing
AC-14 (Permitted Actions Without Identification or Authentication) is relevant to the scoping question because it governs which actions can be performed on managed devices without first verifying a user’s identity. This control is important for compl...
NIST SC-37
Out-of-band Channels

Out-of-band channels include local, non-network accesses to systems; network paths physically separate from network paths used for operational traffic; or non-electronic paths, such as the U.S. Postal...

Auto-Generated Generated during job processing
SC-37 (Out-of-band Channels) is relevant to the scoping question because physical access to managed devices enables local, non-network interactions—such as direct configuration changes or credential delivery—that are considered out-of-band channels. ...
NIST CM-13
Data Action Mapping

Data actions are system operations that process personally identifiable information. The processing of such information encompasses the full information life cycle, which includes collection, generati...

Auto-Generated Generated during job processing
CM-13 (Data Action Mapping) is relevant to the scoping question because it requires organizations to identify and document how personally identifiable information (PII) is processed on managed devices, including who has physical access and what actio...
NIST AU-6 Found
Audit Record Review, Analysis, and Reporting

Audit record review, analysis, and reporting covers information security- and privacy-related logging performed by organizations, including logging that results from the monitoring of account usage, r...

Auto-Generated Generated during job processing
Control AU-6 is relevant to the scoping question because it ensures that all physical access to managed devices is logged, reviewed, and analyzed for potential security incidents or unauthorized activities. This control is important for compliance as...
NIST AU-14
Session Audit

Session audits can include monitoring keystrokes, tracking websites visited, and recording information and/or file transfers. Session audit capability is implemented in addition to event logging and m...

Auto-Generated Generated during job processing
1. AU-14 Session Audit is relevant to the scoping question because it enables detailed monitoring of user activities on managed devices, such as keystrokes and file transfers, when personnel have physical access. 2. This control is important for comp...
NIST AC-20 Found
Use of External Systems

External systems are systems that are used by but not part of organizational systems, and for which the organization has no direct control over the implementation of required controls or the assessmen...

Auto-Generated Generated during job processing
AC-20 (Use of External Systems) is directly relevant to the scoping question because it governs whether personnel are permitted to access organizational data or systems using devices not owned or managed by the entity, such as personally owned laptop...
NIST AC-17
Remote Access

Remote access is access to organizational systems (or processes acting on behalf of users) that communicate through external networks such as the Internet. Types of remote access include dial-up, broa...

Auto-Generated Generated during job processing
AC-17 (Remote Access) is relevant to the scoping question because it governs how personnel can access managed devices when they are not physically present, ensuring that remote connections are secure and authorized. This control is important for comp...
NIST AC-1 Found
Policy and Procedures

Access control policy and procedures address the controls in the AC family that are implemented within systems and organizations. The risk management strategy is an important factor in establishing su...

Auto-Generated Generated during job processing
Control AC-1 (Policy and Procedures) is relevant to the scoping question because it requires the organization to formally define and document how physical access to managed devices is governed, including who is authorized to handle or use corporate-o...
NIST AC-22 Found
Publicly Accessible Content

In accordance with applicable laws, executive orders, directives, policies, regulations, standards, and guidelines, the public is not authorized to have access to nonpublic information, including info...

Auto-Generated Generated during job processing
AC-22 (Publicly Accessible Content) is relevant to the scoping question because physical access to managed devices increases the risk that personnel could inadvertently or intentionally make nonpublic information publicly accessible, such as posting ...
NIST SC-34
Non-modifiable Executable Programs

The operating environment for a system contains the code that hosts applications, including operating systems, executives, or virtual machine monitors (i.e., hypervisors). It can also include certain ...

Auto-Generated Generated during job processing
SC-34 (Non-modifiable Executable Programs) is relevant to the scoping question because physical access to managed devices increases the risk of unauthorized modification or replacement of critical system software. By enforcing non-modifiable executab...
NIST SC-4
Information in Shared System Resources

Preventing unauthorized and unintended information transfer via shared system resources stops information produced by the actions of prior users or roles (or the actions of processes acting on behalf ...

Auto-Generated Generated during job processing
SC-4 is relevant to the scoping question because physical access to managed devices increases the risk that sensitive information may be unintentionally transferred or exposed through shared system resources, such as memory or storage used by multipl...
NIST SC-43 Found
Usage Restrictions

Usage restrictions apply to all system components including but not limited to mobile code, mobile devices, wireless access, and wired and wireless peripheral components (e.g., copiers, printers, scan...

Auto-Generated Generated during job processing
SC-43 (Usage Restrictions) is directly relevant to the scoping question because it mandates controls over how managed devices are used, ensuring that only authorized personnel can access and operate corporate-owned endpoints. This is important for co...
NIST SI-8 Found
Spam Protection

System entry and exit points include firewalls, remote-access servers, electronic mail servers, web servers, proxy servers, workstations, notebook computers, and mobile devices. Spam can be transporte...

Auto-Generated Generated during job processing
1. SI-8 (Spam Protection) is relevant to the scoping question because managed devices with physical access are potential entry points for spam, which can introduce malware or phishing attempts if not properly protected. 2. This control is important f...
NIST PM-25
Minimization of Personally Identifiable Information Used in Testing, Training, and Research

The use of personally identifiable information in testing, research, and training increases the risk of unauthorized disclosure or misuse of such information. Organizations consult with the senior age...

Auto-Generated Generated during job processing
Control PM-25 is relevant to the scoping question because if personnel have physical access to managed devices, there is an increased risk that personally identifiable information (PII) used in testing, training, or research could be exposed or misha...
NIST MP-4 Found
Media Storage

System media includes digital and non-digital media. Digital media includes flash drives, diskettes, magnetic tapes, external or removable hard disk drives (e.g., solid state, magnetic), compact discs...

Auto-Generated Generated during job processing
MP-4 (Media Storage) is relevant to the scoping question because it ensures that any physical access to managed devices and their associated media is strictly controlled and accounted for. This control is important for compliance as it mitigates risk...
NIST AU-9
Protection of Audit Information

Audit information includes all information needed to successfully audit system activity, such as audit records, audit log settings, audit reports, and personally identifiable information. Audit loggin...

Auto-Generated Generated during job processing
AU-9 (Protection of Audit Information) is relevant to the scoping question because physical access to managed devices increases the risk that audit logs and audit tools stored on those devices could be tampered with or deleted by unauthorized personn...
NIST SC-16 Found
Transmission of Security and Privacy Attributes

Security and privacy attributes can be explicitly or implicitly associated with the information contained in organizational systems or system components. Attributes are abstractions that represent the...

Auto-Generated Generated during job processing
SC-16 is relevant to the scoping question because it ensures that security and privacy attributes are properly associated with data on managed devices, which may be physically accessed by personnel. This control is important for compliance as it enfo...
NIST CM-12
Information Location

Information location addresses the need to understand where information is being processed and stored. Information location includes identifying where specific information types and information reside...

Auto-Generated Generated during job processing
CM-12 (Information Location) is relevant to the scoping question because it requires the entity to identify where sensitive information is stored and processed on managed devices, such as laptops, smartphones, and tablets. This control is important f...
Scoping Question 4

Will the service integrate directly with core business processes or systems? Identifies if the entity’s outputs plug into mission-critical workflows (order processing, billing, manufacturing, etc.). A faulty integration can cascade failures into critical operations, causing downtime, data corruption, or billing errors. Formal change-management process Pre-/post-integration validation testing Role-based access controls on integrated interfaces

30 Controls
NIST SR-8
Notification Agreements

The establishment of agreements and procedures facilitates communications among supply chain entities. Early notification of compromises and potential compromises in the supply chain that can potentia...

Auto-Generated Generated during job processing
SR-8 (Notification Agreements) is relevant to the scoping question because it ensures that supply chain entities promptly communicate any compromises or issues that could impact integrated core business processes or systems. This control is important...
NIST SA-9
External System Services

External system services are provided by an external provider, and the organization has no direct control over the implementation of the required controls or the assessment of control effectiveness. O...

Auto-Generated Generated during job processing
1. Control SA-9 addresses the scoping question by ensuring that when a service integrates directly with core business processes or systems, any external system services involved are governed by formal agreements and documented trust relationships. 2....
NIST CA-6
Authorization

Authorizations are official management decisions by senior officials to authorize operation of systems, authorize the use of common controls for inheritance by organizational systems, and explicitly a...

