Assessment
Submission
AI Processing
& Analysis
Key Controls
Review
4
Final
Results
Search & Add Controls
AI-powered search finds controls based on meaning and context
AI Search Results

Found semantically similar controls

0 results

Current Key Controls

179 Total
Scoping Question 1

Will the entity’s personnel require specialized clearances or certifications? Determines if staff need background checks, professional licenses, or industry certifications before starting work. Delays onboarding if certifications lapse; compliance risk if unauthorised staff perform regulated tasks. Credential-verification process Expiration-tracking of certifications Backup resource plan for lapsed clearances

73 Controls
CIS 5.1
Establish and Maintain an Inventory of Accounts

Establish and maintain an inventory of all accounts managed in the enterprise. The inventory must at a minimum include user, administrator accounts, and service accounts. The inventory, at a minimum, ...

Auto-Generated Generated during job processing
Control 5.1 is relevant to the scoping question because maintaining an accurate inventory of accounts ensures that only personnel with the required clearances or certifications have active access to systems and data. This control is important for com...
CIS 3.1 Found
Establish and Maintain a Data Management Process

Establish and maintain a documented data management process. In the process, address data sensitivity, data owner, handling of data, data retention limits, and disposal requirements, based on sensitiv...

Auto-Generated Generated during job processing
Control 3.1 is relevant to the scoping question because a documented data management process ensures that sensitive personnel information—such as background checks, certifications, and clearance statuses—is properly handled, retained, and disposed of...
CIS 2.2
Ensure Authorized Software is Currently Supported

Ensure that only currently supported software is designated as authorized in the software inventory for enterprise assets. If software is unsupported, yet necessary for the fulfillment of the enterpri...

Auto-Generated Generated during job processing
1. This control addresses the scoping question by ensuring that personnel only use authorized, currently supported software, which may be required for maintaining certain professional certifications or regulatory clearances. 2. It is important for co...
NIST PE-3 Found
Physical Access Control

Physical access control applies to employees and visitors. Individuals with permanent physical access authorizations are not considered visitors. Physical access controls for publicly accessible areas...

Auto-Generated Generated during job processing
PE-3 Physical Access Control is directly relevant to the scoping question because it ensures that only personnel with the required specialized clearances or certifications can access restricted areas or systems. This control is important for complian...
NIST AT-3
Role-based Training

Organizations determine the content of training based on the assigned roles and responsibilities of individuals as well as the security and privacy requirements of organizations and the systems to whi...

Auto-Generated Generated during job processing
1. Control AT-3 (Role-based Training) addresses the scoping question by ensuring personnel receive training tailored to their specific roles, including any specialized clearances or certifications required for compliance with regulatory or organizati...
NIST SA-9 Found
External System Services

External system services are provided by an external provider, and the organization has no direct control over the implementation of the required controls or the assessment of control effectiveness. O...

Auto-Generated Generated during job processing
1. Control SA-9 addresses the scoping question by requiring organizations to ensure that external service providers meet personnel clearance and certification requirements through documented agreements and trust relationships. 2. This control is impo...
NIST SA-21
Developer Screening

Developer screening is directed at external developers. Internal developer screening is addressed by PS-3. Because the system, system component, or system service may be used in critical activities es...

Auto-Generated Generated during job processing
Control SA-21 (Developer Screening) directly addresses the scoping question by requiring verification that external developers possess the necessary clearances, background checks, and certifications before engaging in critical system activities. This...
NIST CP-3 Found
Contingency Training

Contingency training provided by organizations is linked to the assigned roles and responsibilities of organizational personnel to ensure that the appropriate content and level of detail is included i...

Auto-Generated Generated during job processing
1. CP-3 (Contingency Training) addresses the scoping question by ensuring personnel receive training tailored to their roles, including any specialized clearances or certifications required for contingency operations. 2. This control is important for...
NIST CA-6
Authorization

Authorizations are official management decisions by senior officials to authorize operation of systems, authorize the use of common controls for inheritance by organizational systems, and explicitly a...

Auto-Generated Generated during job processing
CA-6 (Authorization) is relevant to the scoping question because it requires senior officials to formally authorize system operations based on the implementation and effectiveness of security controls, including personnel credentialing and clearance ...
NIST PE-2 Found
Physical Access Authorizations

Physical access authorizations apply to employees and visitors. Individuals with permanent physical access authorization credentials are not considered visitors. Authorization credentials include ID b...

Auto-Generated Generated during job processing
1. PE-2 (Physical Access Authorizations) addresses the scoping question by ensuring that only personnel with the required clearances or certifications are granted physical access to sensitive areas, aligning access rights with credential verification...
NIST AC-3 Found
Access Enforcement

Access control policies control access between active entities or subjects (i.e., users or processes acting on behalf of users) and passive entities or objects (i.e., devices, files, records, domains)...

Auto-Generated Generated during job processing
AC-3 (Access Enforcement) is relevant to the scoping question because it ensures that only personnel with the required clearances, certifications, or licenses are granted access to sensitive systems and data. This control is important for compliance ...
NIST PM-10 Found
Authorization Process

Authorization processes for organizational systems and environments of operation require the implementation of an organization-wide risk management process and associated security and privacy standard...

Auto-Generated Generated during job processing
1. PM-10 (Authorization Process) addresses the scoping question by ensuring that only personnel with the required clearances or certifications are formally authorized to access organizational systems and environments, as part of a structured risk man...
NIST PS-3
Personnel Screening

Personnel screening and rescreening activities reflect applicable laws, executive orders, directives, regulations, policies, standards, guidelines, and specific criteria established for the risk desig...

Auto-Generated Generated during job processing
1. Control PS-3 (Personnel Screening) directly addresses the scoping question by requiring organizations to conduct background checks and verify that personnel meet all necessary clearances or certifications before granting access to sensitive system...
NIST IA-2 Found
Identification and Authentication (Organizational Users)

Organizations can satisfy the identification and authentication requirements by complying with the requirements in HSPD 12. Organizational users include employees or individuals who organizations cons...

Auto-Generated Generated during job processing
Control IA-2 is directly relevant to the scoping question because it ensures that only personnel with the required specialized clearances or certifications are uniquely identified and authenticated before accessing organizational systems. This contro...
NIST PE-6
Monitoring Physical Access

Physical access monitoring includes publicly accessible areas within organizational facilities. Examples of physical access monitoring include the employment of guards, video surveillance equipment (i...

Auto-Generated Generated during job processing
PE-6 (Monitoring Physical Access) is relevant to the scoping question because it ensures that only personnel with the required clearances or certifications can physically access sensitive or regulated areas. This control is important for compliance, ...
NIST CP-9 Found
System Backup

System-level information includes system state information, operating system software, middleware, application software, and licenses. User-level information includes information other than system-lev...

Auto-Generated Generated during job processing
CP-9 (System Backup) is relevant to the scoping question because it ensures that critical information, such as personnel clearance and certification records, is securely backed up and recoverable in case of data loss or system failure. This control i...
NIST PT-2 Found
Authority to Process Personally Identifiable Information

The processing of personally identifiable information is an operation or set of operations that the information system or organization performs with respect to personally identifiable information acro...

Auto-Generated Generated during job processing
1. This control addresses the scoping question by requiring organizations to ensure that only authorized personnel—who may need specialized clearances or certifications—are permitted to process personally identifiable information (PII). 2. It is im...
NIST PM-23
Data Governance Body

A Data Governance Body can help ensure that the organization has coherent policies and the ability to balance the utility of data with security and privacy requirements. The Data Governance Body estab...

Auto-Generated Generated during job processing
1. The Data Governance Body (PM-23) addresses the scoping question by establishing and enforcing policies that define personnel requirements for data access, including the need for specialized clearances or certifications. 2. This control is importan...
NIST AU-1 Found
Policy and Procedures

Audit and accountability policy and procedures address the controls in the AU family that are implemented within systems and organizations. The risk management strategy is an important factor in estab...

Auto-Generated Generated during job processing
Control AU-1 (Policy and Procedures) is relevant to the scoping question because it requires the organization to formally document and implement policies and procedures—including those governing credential verification, certification tracking, and pe...
NIST SA-23
Specialization

It is often necessary for a system or system component that supports mission-essential services or functions to be enhanced to maximize the trustworthiness of the resource. Sometimes this enhancement ...

Auto-Generated Generated during job processing
1. Control SA-23 (Specialization) addresses the scoping question by requiring enhancements—such as supplemental authentication or non-repudiation—to ensure that only personnel with the necessary clearances or certifications can access or perform miss...
NIST PS-7 Found
External Personnel Security

External provider refers to organizations other than the organization operating or acquiring the system. External providers include service bureaus, contractors, and other organizations that provide s...

Auto-Generated Generated during job processing
1. This control addresses the scoping question by requiring organizations to include personnel security requirements—such as background checks, certifications, and clearances—in contracts with external providers, ensuring that all staff (including co...
NIST AC-2 Found
Account Management

Examples of system account types include individual, shared, group, system, guest, anonymous, emergency, developer, temporary, and service. Identification of authorized system users and the specificat...

Auto-Generated Generated during job processing
1. AC-2 (Account Management) addresses the scoping question by requiring organizations to identify and authorize system users, including verifying that personnel possess the necessary clearances or certifications before granting access to accounts, e...
NIST PS-2 Found
Position Risk Designation

Position risk designations reflect Office of Personnel Management (OPM) policy and guidance. Proper position designation is the foundation of an effective and consistent suitability and personnel secu...

Auto-Generated Generated during job processing
1. Control PS-2 (Position Risk Designation) directly addresses the scoping question by requiring organizations to formally assess and designate the risk and sensitivity levels of each position, which determines whether specialized clearances, backgro...
NIST MA-5 Found
Maintenance Personnel

Maintenance personnel refers to individuals who perform hardware or software maintenance on organizational systems, while PE-2 addresses physical access for individuals whose maintenance duties place ...

Auto-Generated Generated during job processing
MA-5 (Maintenance Personnel) is directly relevant to the scoping question because it requires organizations to verify that maintenance staff possess appropriate clearances or certifications before granting access to systems, including issuing tempora...
NIST PT-7 Found
Specific Categories of Personally Identifiable Information

Organizations apply any conditions or protections that may be necessary for specific categories of personally identifiable information. These conditions may be required by laws, executive orders, dire...

Auto-Generated Generated during job processing
Control PT-7 is relevant to the scoping question because personnel clearances and certifications often involve collecting and handling sensitive categories of personally identifiable information (PII), such as background check data or professional li...
NIST CA-7 Found
Continuous Monitoring

Continuous monitoring at the system level facilitates ongoing awareness of the system security and privacy posture to support organizational risk management decisions. The terms continuous and ongoing...

Auto-Generated Generated during job processing
**Justification:** 1. CA-7 (Continuous Monitoring) addresses the scoping question by ensuring that the organization maintains ongoing oversight of personnel clearances and certifications, promptly identifying lapses or expirations that could impact ...
NIST IA-7 Found
Cryptographic Module Authentication

Authentication mechanisms may be required within a cryptographic module to authenticate an operator accessing the module and to verify that the operator is authorized to assume the requested role and ...

Auto-Generated Generated during job processing
1. IA-7 (Cryptographic Module Authentication) addresses the scoping question by ensuring that only personnel with the required clearances or certifications can access sensitive cryptographic modules, verifying their authorization before granting acce...
NIST PM-21 Found
Accounting of Disclosures

The purpose of accounting of disclosures is to allow individuals to learn to whom their personally identifiable information has been disclosed, to provide a basis for subsequently advising recipients ...

Auto-Generated Generated during job processing
1. Control PM-21 (Accounting of Disclosures) addresses the scoping question by ensuring that any disclosure of personnel information—such as background checks, certifications, or clearance status—is tracked and auditable. 2. This control is important...
NIST PS-4 Found
Personnel Termination

System property includes hardware authentication tokens, system administration technical manuals, keys, identification cards, and building passes. Exit interviews ensure that terminated individuals un...