Auto-Generated Generated during job processing
CA-6 (Authorization) is directly relevant to the scoping question because it ensures that senior management formally reviews and approves the integration of services with core business processes or systems, explicitly accepting any associated risks. ...
NIST PM-10
Authorization Process

Authorization processes for organizational systems and environments of operation require the implementation of an organization-wide risk management process and associated security and privacy standard...

Auto-Generated Generated during job processing
1. PM-10 (Authorization Process) addresses the scoping question by ensuring that any service integrating with core business processes undergoes a formal risk assessment and receives explicit approval from designated authorizing officials before deplo...
NIST SA-23
Specialization

It is often necessary for a system or system component that supports mission-essential services or functions to be enhanced to maximize the trustworthiness of the resource. Sometimes this enhancement ...

Auto-Generated Generated during job processing
1. Control SA-23 (Specialization) addresses the scoping question by requiring enhancements to systems that integrate with core business processes, ensuring these mission-critical integrations are trustworthy and resilient. 2. This control is importan...
NIST PS-7
External Personnel Security

External provider refers to organizations other than the organization operating or acquiring the system. External providers include service bureaus, contractors, and other organizations that provide s...

Auto-Generated Generated during job processing
1. Control PS-7 (External Personnel Security) addresses the scoping question by ensuring that external personnel involved in integrating with core business processes or systems are subject to appropriate security requirements, including access manage...
NIST CA-9
Internal System Connections

Internal system connections are connections between organizational systems and separate constituent system components (i.e., connections between components that are part of the same system) including ...

Auto-Generated Generated during job processing
Control CA-9 (Internal System Connections) is directly relevant to the scoping question because it ensures that all internal connections between systems—especially those integrating with core business processes—are properly authorized, reviewed, and ...
NIST MA-6 Found
Timely Maintenance

Organizations specify the system components that result in increased risk to organizational operations and assets, individuals, other organizations, or the Nation when the functionality provided by th...

Auto-Generated Generated during job processing
MA-6 (Timely Maintenance) is relevant to the scoping question because integrating a service with core business processes means that any failure or downtime in the integrated components can directly impact mission-critical operations. This control ens...
NIST AC-5 Found
Separation of Duties

Separation of duties addresses the potential for abuse of authorized privileges and helps to reduce the risk of malevolent activity without collusion. Separation of duties includes dividing mission or...

Auto-Generated Generated during job processing
1. AC-5 (Separation of Duties) is relevant to the scoping question because direct integration with core business processes increases the risk that a single individual could misuse elevated privileges to disrupt or manipulate mission-critical workflow...
NIST CP-8
Telecommunications Services

Telecommunications services (for data and voice) for primary and alternate processing and storage sites are in scope for CP-8. Alternate telecommunications services reflect the continuity requirements...

Auto-Generated Generated during job processing
1. **How this control addresses the scoping question:** CP-8 ensures that telecommunications services supporting both primary and alternate processing sites are resilient and available, which is critical when a service integrates directly with core...
NIST SI-22
Information Diversity

Actions taken by a system service or a function are often driven by the information it receives. Corruption, fabrication, modification, or deletion of that information could impact the ability of the ...

Auto-Generated Generated during job processing
1. **How this control addresses the scoping question:** SI-22 (Information Diversity) is relevant because when a service integrates directly with core business processes, the integrity and availability of input data are critical to preventing casca...
NIST CM-3 Found
Configuration Change Control

Configuration change control for organizational systems involves the systematic proposal, justification, implementation, testing, review, and disposition of system changes, including system upgrades a...

Auto-Generated Generated during job processing
1. CM-3 Configuration Change Control is directly relevant to the scoping question because it ensures that any integration with core business processes or systems is systematically managed, reviewed, and tested before implementation. 2. This control...
NIST CP-7
Alternate Processing Site

Alternate processing sites are geographically distinct from primary processing sites and provide processing capability if the primary processing site is not available. The alternate processing capabil...

Auto-Generated Generated during job processing
1. **How this control addresses the scoping question:** CP-7 (Alternate Processing Site) is relevant because if the service integrates directly with core business processes or systems, any disruption at the primary site could impact mission-critica...
NIST SA-22 Found
Unsupported System Components

Support for system components includes software patches, firmware updates, replacement parts, and maintenance contracts. An example of unsupported components includes when vendors no longer provide cr...

Auto-Generated Generated during job processing
1. This control ensures that any system components integrated with core business processes are actively supported with security patches and updates, reducing the risk of vulnerabilities that could disrupt mission-critical workflows. 2. It is importan...
NIST MA-2
Controlled Maintenance

Controlling system maintenance addresses the information security aspects of the system maintenance program and applies to all types of maintenance to system components conducted by local or nonlocal ...

Auto-Generated Generated during job processing
1. Controlled Maintenance (MA-2) is relevant to the scoping question because integrating with core business processes or systems requires ensuring that all system components, including peripherals, are properly maintained to prevent disruptions or fa...
NIST IA-9
Service Identification and Authentication

Services that may require identification and authentication include web applications using digital certificates or services or applications that query a database. Identification and authentication met...

Auto-Generated Generated during job processing
1. This control ensures that only properly identified and authenticated services can interact with core business processes or systems, directly addressing the risk of unauthorized or faulty integrations. 2. It is important for compliance because it h...
NIST SR-4
Provenance

Every system and system component has a point of origin and may be changed throughout its existence. Provenance is the chronology of the origin, development, ownership, location, and changes to a syst...

Auto-Generated Generated during job processing
1. The Provenance control (SR-4) addresses the scoping question by ensuring that the origin, development, and changes to any system or component integrated with core business processes are fully documented and traceable. 2. This control is important ...
NIST RA-9 Found
Criticality Analysis

Not all system components, functions, or services necessarily require significant protections. For example, criticality analysis is a key tenet of supply chain risk management and informs the prioriti...

Auto-Generated Generated during job processing
1. **How this control addresses the scoping question:** RA-9 (Criticality Analysis) ensures that any service integrating directly with core business processes or systems is systematically evaluated to identify which components and functions are mis...
NIST PL-9
Central Management

Central management refers to organization-wide management and implementation of selected controls and processes. This includes planning, implementing, assessing, authorizing, and monitoring the organi...

Auto-Generated Generated during job processing
PL-9 Central Management is relevant to the scoping question because integrating a service with core business processes requires consistent, organization-wide management of security controls to prevent cascading failures and ensure reliability. This c...
NIST SI-17
Fail-safe Procedures

Failure conditions include the loss of communications among critical system components or between system components and operational facilities. Fail-safe procedures include alerting operator personnel...

Auto-Generated Generated during job processing
Control SI-17 (Fail-safe Procedures) is directly relevant to the scoping question because it ensures that, in the event of a failure during integration with core business processes or systems, there are predefined steps to mitigate potential disrupti...
NIST PM-32
Purposing

Systems are designed to support a specific mission or business function. However, over time, systems and system components may be used to support services and functions that are outside of the scope o...

Auto-Generated Generated during job processing
PM-32 (Purposing) is directly relevant to the scoping question because it ensures that systems integrated with core business processes are used strictly within their intended mission and business function. This control is important for compliance as ...
NIST SI-2 Found
Flaw Remediation

The need to remediate system flaws applies to all types of software and firmware. Organizations identify systems affected by software flaws, including potential vulnerabilities resulting from those fl...

Auto-Generated Generated during job processing
1. SI-2 (Flaw Remediation) is relevant to the scoping question because when a service integrates directly with core business processes or systems, any unaddressed software flaws or vulnerabilities in the integrated components can directly impact miss...
NIST MA-3
Maintenance Tools

Approving, controlling, monitoring, and reviewing maintenance tools address security-related issues associated with maintenance tools that are not within system authorization boundaries and are used s...

Auto-Generated Generated during job processing
1. **How this control addresses the scoping question:** MA-3 (Maintenance Tools) is relevant because integrating a service with core business processes or systems often requires diagnostic and repair activities, which may involve the use of mainten...
NIST SA-1 Found
Policy and Procedures

System and services acquisition policy and procedures address the controls in the SA family that are implemented within systems and organizations. The risk management strategy is an important factor i...