Auto-Generated Generated during job processing
PS-4 Personnel Termination is relevant to the scoping question because it ensures that when staff with specialized clearances or certifications leave the organization, their access to sensitive systems and property is promptly revoked and their oblig...
NIST AC-5 Found
Separation of Duties

Separation of duties addresses the potential for abuse of authorized privileges and helps to reduce the risk of malevolent activity without collusion. Separation of duties includes dividing mission or...

Auto-Generated Generated during job processing
1. AC-5 (Separation of Duties) addresses the scoping question by ensuring that only personnel with the required clearances or certifications are assigned to specific roles, preventing unauthorized individuals from performing regulated tasks. 2. This ...
NIST PT-3
Personally Identifiable Information Processing Purposes

Identifying and documenting the purpose for processing provides organizations with a basis for understanding why personally identifiable information may be processed. The term process includes every s...

Auto-Generated Generated during job processing
Control PT-3 is relevant to the scoping question because verifying personnel clearances or certifications often requires processing personally identifiable information (PII), such as background checks or license details. This control ensures that the...
NIST IA-11
Re-authentication

In addition to the re-authentication requirements associated with device locks, organizations may require re-authentication of individuals in certain situations, including when roles, authenticators o...

Auto-Generated Generated during job processing
Control IA-11 (Re-authentication) is relevant to the scoping question because it ensures that personnel maintain valid credentials and clearances when their roles or access requirements change, directly supporting the need for ongoing credential veri...
NIST CA-1 Found
Policy and Procedures

Assessment, authorization, and monitoring policy and procedures address the controls in the CA family that are implemented within systems and organizations. The risk management strategy is an importan...

Auto-Generated Generated during job processing
CA-1 (Policy and Procedures) is relevant to the scoping question because it requires the organization to formally establish and document policies and procedures for assessment, authorization, and monitoring—including those governing personnel clearan...
NIST AC-25 Found
Reference Monitor

A reference monitor is a set of design requirements on a reference validation mechanism that, as a key component of an operating system, enforces an access control policy over all subjects and objects...

Auto-Generated Generated during job processing
1. AC-25 (Reference Monitor) ensures that only authorized personnel—those with the required clearances or certifications—can access sensitive systems and data, directly addressing the need to restrict access based on staff credentials. 2. This contro...
NIST IA-1 Found
Policy and Procedures

Identification and authentication policy and procedures address the controls in the IA family that are implemented within systems and organizations. The risk management strategy is an important factor...

Auto-Generated Generated during job processing
Control IA-1 (Policy and Procedures) is directly relevant to the scoping question because it requires the organization to formally establish and document processes for verifying personnel credentials, tracking certification expirations, and managing ...
NIST PS-1 Found
Policy and Procedures

Personnel security policy and procedures for the controls in the PS family that are implemented within systems and organizations. The risk management strategy is an important factor in establishing su...

Auto-Generated Generated during job processing
Control PS-1 (Policy and Procedures) is directly relevant to the scoping question because it requires the organization to formally establish and document personnel security policies and procedures, including those governing specialized clearances and...
NIST PM-11 Found
Mission and Business Process Definition

Protection needs are technology-independent capabilities that are required to counter threats to organizations, individuals, systems, and the Nation through the compromise of information (i.e., loss o...

Auto-Generated Generated during job processing
1. **How this control addresses the scoping question:** PM-11 requires organizations to define mission and business processes, including the identification of protection needs and associated risks. This process inherently involves determining wheth...
NIST CP-7 Found
Alternate Processing Site

Alternate processing sites are geographically distinct from primary processing sites and provide processing capability if the primary processing site is not available. The alternate processing capabil...

Auto-Generated Generated during job processing
Control CP-7 (Alternate Processing Site) is relevant to the scoping question because it requires organizations to consider personnel requirements—including specialized clearances or certifications—when transferring operations to an alternate site. Th...
NIST RA-3
Risk Assessment

Risk assessments consider threats, vulnerabilities, likelihood, and impact to organizational operations and assets, individuals, other organizations, and the Nation. Risk assessments also consider ris...

Auto-Generated Generated during job processing
1. RA-3 (Risk Assessment) addresses the scoping question by requiring the organization to systematically evaluate risks associated with personnel who may need specialized clearances or certifications, including the potential impact of unauthorized or...
NIST PL-4 Found
Rules of Behavior

Rules of behavior represent a type of access agreement for organizational users. Other types of access agreements include nondisclosure agreements, conflict-of-interest agreements, and acceptable use ...

Auto-Generated Generated during job processing
PL-4 (Rules of Behavior) is relevant to the scoping question because it ensures that personnel with specialized clearances or certifications formally acknowledge and understand the specific behavioral expectations, access limitations, and compliance ...
NIST PS-9 Found
Position Descriptions

Specification of security and privacy roles in individual organizational position descriptions facilitates clarity in understanding the security or privacy responsibilities associated with the roles a...

Auto-Generated Generated during job processing
Control PS-9 (Position Descriptions) is directly relevant to the scoping question because it ensures that required security clearances, certifications, and background checks are explicitly documented in job roles. This clarity helps organizations ver...
NIST SR-4 Found
Provenance

Every system and system component has a point of origin and may be changed throughout its existence. Provenance is the chronology of the origin, development, ownership, location, and changes to a syst...

Auto-Generated Generated during job processing
Control SR-4 (Provenance) is relevant to the scoping question because it requires organizations to document and monitor the origin and changes related to personnel and processes interacting with systems, including credentialing and clearance status. ...
NIST PE-16 Found
Delivery and Removal

Enforcing authorizations for entry and exit of system components may require restricting access to delivery areas and isolating the areas from the system and media libraries.

Auto-Generated Generated during job processing
PE-16 (Delivery and Removal) is relevant to the scoping question because it ensures that only authorized personnel—those with required clearances or certifications—can access sensitive delivery and removal areas, preventing unauthorized handling of s...
NIST CA-2 Found
Control Assessments

Organizations ensure that control assessors possess the required skills and technical expertise to develop effective assessment plans and to conduct assessments of system-specific, hybrid, common, and...

Auto-Generated Generated during job processing
1. **How this control addresses the scoping question:** CA-2 (Control Assessments) ensures that personnel conducting security and privacy control assessments possess the necessary skills, certifications, and expertise, directly addressing whether s...
NIST AT-1 Found
Policy and Procedures

Awareness and training policy and procedures address the controls in the AT family that are implemented within systems and organizations. The risk management strategy is an important factor in establi...

Auto-Generated Generated during job processing
Control AT-1 (Policy and Procedures) is directly relevant to the scoping question because it requires organizations to formally establish and document policies and procedures for verifying personnel credentials, tracking certification expirations, an...
NIST IA-8
Identification and Authentication (Non-organizational Users)

Non-organizational users include system users other than organizational users explicitly covered by IA-2. Non-organizational users are uniquely identified and authenticated for accesses other than tho...

Auto-Generated Generated during job processing
Control IA-8 is relevant to the scoping question because it ensures that non-organizational users—such as contractors or third parties—are uniquely identified and authenticated before accessing systems, which may require verification of specialized c...
NIST AC-14 Found
Permitted Actions Without Identification or Authentication

Specific user actions may be permitted without identification or authentication if organizations determine that identification and authentication are not required for the specified user actions. Organ...

Auto-Generated Generated during job processing
AC-14 is relevant to the scoping question because it defines which actions, if any, personnel can perform without prior identification or authentication, directly impacting whether specialized clearances or certifications are required for those actio...
NIST IA-12 Found
Identity Proofing

Identity proofing is the process of collecting, validating, and verifying a user’s identity information for the purposes of establishing credentials for accessing a system. Identity proofing is ...

Auto-Generated Generated during job processing
1. **How this control addresses the scoping question:** IA-12 (Identity Proofing) ensures that personnel identities are accurately collected, validated, and verified before system access is granted, directly supporting the requirement to confirm sp...
NIST PE-8
Visitor Access Records

Visitor access records include the names and organizations of individuals visiting, visitor signatures, forms of identification, dates of access, entry and departure times, purpose of visits, and the ...

Auto-Generated Generated during job processing
PE-8 (Visitor Access Records) is relevant to the scoping question because it ensures that only authorized individuals with the required clearances or certifications are granted access to sensitive areas. This control is important for compliance as it...
NIST IA-5 Found
Authenticator Management

Authenticators include passwords, cryptographic devices, biometrics, certificates, one-time password devices, and ID badges. Device authenticators include certificates and passwords. Initial authentic...

Auto-Generated Generated during job processing
1. Control IA-5 (Authenticator Management) addresses the scoping question by ensuring that only personnel with valid, verified credentials—such as certificates, badges, or biometric authenticators—are granted access to systems and sensitive functions...
NIST PM-31
Continuous Monitoring Strategy

Continuous monitoring at the organization level facilitates ongoing awareness of the security and privacy posture across the organization to support organizational risk management decisions. The terms...

Auto-Generated Generated during job processing
1. The Continuous Monitoring Strategy (PM-31) addresses the scoping question by ensuring that the organization maintains ongoing oversight of personnel clearances and certifications, promptly identifying lapses or expirations that could impact compli...
NIST AT-4
Training Records

Documentation for specialized training may be maintained by individual supervisors at the discretion of the organization. The National Archives and Records Administration provides guidance on records ...

Auto-Generated Generated during job processing
Control AT-4 (Training Records) is relevant to the scoping question because it ensures that documentation of personnel’s specialized training, certifications, and clearances is properly maintained and accessible. This control is important for complia...
NIST RA-1 Found
Policy and Procedures

Risk assessment policy and procedures address the controls in the RA family that are implemented within systems and organizations. The risk management strategy is an important factor in establishing s...

Auto-Generated Generated during job processing
RA-1 (Policy and Procedures) is relevant to the scoping question because it ensures the organization establishes formal policies and procedures for risk assessment, including requirements for personnel clearances and certifications. This control is i...
NIST CP-1 Found
Policy and Procedures

Contingency planning policy and procedures address the controls in the CP family that are implemented within systems and organizations. The risk management strategy is an important factor in establish...

Auto-Generated Generated during job processing
Control CP-1 (Policy and Procedures) is relevant to the scoping question because it requires the organization to formally establish and document policies and procedures for contingency planning, including those related to personnel clearances and cer...
NIST SA-3 Found
System Development Life Cycle

A system development life cycle process provides the foundation for the successful development, implementation, and operation of organizational systems. The integration of security and privacy conside...

Auto-Generated Generated during job processing
1. **How this control addresses the scoping question:** SA-3 requires that only qualified personnel with appropriate expertise and training are involved in system development life cycle (SDLC) activities, directly supporting the need to verify spec...
NIST PM-12
Insider Threat Program

Organizations that handle classified information are required, under Executive Order 13587 EO 13587 and the National Insider Threat Policy ODNI NITP, to establish insider threat programs. The same sta...

Auto-Generated Generated during job processing
1. The Insider Threat Program (PM-12) addresses the scoping question by requiring organizations to monitor and assess personnel for risks related to unauthorized access or misuse, which includes verifying that staff possess and maintain necessary cle...
NIST PT-5
Privacy Notice

Privacy notices help inform individuals about how their personally identifiable information is being processed by the system or organization. Organizations use privacy notices to inform individuals ab...

Auto-Generated Generated during job processing
The PT-5 Privacy Notice control is relevant to the scoping question because personnel requiring specialized clearances or certifications must provide personally identifiable information (PII) during background checks and credential verification proce...
NIST AC-1 Found
Policy and Procedures

Access control policy and procedures address the controls in the AC family that are implemented within systems and organizations. The risk management strategy is an important factor in establishing su...