Auto-Generated Generated during job processing
1. **How this control addresses the scoping question:** SA-1 (Policy and Procedures) ensures that formal, organization-wide policies and procedures are in place for acquiring and integrating new systems and services, including those that directly i...
NIST SA-10
Developer Configuration Management

Organizations consider the quality and completeness of configuration management activities conducted by developers as direct evidence of applying effective security controls. Controls include protecti...

Auto-Generated Generated during job processing
1. **How this control addresses the scoping question:** SA-10 (Developer Configuration Management) ensures that all changes to system components, including those integrated with core business processes, are properly tracked, authorized, and protect...
NIST IR-8
Incident Response Plan

It is important that organizations develop and implement a coordinated approach to incident response. Organizational mission and business functions determine the structure of incident response capabil...

Auto-Generated Generated during job processing
1. **How this control addresses the scoping question:** IR-8 (Incident Response Plan) is relevant because direct integration with core business processes increases the risk that incidents—such as data breaches or system failures—can have immediate ...
NIST CM-9
Configuration Management Plan

Configuration management activities occur throughout the system development life cycle. As such, there are developmental configuration management activities (e.g., the control of code and software lib...

Auto-Generated Generated during job processing
1. The Configuration Management Plan (CM-9) ensures that all changes and integrations with core business processes or systems are systematically managed, documented, and approved, reducing the risk of unintended disruptions to mission-critical workfl...
NIST CP-13 Found
Alternative Security Mechanisms

Use of alternative security mechanisms supports system resiliency, contingency planning, and continuity of operations. To ensure mission and business continuity, organizations can implement alternativ...

Auto-Generated Generated during job processing
1. Control CP-13 is relevant to the scoping question because it ensures that if the service integrates with core business processes or systems, alternative security mechanisms are available to maintain operations in the event of a failure or compromi...
NIST PL-7
Concept of Operations

The CONOPS may be included in the security or privacy plans for the system or in other system development life cycle documents. The CONOPS is a living document that requires updating throughout the sy...

Auto-Generated Generated during job processing
Control PL-7 (Concept of Operations) is relevant to the scoping question because it ensures that the integration of the service with core business processes is formally documented, reviewed, and updated throughout the system’s lifecycle. This control...
NIST CP-12
Safe Mode

For systems that support critical mission and business functions—including military operations, civilian space operations, nuclear power plant operations, and air traffic control operations (esp...

Auto-Generated Generated during job processing
1. **How this control addresses the scoping question:** CP-12 (Safe Mode) is relevant because when a service integrates directly with core business processes or systems, any failure or abnormal condition can have significant operational impacts. Im...
Scoping Question 5

Will the entity subcontract any portion of this engagement to other providers? Checks if the prime entity relies on fourth parties, affecting visibility into who actually performs the work. Sub-providers may have weaker controls, inconsistent quality, and introduce hidden compliance or contractual gaps. Flow-down contractual requirements Right-to-audit sub-providers Sub-vendor inventory and control reviews

7 Controls
NIST SR-8
Notification Agreements

The establishment of agreements and procedures facilitates communications among supply chain entities. Early notification of compromises and potential compromises in the supply chain that can potentia...

Auto-Generated Generated during job processing
SR-8 (Notification Agreements) directly addresses the scoping question by ensuring that subcontractors are contractually obligated to promptly notify the prime entity of any security compromises or incidents. This control is important for compliance ...
NIST SR-6
Supplier Assessments and Reviews

An assessment and review of supplier risk includes security and supply chain risk management processes, foreign ownership, control or influence (FOCI), and the ability of the supplier to effectively a...

Auto-Generated Generated during job processing
1. Control SR-6 directly addresses the scoping question by requiring formal assessments and reviews of suppliers, including any subcontractors or sub-providers involved in the engagement, ensuring visibility into all parties performing the work. 2. T...
NIST SA-9
External System Services

External system services are provided by an external provider, and the organization has no direct control over the implementation of the required controls or the assessment of control effectiveness. O...

Auto-Generated Generated during job processing
Control SA-9 (External System Services) directly addresses the scoping question by requiring organizations to formally manage and document relationships with external service providers, such as subcontractors, including their security roles, responsi...
NIST PS-7
External Personnel Security

External provider refers to organizations other than the organization operating or acquiring the system. External providers include service bureaus, contractors, and other organizations that provide s...

Auto-Generated Generated during job processing
PS-7 (External Personnel Security) directly addresses the scoping question by ensuring that any subcontracted providers are subject to defined personnel security requirements, including proper credentialing and timely notification of personnel change...
NIST AU-16
Cross-organizational Audit Logging

When organizations use systems or services of external organizations, the audit logging capability necessitates a coordinated, cross-organization approach. For example, maintaining the identity of ind...

Auto-Generated Generated during job processing
Control AU-16 is relevant to the scoping question because it ensures that, when subcontractors or external providers are involved, audit logging is coordinated across organizational boundaries. This control is important for compliance as it maintains...
NIST SR-7
Supply Chain Operations Security

Supply chain OPSEC expands the scope of OPSEC to include suppliers and potential suppliers. OPSEC is a process that includes identifying critical information, analyzing friendly actions related to ope...

Auto-Generated Generated during job processing
1. **How this control addresses the scoping question:** SR-7 Supply Chain Operations Security directly addresses the scoping question by requiring the entity to assess and manage operational security risks associated with subcontractors and supplie...
NIST SR-5
Acquisition Strategies, Tools, and Methods

The use of the acquisition process provides an important vehicle to protect the supply chain. There are many useful tools and techniques available, including obscuring the end use of a system or syste...

Auto-Generated Generated during job processing
Control SR-5 is directly relevant to the scoping question because it establishes requirements and strategies for managing supply chain risks when subcontracting work to other providers. This control is important for compliance as it ensures that acqu...
Scoping Question 6

Will the service generate customer-facing deliverables or directly impact end users? Determines if the entity’s outputs (reports, portals, APIs) are visible to or used by your customers or partners. Errors or downtime become public, risking reputational damage, customer churn, and potential SLA penalties. QA review gates Pre-release user-acceptance testing (UAT) Versioned API contracts and rollback procedures

2 Controls
NIST SR-8
Notification Agreements

The establishment of agreements and procedures facilitates communications among supply chain entities. Early notification of compromises and potential compromises in the supply chain that can potentia...

Auto-Generated Generated during job processing
SR-8 (Notification Agreements) is relevant to the scoping question because customer-facing deliverables or services directly impact end users, making timely communication about supply chain compromises critical to maintaining trust and meeting contra...
NIST SA-9
External System Services

External system services are provided by an external provider, and the organization has no direct control over the implementation of the required controls or the assessment of control effectiveness. O...

Auto-Generated Generated during job processing
Control SA-9 is directly relevant to the scoping question because it ensures that when customer-facing deliverables or services are provided by external vendors, the organization maintains oversight of security, reliability, and performance through d...
Scoping Question 7

Does the entity’s performance depend on access to proprietary processes or intellectual property? Clarifies whether the entity needs to understand or use your unique methodologies, algorithms, or trade secrets. Exposure of IP risks theft or leakage, eroding competitive advantage and complicating future provider transitions. NDAs and IP assignment clauses ACLs on sensitive repositories Periodic IP-use audits

16 Controls
NIST SR-8
Notification Agreements

The establishment of agreements and procedures facilitates communications among supply chain entities. Early notification of compromises and potential compromises in the supply chain that can potentia...

Auto-Generated Generated during job processing
SR-8 (Notification Agreements) is relevant to the scoping question because it ensures that entities are promptly informed of any compromises or risks affecting proprietary processes or intellectual property within the supply chain. This control is im...
NIST CM-5
Access Restrictions for Change

Changes to the hardware, software, or firmware components of systems or the operational procedures related to the system can potentially have significant effects on the security of the systems or indi...

Auto-Generated Generated during job processing
CM-5 (Access Restrictions for Change) is relevant to the scoping question because it ensures that only authorized personnel can modify systems or processes that may contain proprietary methodologies, algorithms, or trade secrets. This control is impo...
NIST PT-2
Authority to Process Personally Identifiable Information

The processing of personally identifiable information is an operation or set of operations that the information system or organization performs with respect to personally identifiable information acro...