Auto-Generated Generated during job processing
AC-1 (Policy and Procedures) is directly relevant to the scoping question because it requires the organization to formally define and document access control policies and procedures, including requirements for personnel clearances and certifications....
NIST SR-5
Acquisition Strategies, Tools, and Methods

The use of the acquisition process provides an important vehicle to protect the supply chain. There are many useful tools and techniques available, including obscuring the end use of a system or syste...

Auto-Generated Generated during job processing
SR-5 is relevant to the scoping question because it requires organizations to incorporate personnel clearance and certification requirements into acquisition strategies, ensuring that only authorized and qualified staff are engaged in supply chain ac...
NIST PL-10
Baseline Selection

Control baselines are predefined sets of controls specifically assembled to address the protection needs of a group, organization, or community of interest. Controls are chosen for baselines to either...

Auto-Generated Generated during job processing
PL-10 Baseline Selection is relevant to the scoping question because it ensures that the organization selects appropriate security and privacy controls—including those requiring personnel clearances or certifications—based on legal, regulatory, and b...
NIST PS-5 Found
Personnel Transfer

Personnel transfer applies when reassignments or transfers of individuals are permanent or of such extended duration as to make the actions warranted. Organizations define actions appropriate for the ...

Auto-Generated Generated during job processing
1. The PS-5 Personnel Transfer control addresses the scoping question by ensuring that when staff are reassigned or transferred, their specialized clearances, certifications, and access privileges are reviewed and appropriately updated or revoked. 2....
NIST SA-1 Found
Policy and Procedures

System and services acquisition policy and procedures address the controls in the SA family that are implemented within systems and organizations. The risk management strategy is an important factor i...

Auto-Generated Generated during job processing
1. Control SA-1 ensures that the organization establishes and maintains policies and procedures for system and services acquisition, which includes requirements for personnel clearances and certifications. 2. This control is important for compliance ...
NIST CM-4 Found
Impact Analyses

Organizational personnel with security or privacy responsibilities conduct impact analyses. Individuals conducting impact analyses possess the necessary skills and technical expertise to analyze the c...

Auto-Generated Generated during job processing
CM-4 (Impact Analyses) is relevant to the scoping question because it ensures that personnel conducting impact analyses possess the necessary clearances, certifications, and expertise required for their security or privacy responsibilities. This cont...
NIST SI-18 Found
Personally Identifiable Information Quality Operations

Personally identifiable information quality operations include the steps that organizations take to confirm the accuracy and relevance of personally identifiable information throughout the information...

Auto-Generated Generated during job processing
1. SI-18 addresses the scoping question by ensuring the accuracy and validity of personally identifiable information (PII) used to verify personnel clearances, certifications, and licenses. 2. This control is important for compliance because relyin...
NIST PM-25 Found
Minimization of Personally Identifiable Information Used in Testing, Training, and Research

The use of personally identifiable information in testing, research, and training increases the risk of unauthorized disclosure or misuse of such information. Organizations consult with the senior age...

Auto-Generated Generated during job processing
1. This control addresses the scoping question by ensuring that, when verifying personnel clearances or certifications, any personally identifiable information (PII) used in related testing, training, or research is minimized and protected. 2. This i...
NIST SI-1 Found
Policy and Procedures

System and information integrity policy and procedures address the controls in the SI family that are implemented within systems and organizations. The risk management strategy is an important factor ...

Auto-Generated Generated during job processing
Control SI-1 (Policy and Procedures) is relevant to the scoping question because it requires the organization to formally document and implement policies and procedures for verifying personnel credentials, tracking certification expirations, and mana...
NIST SI-6
Security and Privacy Function Verification

Transitional states for systems include system startup, restart, shutdown, and abort. System notifications include hardware indicator lights, electronic alerts to system administrators, and messages t...

Auto-Generated Generated during job processing
1. SI-6 (Security and Privacy Function Verification) is relevant to the scoping question because it ensures that system functions—such as credential verification and access controls—operate correctly during transitional states, preventing unauthorize...
NIST PT-1 Found
Policy and Procedures

Personally identifiable information processing and transparency policy and procedures address the controls in the PT family that are implemented within systems and organizations. The risk management s...

Auto-Generated Generated during job processing
Control PT-1 (Policy and Procedures) is relevant to the scoping question because it requires the organization to formally document and implement policies and procedures for processing personally identifiable information, including staff credential ve...
NIST PM-13 Found
Security and Privacy Workforce

Security and privacy workforce development and improvement programs include defining the knowledge, skills, and abilities needed to perform security and privacy duties and tasks; developing role-based...

Auto-Generated Generated during job processing
Control PM-13 is directly relevant to the scoping question because it requires organizations to define and verify the qualifications, clearances, and certifications needed for personnel in security and privacy roles. This control is important for com...
NIST MA-1 Found
Policy and Procedures

Maintenance policy and procedures address the controls in the MA family that are implemented within systems and organizations. The risk management strategy is an important factor in establishing such ...

Auto-Generated Generated during job processing
MA-1 (Policy and Procedures) is relevant to the scoping question because it ensures that the organization formally documents and enforces processes for verifying personnel credentials, tracking certification expirations, and managing backup resources...
NIST AT-2
Literacy Training and Awareness

Organizations provide basic and advanced levels of literacy training to system users, including measures to test the knowledge level of users. Organizations determine the content of literacy training ...

Auto-Generated Generated during job processing
Control AT-2 (Literacy Training and Awareness) is relevant to the scoping question because it ensures personnel are regularly trained and made aware of the security, privacy, and compliance requirements associated with specialized clearances or certi...
NIST PS-8 Found
Personnel Sanctions

Organizational sanctions reflect applicable laws, executive orders, directives, regulations, policies, standards, and guidelines. Sanctions processes are described in access agreements and can be incl...

Auto-Generated Generated during job processing
Control PS-8 (Personnel Sanctions) is relevant to the scoping question because it ensures that personnel who lack required clearances or certifications, or whose credentials have lapsed, are subject to appropriate organizational sanctions. This contr...
NIST PE-1 Found
Policy and Procedures

Physical and environmental protection policy and procedures address the controls in the PE family that are implemented within systems and organizations. The risk management strategy is an important fa...