Auto-Generated Generated during job processing
Control PT-2 is relevant to the scoping question because it ensures that any processing of personally identifiable information (PII) within proprietary processes or intellectual property is authorized, documented, and compliant with applicable laws a...
NIST PT-7
Specific Categories of Personally Identifiable Information

Organizations apply any conditions or protections that may be necessary for specific categories of personally identifiable information. These conditions may be required by laws, executive orders, dire...

Auto-Generated Generated during job processing
Control PT-7 is relevant to the scoping question because proprietary processes or intellectual property may involve handling specific categories of personally identifiable information (PII) that require heightened protection. This control ensures tha...
NIST AC-4 Found
Information Flow Enforcement

Information flow control regulates where information can travel within a system and between systems (in contrast to who is allowed to access the information) and without regard to subsequent accesses ...

Auto-Generated Generated during job processing
**Justification:** 1. AC-4 Information Flow Enforcement is directly relevant to the scoping question because it ensures that proprietary processes and intellectual property (IP) are only transmitted or accessed through authorized channels, preventin...
NIST CM-8
System Component Inventory

System components are discrete, identifiable information technology assets that include hardware, software, and firmware. Organizations may choose to implement centralized system component inventories...

Auto-Generated Generated during job processing
1. CM-8 (System Component Inventory) addresses the scoping question by ensuring the organization maintains a comprehensive and accurate inventory of all IT assets, including those that store or process proprietary processes or intellectual property (...
NIST AC-21 Found
Information Sharing

Information sharing applies to information that may be restricted in some manner based on some formal or administrative determination. Examples of such information include, contract-sensitive informat...

Auto-Generated Generated during job processing
AC-21 (Information Sharing) is directly relevant to the scoping question because it establishes formal mechanisms—such as NDAs and access restrictions—for controlling how proprietary processes and intellectual property are shared and protected. This ...
NIST IA-8 Found
Identification and Authentication (Non-organizational Users)

Non-organizational users include system users other than organizational users explicitly covered by IA-2. Non-organizational users are uniquely identified and authenticated for accesses other than tho...

Auto-Generated Generated during job processing
Control IA-8 is relevant to the scoping question because it ensures that only authorized, uniquely identified, and authenticated non-organizational users can access systems containing proprietary processes or intellectual property. This control is im...
NIST AU-16
Cross-organizational Audit Logging

When organizations use systems or services of external organizations, the audit logging capability necessitates a coordinated, cross-organization approach. For example, maintaining the identity of ind...

Auto-Generated Generated during job processing
AU-16 (Cross-organizational Audit Logging) is relevant to the scoping question because it ensures that access to proprietary processes or intellectual property is traceable even when external organizations are involved. This control is important for ...
NIST SA-20
Customized Development of Critical Components

Organizations determine that certain system components likely cannot be trusted due to specific threats to and vulnerabilities in those components for which there are no viable security controls to ad...

Auto-Generated Generated during job processing
SA-20 is relevant to the scoping question because it ensures that critical system components—especially those involving proprietary processes or intellectual property—are either custom-developed or subject to enhanced security controls when standard ...
NIST PM-21
Accounting of Disclosures

The purpose of accounting of disclosures is to allow individuals to learn to whom their personally identifiable information has been disclosed, to provide a basis for subsequently advising recipients ...

Auto-Generated Generated during job processing
Control PM-21 (Accounting of Disclosures) is relevant to the scoping question because it ensures that any disclosures of proprietary processes or intellectual property—including those containing personally identifiable information—are tracked and aud...
NIST AC-17
Remote Access

Remote access is access to organizational systems (or processes acting on behalf of users) that communicate through external networks such as the Internet. Types of remote access include dial-up, broa...

Auto-Generated Generated during job processing
AC-17 (Remote Access) is relevant to the scoping question because it governs how users can remotely access systems containing proprietary processes or intellectual property, ensuring that only authorized individuals can connect via secure, encrypted ...
NIST SR-5
Acquisition Strategies, Tools, and Methods

The use of the acquisition process provides an important vehicle to protect the supply chain. There are many useful tools and techniques available, including obscuring the end use of a system or syste...

Auto-Generated Generated during job processing
Control SR-5 is relevant to the scoping question because it establishes acquisition strategies and supply chain protections that help prevent unauthorized access to proprietary processes and intellectual property (IP). This control is important for c...
NIST SI-18
Personally Identifiable Information Quality Operations

Personally identifiable information quality operations include the steps that organizations take to confirm the accuracy and relevance of personally identifiable information throughout the information...

Auto-Generated Generated during job processing
Control SI-18 is relevant to the scoping question because it ensures the accuracy and integrity of personally identifiable information (PII) that may be embedded within proprietary processes or intellectual property. Accurate PII management is crucia...
NIST AU-13 Found
Monitoring for Information Disclosure

Unauthorized disclosure of information is a form of data leakage. Open-source information includes social networking sites and code-sharing platforms and repositories. Examples of organizational infor...

Auto-Generated Generated during job processing
AU-13: Monitoring for Information Disclosure is directly relevant to the scoping question because it helps detect and prevent unauthorized exposure of proprietary processes or intellectual property, including through public platforms and repositories...
NIST SA-2 Found
Allocation of Resources

Resource allocation for information security and privacy includes funding for system and services acquisition, sustainment, and supply chain-related risks throughout the system development life cycle.

Auto-Generated Generated during job processing
1. Control SA-2 ensures that adequate resources are allocated to protect proprietary processes and intellectual property throughout the system development life cycle, directly addressing the need to safeguard unique methodologies, algorithms, or trad...
Scoping Question 8

Does the entity use proprietary or third-party technology that must be licensed separately? Flags dependencies on paid tools, platforms, or IP that add cost or complicate your management landscape. Creates unexpected cost, version-mismatch risk, and additional vendor-management overhead. License-management tracking and renewal reminders Proof-of-license audits Evaluation of alternative open-source options

14 Controls
NIST SR-8
Notification Agreements

The establishment of agreements and procedures facilitates communications among supply chain entities. Early notification of compromises and potential compromises in the supply chain that can potentia...

Auto-Generated Generated during job processing
SR-8 (Notification Agreements) is relevant to the scoping question because it ensures that entities using proprietary or third-party technology have formalized procedures for timely communication about supply chain incidents, including license issues...
NIST SR-6
Supplier Assessments and Reviews

An assessment and review of supplier risk includes security and supply chain risk management processes, foreign ownership, control or influence (FOCI), and the ability of the supplier to effectively a...

Auto-Generated Generated during job processing
Control SR-6 is directly relevant to the scoping question because it requires organizations to assess and review the risks associated with suppliers of proprietary or third-party technology, including licensing, security, and supply chain dependencie...
NIST SA-9
External System Services

External system services are provided by an external provider, and the organization has no direct control over the implementation of the required controls or the assessment of control effectiveness. O...

Auto-Generated Generated during job processing
Control SA-9 (External System Services) is directly relevant to the scoping question because it requires organizations to formally manage and document relationships with external technology providers, including those involving licensed proprietary or...
NIST CM-10
Software Usage Restrictions

Software license tracking can be accomplished by manual or automated methods, depending on organizational needs. Examples of contract agreements include software license agreements and non-disclosure ...

Auto-Generated Generated during job processing
Control CM-10 (Software Usage Restrictions) directly addresses the scoping question by requiring organizations to track and manage software licenses, ensuring that all proprietary or third-party technologies in use are properly licensed. This control...
NIST PS-7
External Personnel Security

External provider refers to organizations other than the organization operating or acquiring the system. External providers include service bureaus, contractors, and other organizations that provide s...

Auto-Generated Generated during job processing
Control PS-7 (External Personnel Security) is relevant to the scoping question because the use of proprietary or third-party technology often involves external providers whose personnel may access organizational systems, data, or facilities. This con...
NIST SC-50 Found
Software-enforced Separation and Policy Enforcement

System owners may require additional strength of mechanism to ensure domain separation and policy enforcement for specific types of threats and environments of operation.

Auto-Generated Generated during job processing
SC-50 (Software-enforced Separation and Policy Enforcement) is relevant to the scoping question because proprietary or third-party technologies often require strict separation and enforcement of licensing policies to prevent unauthorized use or acces...
NIST SA-22 Found
Unsupported System Components

Support for system components includes software patches, firmware updates, replacement parts, and maintenance contracts. An example of unsupported components includes when vendors no longer provide cr...

Auto-Generated Generated during job processing
Control SA-22 is directly relevant to the scoping question because it requires organizations to identify and manage unsupported system components, which often arise when using proprietary or third-party technologies that require separate licensing. T...
NIST SR-4
Provenance

Every system and system component has a point of origin and may be changed throughout its existence. Provenance is the chronology of the origin, development, ownership, location, and changes to a syst...

Auto-Generated Generated during job processing
Control SR-4 (Provenance) is relevant to the scoping question because it requires organizations to document and track the origin, ownership, and changes of all system components, including proprietary or third-party technologies that require separate...
NIST CM-8
System Component Inventory

System components are discrete, identifiable information technology assets that include hardware, software, and firmware. Organizations may choose to implement centralized system component inventories...

Auto-Generated Generated during job processing
CM-8 (System Component Inventory) directly addresses the scoping question by requiring organizations to maintain detailed inventories of all IT assets, including software license information and ownership. This control is essential for compliance bec...
NIST AU-16
Cross-organizational Audit Logging

When organizations use systems or services of external organizations, the audit logging capability necessitates a coordinated, cross-organization approach. For example, maintaining the identity of ind...

Auto-Generated Generated during job processing
AU-16 (Cross-organizational Audit Logging) is relevant to the scoping question because using proprietary or third-party technology often involves data exchanges and service requests across organizational boundaries, requiring coordinated audit loggin...
NIST SA-20
Customized Development of Critical Components

Organizations determine that certain system components likely cannot be trusted due to specific threats to and vulnerabilities in those components for which there are no viable security controls to ad...

Auto-Generated Generated during job processing
SA-20 is relevant to the scoping question because it requires organizations to assess the trustworthiness of proprietary or third-party technology and consider custom development when existing components present unacceptable risks or lack adequate se...
NIST AC-20 Found
Use of External Systems

External systems are systems that are used by but not part of organizational systems, and for which the organization has no direct control over the implementation of required controls or the assessmen...

Auto-Generated Generated during job processing
**Justification:** 1. Control AC-20 is directly relevant to the scoping question because it governs the use of external (including third-party or proprietary) systems that are not fully controlled by the organization, which includes licensed technol...
NIST SR-5
Acquisition Strategies, Tools, and Methods

The use of the acquisition process provides an important vehicle to protect the supply chain. There are many useful tools and techniques available, including obscuring the end use of a system or syste...

Auto-Generated Generated during job processing
Control SR-5 is relevant to the scoping question because it ensures that acquisition processes for proprietary or third-party technologies include due diligence on licensing, supply chain risks, and vendor management. This control is important for co...
NIST CM-11 Found
User-installed Software

If provided the necessary privileges, users can install software in organizational systems. To maintain control over the software installed, organizations identify permitted and prohibited actions reg...

Auto-Generated Generated during job processing
CM-11 (User-installed Software) is relevant to the scoping question because it ensures that only authorized, properly licensed software—whether proprietary or third-party—is installed on organizational systems. This control is important for complianc...
Scoping Question 9

Does the entity use third parties to deliver services outside the United States? Identifies whether any part of service delivery is outsourced internationally, beyond your direct oversight. Offshore third parties can fall under different regulatory regimes, complicate compliance, data-sovereignty, and oversight. International due-diligence and risk assessments Flow-down contract clauses for compliance and data handling Regular third-party audits and SLAs

10 Controls
NIST SR-8
Notification Agreements

The establishment of agreements and procedures facilitates communications among supply chain entities. Early notification of compromises and potential compromises in the supply chain that can potentia...

Auto-Generated Generated during job processing
1. Control SR-8 (Notification Agreements) addresses the scoping question by ensuring that offshore third parties are contractually obligated to promptly notify your organization of any security incidents or compromises, which is critical when service...
NIST SR-6
Supplier Assessments and Reviews

An assessment and review of supplier risk includes security and supply chain risk management processes, foreign ownership, control or influence (FOCI), and the ability of the supplier to effectively a...

Auto-Generated Generated during job processing
1. This control directly addresses the scoping question by requiring formal assessments and reviews of third-party suppliers, including those located outside the United States, to identify and manage risks associated with international outsourcing. 2...
NIST SA-9
External System Services

External system services are provided by an external provider, and the organization has no direct control over the implementation of the required controls or the assessment of control effectiveness. O...

Auto-Generated Generated during job processing
Control SA-9 is directly relevant to the scoping question because it governs how organizations manage risks and oversight when using external system services, including those delivered by third parties outside the United States. This control is criti...
NIST SA-21
Developer Screening

Developer screening is directed at external developers. Internal developer screening is addressed by PS-3. Because the system, system component, or system service may be used in critical activities es...

Auto-Generated Generated during job processing
Control SA-21 (Developer Screening) is directly relevant to the scoping question because it ensures that external, potentially offshore developers are properly vetted for trustworthiness, including background checks, citizenship, and company affiliat...
NIST PS-7
External Personnel Security

External provider refers to organizations other than the organization operating or acquiring the system. External providers include service bureaus, contractors, and other organizations that provide s...

Auto-Generated Generated during job processing
1. Control PS-7 addresses the scoping question by ensuring that external personnel—such as those employed by offshore third-party service providers—are subject to defined security requirements and oversight, even when service delivery occurs outside ...
NIST SI-5 Found
Security Alerts, Advisories, and Directives

The Cybersecurity and Infrastructure Security Agency (CISA) generates security alerts and advisories to maintain situational awareness throughout the Federal Government. Security directives are issued...

Auto-Generated Generated during job processing
1. **How this control addresses the scoping question:** SI-5 ensures that entities and their third-party service providers, including those located outside the United States, receive and act on relevant security alerts, advisories, and directives, ...
NIST AU-16
Cross-organizational Audit Logging

When organizations use systems or services of external organizations, the audit logging capability necessitates a coordinated, cross-organization approach. For example, maintaining the identity of ind...

Auto-Generated Generated during job processing
1. This control addresses the scoping question by ensuring that, when services are delivered by third parties outside the United States, audit logging is coordinated across organizational and geographic boundaries. 2. It is important for compliance...
NIST AC-20 Found
Use of External Systems

External systems are systems that are used by but not part of organizational systems, and for which the organization has no direct control over the implementation of required controls or the assessmen...

Auto-Generated Generated during job processing
Control AC-20 is directly relevant to the scoping question because it governs the use of external systems, including those operated by third parties outside the United States, for service delivery. This control is important for compliance as it ensur...
NIST SR-7
Supply Chain Operations Security

Supply chain OPSEC expands the scope of OPSEC to include suppliers and potential suppliers. OPSEC is a process that includes identifying critical information, analyzing friendly actions related to ope...

Auto-Generated Generated during job processing
Control SR-7 (Supply Chain Operations Security) is directly relevant to the scoping question because it ensures that security and operational risks associated with international third-party service providers are identified and managed. This control i...
NIST IR-8
Incident Response Plan

It is important that organizations develop and implement a coordinated approach to incident response. Organizational mission and business functions determine the structure of incident response capabil...

Auto-Generated Generated during job processing
Control IR-8 (Incident Response Plan) is relevant to the scoping question because it ensures that the organization has established procedures for coordinating incident response activities with offshore third-party service providers. This control is i...
Scoping Question 10

Does the service require handling or custody of the entity’s physical assets (e.g., hardware, inventory)? Flags responsibility for equipment, shipments, or on-site physical items under the entity’s care. Asset damage, loss, or theft can disrupt operations and lead to replacement costs or insurance claims. Asset-tagging and inventory management system Insurance and liability clauses Chain-of-custody documentation for transfers

21 Controls
NIST SA-9
External System Services

External system services are provided by an external provider, and the organization has no direct control over the implementation of the required controls or the assessment of control effectiveness. O...

Auto-Generated Generated during job processing
Control SA-9 is relevant to the scoping question because it ensures that when physical assets (such as hardware or inventory) are managed by external service providers, the organization establishes documented agreements and trust relationships to add...
NIST AC-3 Found
Access Enforcement

Access control policies control access between active entities or subjects (i.e., users or processes acting on behalf of users) and passive entities or objects (i.e., devices, files, records, domains)...