Auto-Generated Generated during job processing
Control PE-1 (Policy and Procedures) is relevant to the scoping question because it requires the organization to establish and document policies and procedures that address physical and environmental protection, including personnel credentialing and ...
Scoping Question 2

Will the entity have physical access to the entity’s managed devices (e.g., laptops, smartphones, tablets)? Determines if the entity’s personnel will handle or use corporate-owned endpoints, which may store sensitive data. Direct device access can lead to data leakage, malware introduction, or unauthorised configuration changes. Device inventory and tracking Endpoint security policies (e.g., MDM enforcement) Access logging and tamper-evident seals

60 Controls
CIS 4.11
Enforce Remote Wipe Capability on Portable End-User Devices

Remotely wipe enterprise data from enterprise-owned portable end-user devices when deemed appropriate such as lost or stolen devices, or when an individual no longer supports the enterprise.

Auto-Generated Generated during job processing
Control 4.11 is directly relevant to the scoping question because it ensures that sensitive enterprise data on managed devices can be securely erased if those devices are lost, stolen, or no longer in use by authorized personnel. This control is impo...
CIS 3.14 Found
Log Sensitive Data Access

Log sensitive data access, including modification and disposal.

Auto-Generated Generated during job processing
Control 3.14, "Log Sensitive Data Access," is directly relevant to the scoping question because it ensures that all access, modification, or disposal of sensitive data on managed devices is recorded. This control is important for compliance as it pro...
CIS 1.1
Establish and Maintain Detailed Enterprise Asset Inventory

Establish and maintain an accurate, detailed, and up-to-date inventory of all enterprise assets with the potential to store or process data, to include: end-user devices (including portable and mobile...

Auto-Generated Generated during job processing
Control 1.1 is directly relevant to the scoping question because maintaining a detailed inventory of all managed devices ensures the organization knows which endpoints personnel can physically access. This control is critical for compliance as it ena...
CIS 4.1
Establish and Maintain a Secure Configuration Process

Establish and maintain a documented secure configuration process for enterprise assets (end-user devices, including portable and mobile, non-computing/IoT devices, and servers) and software (operating...

Auto-Generated Generated during job processing
Control 4.1 is directly relevant to the scoping question because it ensures that all managed devices with physical access are configured securely, reducing risks of data leakage, malware introduction, or unauthorized changes. This control is importan...
CIS 3.5 Found
Securely Dispose of Data

Securely dispose of data as outlined in the enterprise’s documented data management process. Ensure the disposal process and method are commensurate with the data sensitivity.

Auto-Generated Generated during job processing
Control 3.5 (Securely Dispose of Data) is relevant to the scoping question because personnel with physical access to managed devices may be responsible for disposing of those devices or the data stored on them. This control ensures that sensitive dat...
CIS 4.6 Found
Securely Manage Enterprise Assets and Software

Securely manage enterprise assets and software. Example implementations include managing configuration through version-controlled Infrastructure-as-Code (IaC) and accessing administrative interfaces o...

Auto-Generated Generated during job processing
Control 4.6 is relevant to the scoping question because it ensures that all enterprise assets, including managed devices with physical access, are securely configured and managed using secure protocols. This control is important for compliance as it ...
CIS 4.12
Separate Enterprise Workspaces on Mobile End-User Devices

Ensure separate enterprise workspaces are used on mobile end-user devices, where supported. Example implementations include using an Apple® Configuration Profile or Android™ Work Profile to separate e...

Auto-Generated Generated during job processing
Control 4.12 is relevant to the scoping question because it ensures that sensitive corporate data on managed mobile devices is logically separated from personal data, reducing the risk of data leakage or unauthorized access when personnel have physic...
CIS 4.2
Establish and Maintain a Secure Configuration Process for Network Infrastructure

Establish and maintain a documented secure configuration process for network devices. Review and update documentation annually, or when significant enterprise changes occur that could impact this Safe...

Auto-Generated Generated during job processing
Control 4.2 is relevant to the scoping question because establishing and maintaining a secure configuration process for network infrastructure helps ensure that managed devices connecting to the network are protected against unauthorized access and c...
NIST AU-6 Found
Audit Record Review, Analysis, and Reporting

Audit record review, analysis, and reporting covers information security- and privacy-related logging performed by organizations, including logging that results from the monitoring of account usage, r...

Auto-Generated Generated during job processing
Control AU-6 (Audit Record Review, Analysis, and Reporting) is relevant to the scoping question because it ensures that all physical access to managed devices is logged, reviewed, and analyzed for potential security incidents. This control is importa...
NIST PE-3 Found
Physical Access Control

Physical access control applies to employees and visitors. Individuals with permanent physical access authorizations are not considered visitors. Physical access controls for publicly accessible areas...

Auto-Generated Generated during job processing
PE-3 Physical Access Control is directly relevant to the scoping question because it governs how personnel and visitors can physically access managed devices, such as laptops and smartphones, within the organization’s premises. This control is crucia...
NIST PE-2 Found
Physical Access Authorizations

Physical access authorizations apply to employees and visitors. Individuals with permanent physical access authorization credentials are not considered visitors. Authorization credentials include ID b...

Auto-Generated Generated during job processing
Control PE-2 (Physical Access Authorizations) is directly relevant to the scoping question because it governs who is permitted to physically access managed devices, such as laptops and smartphones, within the organization’s premises. This control is ...
NIST AC-3 Found
Access Enforcement

Access control policies control access between active entities or subjects (i.e., users or processes acting on behalf of users) and passive entities or objects (i.e., devices, files, records, domains)...

Auto-Generated Generated during job processing
AC-3 (Access Enforcement) is relevant to the scoping question because it ensures that only authorized personnel can access managed devices, thereby reducing the risk of unauthorized data access, configuration changes, or malware introduction. This co...
NIST CM-5 Found
Access Restrictions for Change

Changes to the hardware, software, or firmware components of systems or the operational procedures related to the system can potentially have significant effects on the security of the systems or indi...

Auto-Generated Generated during job processing
CM-5 (Access Restrictions for Change) is relevant to the scoping question because it ensures that only authorized personnel can make changes to managed devices, whether through physical or logical access. This control is important for compliance as i...
NIST PM-10 Found
Authorization Process

Authorization processes for organizational systems and environments of operation require the implementation of an organization-wide risk management process and associated security and privacy standard...

Auto-Generated Generated during job processing
1. **How this control addresses the scoping question:** PM-10 (Authorization Process) ensures that physical access to managed devices is formally assessed and approved through an organization-wide risk management process, considering the risks asso...
NIST SC-42 Found
Sensor Capability and Data

Sensor capability and data applies to types of systems or system components characterized as mobile devices, such as cellular telephones, smart phones, and tablets. Mobile devices often include sensor...

Auto-Generated Generated during job processing
SC-42 is relevant to the scoping question because it addresses the risks associated with physical access to managed devices that contain embedded sensors, such as cameras, microphones, and GPS. This control is important for compliance because it ensu...
NIST IA-2 Found
Identification and Authentication (Organizational Users)

Organizations can satisfy the identification and authentication requirements by complying with the requirements in HSPD 12. Organizational users include employees or individuals who organizations cons...

Auto-Generated Generated during job processing
Control IA-2 is directly relevant to the scoping question because it ensures that only authorized organizational users can access managed devices through unique identification and authentication mechanisms. This control is important for compliance as...
NIST PE-6
Monitoring Physical Access

Physical access monitoring includes publicly accessible areas within organizational facilities. Examples of physical access monitoring include the employment of guards, video surveillance equipment (i...

Auto-Generated Generated during job processing
1. **How this control addresses the scoping question:** PE-6 (Monitoring Physical Access) ensures that any physical access to managed devices is actively monitored and logged, directly addressing whether personnel can physically handle or use corpo...
NIST CP-9 Found
System Backup

System-level information includes system state information, operating system software, middleware, application software, and licenses. User-level information includes information other than system-lev...

Auto-Generated Generated during job processing
1. **How this control addresses the scoping question:** CP-9 (System Backup) is relevant because if personnel have physical access to managed devices, there is an increased risk of data loss or corruption due to theft, tampering, or accidental dama...
NIST PT-2 Found
Authority to Process Personally Identifiable Information

The processing of personally identifiable information is an operation or set of operations that the information system or organization performs with respect to personally identifiable information acro...

Auto-Generated Generated during job processing
Control PT-2 is relevant to the scoping question because physical access to managed devices increases the likelihood that personnel will interact with personally identifiable information (PII) stored or processed on those endpoints. This control ensu...
NIST SC-28 Found
Protection of Information at Rest

Information at rest refers to the state of information when it is not in process or in transit and is located on system components. Such components include internal or external hard disk drives, stora...

Auto-Generated Generated during job processing
SC-28 (Protection of Information at Rest) is directly relevant to the scoping question because personnel with physical access to managed devices can potentially access or compromise sensitive data stored on those endpoints. This control ensures that ...
NIST PM-23
Data Governance Body

A Data Governance Body can help ensure that the organization has coherent policies and the ability to balance the utility of data with security and privacy requirements. The Data Governance Body estab...

Auto-Generated Generated during job processing
The PM-23 Data Governance Body control is relevant to the scoping question because it ensures that organizational policies and procedures address the risks associated with physical access to managed devices, such as data leakage or unauthorized chang...
NIST MP-5 Found
Media Transport

System media includes digital and non-digital media. Digital media includes flash drives, diskettes, magnetic tapes, external or removable hard disk drives (e.g., solid state and magnetic), compact d...

Auto-Generated Generated during job processing
Control MP-5 (Media Transport) is relevant to the scoping question because it ensures that any physical access to managed devices—including the transport of digital media such as laptops, smartphones, and tablets—is strictly controlled and monitored....
NIST PS-7 Found
External Personnel Security

External provider refers to organizations other than the organization operating or acquiring the system. External providers include service bureaus, contractors, and other organizations that provide s...

Auto-Generated Generated during job processing
Control PS-7 (External Personnel Security) is relevant to the scoping question because it ensures that external personnel who may have physical access to managed devices are subject to appropriate security requirements, such as credentialing, access ...
NIST AC-2 Found
Account Management

Examples of system account types include individual, shared, group, system, guest, anonymous, emergency, developer, temporary, and service. Identification of authorized system users and the specificat...

Auto-Generated Generated during job processing
AC-2 (Account Management) is relevant to the scoping question because it ensures that only authorized personnel have system accounts and access privileges on managed devices, which may be physically handled by the entity. This control is important fo...
NIST MP-7
Media Use

System media includes both digital and non-digital media. Digital media includes diskettes, magnetic tapes, flash drives, compact discs, digital versatile discs, and removable hard disk drives. Non-di...

Auto-Generated Generated during job processing
MP-7 (Media Use) is directly relevant to the scoping question because it governs how personnel may use portable storage media on managed devices to prevent unauthorized data transfer or introduction of malware. This control is important for complianc...
NIST PT-7 Found
Specific Categories of Personally Identifiable Information

Organizations apply any conditions or protections that may be necessary for specific categories of personally identifiable information. These conditions may be required by laws, executive orders, dire...

Auto-Generated Generated during job processing
Control PT-7 is relevant to the scoping question because physical access to managed devices increases the risk of exposure or unauthorized handling of specific categories of personally identifiable information (PII) stored on those endpoints. This co...
NIST IA-3 Found
Device Identification and Authentication

Devices that require unique device-to-device identification and authentication are defined by type, device, or a combination of type and device. Organization-defined device types include devices that ...

Auto-Generated Generated during job processing
1. Control IA-3 (Device Identification and Authentication) addresses the scoping question by ensuring that only authorized and uniquely identified devices—such as laptops, smartphones, and tablets—can access the organization’s systems and networks. ...
NIST AU-9 Found
Protection of Audit Information

Audit information includes all information needed to successfully audit system activity, such as audit records, audit log settings, audit reports, and personally identifiable information. Audit loggin...