Auto-Generated Generated during job processing
AC-3 (Access Enforcement) is relevant to the scoping question because it ensures that only authorized personnel can access physical assets, such as hardware or inventory, under the entity’s custody. This control is important for compliance as it miti...
NIST CP-9
System Backup

System-level information includes system state information, operating system software, middleware, application software, and licenses. User-level information includes information other than system-lev...

Auto-Generated Generated during job processing
Control CP-9 (System Backup) is relevant to the scoping question because it ensures that critical information related to physical assets—such as inventory records, asset-tagging data, and chain-of-custody documentation—is regularly backed up and prot...
NIST MP-5
Media Transport

System media includes digital and non-digital media. Digital media includes flash drives, diskettes, magnetic tapes, external or removable hard disk drives (e.g., solid state and magnetic), compact d...

Auto-Generated Generated during job processing
Control MP-5 (Media Transport) is relevant to the scoping question because it establishes requirements for securely handling and tracking physical assets—specifically system media—during transport, which directly addresses the entity’s responsibility...
NIST PS-7
External Personnel Security

External provider refers to organizations other than the organization operating or acquiring the system. External providers include service bureaus, contractors, and other organizations that provide s...

Auto-Generated Generated during job processing
Control PS-7 (External Personnel Security) is relevant to the scoping question because it ensures that external personnel who may handle or access the entity’s physical assets are subject to defined security requirements, such as credentialing and no...
NIST SR-3
Supply Chain Controls and Processes

Supply chain elements include organizations, entities, or tools employed for the research and development, design, manufacturing, acquisition, delivery, integration, operations and maintenance, and di...

Auto-Generated Generated during job processing
SR-3 (Supply Chain Controls and Processes) is directly relevant to the scoping question because it ensures that all aspects of handling, custody, and transfer of physical assets—such as hardware and inventory—are governed by robust procedures through...
NIST MA-6 Found
Timely Maintenance

Organizations specify the system components that result in increased risk to organizational operations and assets, individuals, other organizations, or the Nation when the functionality provided by th...

Auto-Generated Generated during job processing
Control MA-6 (Timely Maintenance) is relevant to the scoping question because it ensures that physical assets—such as hardware and inventory—are maintained and supported to prevent operational disruptions due to equipment failure or degradation. This...
NIST AC-5 Found
Separation of Duties

Separation of duties addresses the potential for abuse of authorized privileges and helps to reduce the risk of malevolent activity without collusion. Separation of duties includes dividing mission or...

Auto-Generated Generated during job processing
1. The Separation of Duties (AC-5) control addresses the scoping question by ensuring that no single individual has sole responsibility for handling, managing, or transferring physical assets, thereby reducing the risk of asset loss, theft, or misuse...
NIST PE-20
Asset Monitoring and Tracking

Asset location technologies can help ensure that critical assets—including vehicles, equipment, and system components—remain in authorized locations. Organizations consult with the Office ...

Auto-Generated Generated during job processing
PE-20 Asset Monitoring and Tracking is directly relevant to the scoping question because it ensures that physical assets under the entity’s custody—such as hardware, inventory, or equipment—are continuously tracked and remain in authorized locations....
NIST MA-2
Controlled Maintenance

Controlling system maintenance addresses the information security aspects of the system maintenance program and applies to all types of maintenance to system components conducted by local or nonlocal ...

Auto-Generated Generated during job processing
MA-2 (Controlled Maintenance) is relevant to the scoping question because it ensures that all maintenance activities involving physical assets—such as hardware or inventory—are properly documented, tracked, and controlled. This control is important f...
NIST SR-4
Provenance

Every system and system component has a point of origin and may be changed throughout its existence. Provenance is the chronology of the origin, development, ownership, location, and changes to a syst...

Auto-Generated Generated during job processing
The Provenance control (SR-4) is directly relevant to the scoping question because it ensures that the origin, ownership, and changes to physical assets—such as hardware or inventory—are thoroughly documented and tracked throughout their lifecycle. T...
NIST CM-8
System Component Inventory

System components are discrete, identifiable information technology assets that include hardware, software, and firmware. Organizations may choose to implement centralized system component inventories...

Auto-Generated Generated during job processing
Control CM-8 (System Component Inventory) directly addresses the scoping question by requiring organizations to maintain a detailed, accurate inventory of all physical assets, such as hardware, under their custody. This control is essential for compl...
NIST SR-7
Supply Chain Operations Security

Supply chain OPSEC expands the scope of OPSEC to include suppliers and potential suppliers. OPSEC is a process that includes identifying critical information, analyzing friendly actions related to ope...

Auto-Generated Generated during job processing
SR-7 (Supply Chain Operations Security) is relevant to the scoping question because it ensures that physical assets handled or held by the entity and its suppliers are protected from risks such as loss, theft, or unauthorized disclosure throughout th...
NIST PS-5 Found
Personnel Transfer

Personnel transfer applies when reassignments or transfers of individuals are permanent or of such extended duration as to make the actions warranted. Organizations define actions appropriate for the ...

Auto-Generated Generated during job processing
Control PS-5 (Personnel Transfer) is relevant to the scoping question because it ensures that when personnel are reassigned or transferred, their access to physical assets—such as hardware, inventory, or equipment—is properly updated, and any custody...
NIST SA-1 Found
Policy and Procedures

System and services acquisition policy and procedures address the controls in the SA family that are implemented within systems and organizations. The risk management strategy is an important factor i...

Auto-Generated Generated during job processing
Control SA-1 (Policy and Procedures) is relevant to the scoping question because it ensures that the organization establishes formal policies and procedures for the acquisition and management of physical assets, such as hardware or inventory. This co...
NIST IR-8
Incident Response Plan

It is important that organizations develop and implement a coordinated approach to incident response. Organizational mission and business functions determine the structure of incident response capabil...

Auto-Generated Generated during job processing
1. The Incident Response Plan (IR-8) is relevant to the scoping question because it ensures the organization is prepared to respond to incidents involving physical assets, such as theft, loss, or damage of equipment or inventory under its custody. 2....
NIST SR-1 Found
Policy and Procedures

Supply chain risk management policy and procedures address the controls in the SR family as well as supply chain-related controls in other families that are implemented within systems and organization...

Auto-Generated Generated during job processing
Control SR-1 (Policy and Procedures) is relevant to the scoping question because it requires organizations to formally establish supply chain risk management policies and procedures that govern the handling and custody of physical assets. This contro...
NIST SR-2 Found
Supply Chain Risk Management Plan

The dependence on products, systems, and services from external providers, as well as the nature of the relationships with those providers, present an increasing level of risk to an organization. Thre...

Auto-Generated Generated during job processing
1. The Supply Chain Risk Management Plan (SR-2) directly addresses the scoping question by establishing processes to identify, assess, and mitigate risks associated with handling or custody of physical assets, such as hardware and inventory, especial...
NIST MA-1 Found
Policy and Procedures

Maintenance policy and procedures address the controls in the MA family that are implemented within systems and organizations. The risk management strategy is an important factor in establishing such ...

Auto-Generated Generated during job processing
MA-1 (Policy and Procedures) is relevant to the scoping question because it requires the organization to establish and maintain documented policies and procedures for the maintenance and handling of physical assets. This control is important for comp...
NIST SR-12 Found
Component Disposal

Data, documentation, tools, or system components can be disposed of at any time during the system development life cycle (not only in the disposal or retirement phase of the life cycle). For example, ...

Auto-Generated Generated during job processing
Control SR-12 (Component Disposal) is relevant to the scoping question because it ensures that physical assets—such as hardware, documentation, and storage media—are properly disposed of throughout their lifecycle, not just at retirement. This contro...
NIST IR-4 Found
Incident Handling

Organizations recognize that incident response capabilities are dependent on the capabilities of organizational systems and the mission and business processes being supported by those systems. Organiz...

Auto-Generated Generated during job processing
1. **How this control addresses the scoping question:** IR-4 (Incident Handling) is relevant because handling or custody of physical assets exposes the entity to risks such as asset damage, loss, theft, or supply chain compromise, all of which requ...
Scoping Question 11

Will the entity host entity, partner, or customer data in their own network environment? Determines if your data will reside on the provider’s infrastructure rather than your controlled systems. Loss of direct control over data storage, potential co-tenant risks, and challenges in meeting data-sovereignty or compliance requirements. Contractual data-hosting SLA and security requirements Data-segregation (logical/physical) and encryption at rest Periodic network and configuration audits Defined backup, retention, and e-discovery procedures

22 Controls
NIST SA-9
External System Services

External system services are provided by an external provider, and the organization has no direct control over the implementation of the required controls or the assessment of control effectiveness. O...

Auto-Generated Generated during job processing
Control SA-9 (External System Services) is directly relevant to the scoping question because it governs how organizations manage risks when hosting data on external provider infrastructure, where direct control over security measures is limited. This...
NIST CP-9
System Backup

System-level information includes system state information, operating system software, middleware, application software, and licenses. User-level information includes information other than system-lev...

Auto-Generated Generated during job processing
Control CP-9 (System Backup) is directly relevant to the scoping question because it ensures that all entity, partner, or customer data hosted in the provider’s network environment is securely and reliably backed up, mitigating risks associated with ...
NIST PT-2
Authority to Process Personally Identifiable Information

The processing of personally identifiable information is an operation or set of operations that the information system or organization performs with respect to personally identifiable information acro...

Auto-Generated Generated during job processing
Control PT-2 is directly relevant to the scoping question because hosting data in a provider’s network environment requires clear authority and documented justification for processing personally identifiable information (PII) outside of the entity’s ...
NIST SC-28
Protection of Information at Rest

Information at rest refers to the state of information when it is not in process or in transit and is located on system components. Such components include internal or external hard disk drives, stora...

Auto-Generated Generated during job processing
SC-28 (Protection of Information at Rest) directly addresses the scoping question by ensuring that any entity-hosted, partner, or customer data stored within the provider’s network environment is protected through confidentiality and integrity safegu...
NIST PM-23
Data Governance Body

A Data Governance Body can help ensure that the organization has coherent policies and the ability to balance the utility of data with security and privacy requirements. The Data Governance Body estab...

Auto-Generated Generated during job processing
The PM-23 Data Governance Body control addresses the scoping question by ensuring that a formal group is responsible for establishing and enforcing policies on how data is managed, stored, and protected, especially when data is hosted outside the ent...
NIST CA-3 Found
Information Exchange

System information exchange requirements apply to information exchanges between two or more systems. System information exchanges include connections via leased lines or virtual private networks, conn...

Auto-Generated Generated during job processing
1. **How this control addresses the scoping question:** CA-3 (Information Exchange) is directly relevant to the scoping question because it governs the requirements and risk management processes for exchanging data between systems, including when a...
NIST PT-7
Specific Categories of Personally Identifiable Information

Organizations apply any conditions or protections that may be necessary for specific categories of personally identifiable information. These conditions may be required by laws, executive orders, dire...

Auto-Generated Generated during job processing
Control PT-7 is relevant to the scoping question because hosting entity, partner, or customer data in a provider’s environment may involve storing specific categories of personally identifiable information (PII) that require special protections under...
NIST CP-8
Telecommunications Services

Telecommunications services (for data and voice) for primary and alternate processing and storage sites are in scope for CP-8. Alternate telecommunications services reflect the continuity requirements...

Auto-Generated Generated during job processing
Control CP-8 (Telecommunications Services) is relevant to the scoping question because hosting data in the entity’s own network environment requires reliable and resilient telecommunications services to ensure continuous access to data, especially du...
NIST CP-6
Alternate Storage Site

Alternate storage sites are geographically distinct from primary storage sites and maintain duplicate copies of information and data if the primary storage site is not available. Similarly, alternate ...

Auto-Generated Generated during job processing
Control CP-6 (Alternate Storage Site) is relevant to the scoping question because, when an entity hosts data in its own network environment, it assumes responsibility for ensuring data availability and resilience in the event of a disruption at the p...
NIST AC-4 Found
Information Flow Enforcement

Information flow control regulates where information can travel within a system and between systems (in contrast to who is allowed to access the information) and without regard to subsequent accesses ...

Auto-Generated Generated during job processing
**Justification:** 1. AC-4 (Information Flow Enforcement) is directly relevant to the scoping question because it ensures that data hosted in the provider’s network environment is subject to strict controls over how information moves within and betw...
NIST IA-9
Service Identification and Authentication

Services that may require identification and authentication include web applications using digital certificates or services or applications that query a database. Identification and authentication met...

Auto-Generated Generated during job processing
Control IA-9 (Service Identification and Authentication) is relevant to the scoping question because hosting data in a provider’s network environment requires robust mechanisms to verify and authenticate the services accessing sensitive entity, partn...
NIST CM-8
System Component Inventory

System components are discrete, identifiable information technology assets that include hardware, software, and firmware. Organizations may choose to implement centralized system component inventories...

Auto-Generated Generated during job processing
1. **How this control addresses the scoping question:** CM-8 (System Component Inventory) ensures that all hardware and software assets used to host entity, partner, or customer data in the provider’s network environment are accurately identified a...
NIST AC-21 Found
Information Sharing

Information sharing applies to information that may be restricted in some manner based on some formal or administrative determination. Examples of such information include, contract-sensitive informat...

Auto-Generated Generated during job processing
AC-21 (Information Sharing) is directly relevant to the scoping question because hosting data in a provider’s environment introduces new information-sharing risks and requirements, especially when sensitive or regulated data is involved. This control...
NIST SC-20
Secure Name/Address Resolution Service (Authoritative Source)

Providing authoritative source information enables external clients, including remote Internet clients, to obtain origin authentication and integrity verification assurances for the host/service name ...

Auto-Generated Generated during job processing
SC-20 is relevant to the scoping question because hosting data in the provider’s network environment requires assurance that network services, such as DNS, are securely managed to prevent unauthorized redirection or spoofing of data traffic. This con...
NIST SC-37
Out-of-band Channels

Out-of-band channels include local, non-network accesses to systems; network paths physically separate from network paths used for operational traffic; or non-electronic paths, such as the U.S. Postal...

Auto-Generated Generated during job processing
SC-37 (Out-of-band Channels) is relevant to the scoping question because when an entity hosts data in its own network environment, out-of-band channels provide secure, isolated methods for transmitting sensitive information—such as credentials, backu...
NIST CM-13
Data Action Mapping

Data actions are system operations that process personally identifiable information. The processing of such information encompasses the full information life cycle, which includes collection, generati...

Auto-Generated Generated during job processing
CM-13 (Data Action Mapping) is directly relevant to the scoping question because it provides a detailed understanding of how and where personally identifiable information (PII) is processed within the entity’s network environment, including which sys...
NIST AC-17
Remote Access

Remote access is access to organizational systems (or processes acting on behalf of users) that communicate through external networks such as the Internet. Types of remote access include dial-up, broa...

Auto-Generated Generated during job processing
**Justification:** 1. AC-17 (Remote Access) is directly relevant to the scoping question because hosting data in the provider’s network environment often requires remote access for administration, support, or data retrieval. 2. This control is impor...
NIST SA-10
Developer Configuration Management

Organizations consider the quality and completeness of configuration management activities conducted by developers as direct evidence of applying effective security controls. Controls include protecti...

Auto-Generated Generated during job processing
1. **How this control addresses the scoping question:** SA-10 Developer Configuration Management ensures that any system hosting entity, partner, or customer data in the provider’s network environment maintains strict control over configuration cha...
NIST SC-36
Distributed Processing and Storage

Distributing processing and storage across multiple physical locations or logical domains provides a degree of redundancy or overlap for organizations. The redundancy and overlap increase the work fac...

Auto-Generated Generated during job processing
Control SC-36 (Distributed Processing and Storage) is relevant to the scoping question because it addresses how and where data is processed and stored when hosted in a provider’s environment, rather than within the entity’s direct control. This contr...
NIST SA-2 Found
Allocation of Resources

Resource allocation for information security and privacy includes funding for system and services acquisition, sustainment, and supply chain-related risks throughout the system development life cycle.

Auto-Generated Generated during job processing
1. **How this control addresses the scoping question:** SA-2 ensures that adequate resources are allocated for information security and privacy throughout the system lifecycle, including when hosting entity, partner, or customer data in the provide...
NIST SC-8 Found
Transmission Confidentiality and Integrity

Protecting the confidentiality and integrity of transmitted information applies to internal and external networks as well as any system components that can transmit information, including servers, not...

Auto-Generated Generated during job processing
SC-8 (Transmission Confidentiality and Integrity) is directly relevant to the scoping question because hosting data in a provider’s network environment introduces risks associated with data transmission across internal and external networks that the ...
NIST SC-7 Found
Boundary Protection

Managed interfaces include gateways, routers, firewalls, guards, network-based malicious code analysis, virtualization systems, or encrypted tunnels implemented within a security architecture. Subnetw...

Auto-Generated Generated during job processing
SC-7 (Boundary Protection) is directly relevant to the scoping question because hosting data in the provider’s network environment introduces risks related to unauthorized access, data leakage, and co-tenant threats. This control ensures that managed...
Scoping Question 12

Is continuous (24/7) availability required for this service? Establishes whether the service must run without interruption (e.g., call center, global e-commerce). Leaves little maintenance window, higher ops burden, risk of slip-ups or fatigue-related errors in support shifts. SLAs with uptime guarantees Geographically redundant infrastructure Automated alerting and escalation paths

9 Controls
NIST CA-7 Found
Continuous Monitoring

Continuous monitoring at the system level facilitates ongoing awareness of the system security and privacy posture to support organizational risk management decisions. The terms continuous and ongoing...

Auto-Generated Generated during job processing
CA-7 (Continuous Monitoring) is directly relevant to the scoping question of whether 24/7 availability is required, as it ensures ongoing awareness of system health, security, and operational status—critical for services that must remain uninterrupte...
NIST MA-6 Found
Timely Maintenance

Organizations specify the system components that result in increased risk to organizational operations and assets, individuals, other organizations, or the Nation when the functionality provided by th...

Auto-Generated Generated during job processing
MA-6 (Timely Maintenance) is directly relevant to the scoping question about 24/7 availability because it ensures that critical system components receive prompt maintenance, minimizing downtime and supporting continuous service operations. This contr...
NIST CP-8
Telecommunications Services

Telecommunications services (for data and voice) for primary and alternate processing and storage sites are in scope for CP-8. Alternate telecommunications services reflect the continuity requirements...

Auto-Generated Generated during job processing
CP-8 (Telecommunications Services) is directly relevant to the scoping question because continuous (24/7) availability requires resilient and redundant telecommunications to ensure uninterrupted service, even if primary connections fail. This control...
NIST CP-7
Alternate Processing Site

Alternate processing sites are geographically distinct from primary processing sites and provide processing capability if the primary processing site is not available. The alternate processing capabil...

Auto-Generated Generated during job processing
The CP-7 Alternate Processing Site control directly addresses the scoping question by ensuring that the service can maintain continuous (24/7) availability, even if the primary site experiences a disruption. This control is important for compliance b...
NIST SI-17
Fail-safe Procedures

Failure conditions include the loss of communications among critical system components or between system components and operational facilities. Fail-safe procedures include alerting operator personnel...

Auto-Generated Generated during job processing
1. SI-17 (Fail-safe Procedures) addresses the scoping question by ensuring that, in the event of a failure or loss of communication, there are predefined steps to maintain or quickly restore service availability, which is critical for services requir...
NIST PM-31
Continuous Monitoring Strategy

Continuous monitoring at the organization level facilitates ongoing awareness of the security and privacy posture across the organization to support organizational risk management decisions. The terms...

Auto-Generated Generated during job processing
1. The Continuous Monitoring Strategy (PM-31) directly addresses the scoping question by ensuring that the security and privacy posture of a service with 24/7 availability requirements is continuously assessed and monitored, enabling rapid detection ...
NIST SI-13
Predictable Failure Prevention

While MTTF is primarily a reliability issue, predictable failure prevention is intended to address potential failures of system components that provide security capabilities. Failure rates reflect ins...

Auto-Generated Generated during job processing
1. SI-13 (Predictable Failure Prevention) directly addresses the scoping question by ensuring that critical system components can fail over seamlessly, supporting the requirement for continuous (24/7) service availability. 2. This control is importan...
NIST CP-2
Contingency Plan

Contingency planning for systems is part of an overall program for achieving continuity of operations for organizational mission and business functions. Contingency planning addresses system restorati...

Auto-Generated Generated during job processing
1. **How this control addresses the scoping question:** CP-2 (Contingency Plan) directly supports the requirement for continuous (24/7) availability by ensuring that plans and procedures are in place to maintain or quickly restore service in the ev...
NIST PE-12
Emergency Lighting

The provision of emergency lighting applies primarily to organizational facilities that contain concentrations of system resources, including data centers, server rooms, and mainframe computer rooms. ...

Auto-Generated Generated during job processing
1. Emergency lighting (PE-12) is directly relevant to the scoping question because continuous (24/7) service availability requires that critical facilities, such as data centers, remain operational and accessible during power outages or emergencies. ...
Scoping Question 13

Will any part of the work be performed—or deliverables hosted—outside the United States? Reveals cross-border execution or hosting, with implications for time zones, language, and differing regulations. May violate data-sovereignty laws, complicate breach-notification requirements, and introduce communication or time-zone challenges. Data-residency and export-control policies Encryption of data in transit and at rest Jurisdiction-specific compliance attestations

4 Controls
NIST SI-5 Found
Security Alerts, Advisories, and Directives

The Cybersecurity and Infrastructure Security Agency (CISA) generates security alerts and advisories to maintain situational awareness throughout the Federal Government. Security directives are issued...

Auto-Generated Generated during job processing
1. **How this control addresses the scoping question:** SI-5 ensures that organizations remain aware of and respond to security alerts, advisories, and directives—including those that may be specific to the jurisdictions where work or data hosting ...
NIST CP-6
Alternate Storage Site

Alternate storage sites are geographically distinct from primary storage sites and maintain duplicate copies of information and data if the primary storage site is not available. Similarly, alternate ...

Auto-Generated Generated during job processing
Control CP-6 (Alternate Storage Site) is directly relevant to the scoping question because it requires organizations to identify and manage the geographic locations where backup data and processing capabilities are maintained, including whether these...
NIST AC-4 Found
Information Flow Enforcement

Information flow control regulates where information can travel within a system and between systems (in contrast to who is allowed to access the information) and without regard to subsequent accesses ...

Auto-Generated Generated during job processing
AC-4 (Information Flow Enforcement) is directly relevant to the scoping question because it ensures that information transferred between systems—including those located or operated outside the United States—complies with organizational and jurisdicti...
NIST CP-7
Alternate Processing Site

Alternate processing sites are geographically distinct from primary processing sites and provide processing capability if the primary processing site is not available. The alternate processing capabil...

Auto-Generated Generated during job processing
Control CP-7 (Alternate Processing Site) is directly relevant to the scoping question because it requires organizations to identify and manage geographically distinct backup or failover locations, which may be outside the United States. This control ...
Scoping Question 14

Does the service entail custom or bespoke development unique to entity? Flags projects that require tailored code, configurations, or processes rather than off-the-shelf solutions. Custom solutions are harder to maintain, increase dependency, and may not be supported by other providers or future upgrades. Secure SDLC with code reviews Version-controlled documentation Exit-ready source-code escrow

3 Controls
NIST SA-22 Found
Unsupported System Components

Support for system components includes software patches, firmware updates, replacement parts, and maintenance contracts. An example of unsupported components includes when vendors no longer provide cr...

Auto-Generated Generated during job processing
Control SA-22 is directly relevant to the scoping question because custom or bespoke development often results in unique system components that may not receive ongoing vendor support, making them susceptible to security vulnerabilities if patches or ...
NIST SA-20
Customized Development of Critical Components

Organizations determine that certain system components likely cannot be trusted due to specific threats to and vulnerabilities in those components for which there are no viable security controls to ad...

Auto-Generated Generated during job processing
SA-20 is directly relevant to the scoping question because it governs the secure development and management of custom or bespoke system components, which are flagged by the question as requiring tailored code or configurations. This control is import...
NIST SA-15
Development Process, Standards, and Tools

Development tools include programming languages and computer-aided design systems. Reviews of development processes include the use of maturity models to determine the potential effectiveness of such ...

Auto-Generated Generated during job processing
SA-15 is directly relevant to the scoping question because it ensures that custom or bespoke development follows standardized, controlled processes and uses approved tools, reducing risks associated with tailored code and configurations. This control...
Processing...

Please wait while we process your request