Auto-Generated Generated during job processing
AU-9 (Protection of Audit Information) is relevant to the scoping question because physical access to managed devices increases the risk of unauthorized access, tampering, or deletion of audit logs stored on those endpoints. This control ensures that...
NIST PE-18 Found
Location of System Components

Physical and environmental hazards include floods, fires, tornadoes, earthquakes, hurricanes, terrorism, vandalism, an electromagnetic pulse, electrical interference, and other forms of incoming elect...

Auto-Generated Generated during job processing
PE-18 (Location of System Components) is relevant to the scoping question because it ensures that managed devices are placed in secure locations, minimizing the risk of unauthorized physical access or proximity that could lead to data leakage or devi...
NIST CA-9
Internal System Connections

Internal system connections are connections between organizational systems and separate constituent system components (i.e., connections between components that are part of the same system) including ...

Auto-Generated Generated during job processing
CA-9 (Internal System Connections) is relevant to the scoping question because it governs how managed devices—such as laptops, smartphones, and tablets—connect internally within the organization’s systems. This control ensures that only authorized de...
NIST AC-19 Found
Access Control for Mobile Devices

A mobile device is a computing device that has a small form factor such that it can easily be carried by a single individual; is designed to operate without a physical connection; possesses local, non...

Auto-Generated Generated during job processing
AC-19 (Access Control for Mobile Devices) is directly relevant to the scoping question because it establishes requirements for managing and restricting physical and logical access to mobile devices such as laptops, smartphones, and tablets. This cont...
NIST PS-4 Found
Personnel Termination

System property includes hardware authentication tokens, system administration technical manuals, keys, identification cards, and building passes. Exit interviews ensure that terminated individuals un...

Auto-Generated Generated during job processing
Control PS-4 (Personnel Termination) is relevant to the scoping question because it ensures that when personnel with physical access to managed devices leave the organization, all system-related property—such as laptops, smartphones, and authenticati...
NIST IA-11
Re-authentication

In addition to the re-authentication requirements associated with device locks, organizations may require re-authentication of individuals in certain situations, including when roles, authenticators o...

Auto-Generated Generated during job processing
1. **How this control addresses the scoping question:** IA-11 (Re-authentication) is relevant because it ensures that only authorized personnel can access managed devices, especially after periods of inactivity or when sensitive actions are perform...
NIST AC-16 Found
Security and Privacy Attributes

Information is represented internally within systems using abstractions known as data structures. Internal data structures can represent different types of entities, both active and passive. Active en...

Auto-Generated Generated during job processing
**Justification:** 1. **How this control addresses the scoping question:** AC-16 ensures that security and privacy attributes are assigned to devices and data, enabling organizations to enforce access controls and information flow policies on manage...
NIST PE-20
Asset Monitoring and Tracking

Asset location technologies can help ensure that critical assets—including vehicles, equipment, and system components—remain in authorized locations. Organizations consult with the Office ...

Auto-Generated Generated during job processing
PE-20 (Asset Monitoring and Tracking) is directly relevant to the scoping question because it ensures that managed devices, such as laptops and smartphones, remain in authorized locations and are accounted for when personnel have physical access. Thi...
NIST PE-5 Found
Access Control for Output Devices

Controlling physical access to output devices includes placing output devices in locked rooms or other secured areas with keypad or card reader access controls and allowing access to authorized indivi...

Auto-Generated Generated during job processing
Control PE-5 is relevant to the scoping question because it ensures that only authorized personnel have physical access to output devices, such as monitors and printers, which may be connected to managed endpoints storing sensitive data. This control...
NIST AU-14 Found
Session Audit

Session audits can include monitoring keystrokes, tracking websites visited, and recording information and/or file transfers. Session audit capability is implemented in addition to event logging and m...

Auto-Generated Generated during job processing
AU-14 (Session Audit) is relevant to the scoping question because it enables monitoring and recording of user activity on managed devices to detect unauthorized access, data leakage, or policy violations when personnel have physical access. This cont...
NIST AC-25 Found
Reference Monitor

A reference monitor is a set of design requirements on a reference validation mechanism that, as a key component of an operating system, enforces an access control policy over all subjects and objects...

Auto-Generated Generated during job processing
AC-25 (Reference Monitor) is relevant to the scoping question because it ensures that access control policies are consistently and reliably enforced on managed devices, even when personnel have physical access. This control is important for complianc...
NIST AC-4 Found
Information Flow Enforcement

Information flow control regulates where information can travel within a system and between systems (in contrast to who is allowed to access the information) and without regard to subsequent accesses ...

Auto-Generated Generated during job processing
AC-4 Information Flow Enforcement is relevant to the scoping question because physical access to managed devices increases the risk of unauthorized data transfer or leakage between systems or domains. This control ensures that information flow is str...
NIST SI-7
Software, Firmware, and Information Integrity

Unauthorized changes to software, firmware, and information can occur due to errors or malicious activity. Software includes operating systems (with key internal components, such as kernels or drivers...

Auto-Generated Generated during job processing
1. SI-7 (Software, Firmware, and Information Integrity) is relevant to the scoping question because physical access to managed devices increases the risk of unauthorized changes to software, firmware, or sensitive information, which this control is d...
NIST PE-22
Component Marking

Hardware components that may require marking include input and output devices. Input devices include desktop and notebook computers, keyboards, tablets, and smart phones. Output devices include printe...

Auto-Generated Generated during job processing
1. **How this control addresses the scoping question:** PE-22 (Component Marking) ensures that all managed devices—such as laptops, smartphones, and tablets—are clearly marked to indicate their classification or sensitivity level, directly addressi...
NIST PE-16 Found
Delivery and Removal

Enforcing authorizations for entry and exit of system components may require restricting access to delivery areas and isolating the areas from the system and media libraries.

Auto-Generated Generated during job processing
PE-16 (Delivery and Removal) is relevant to the scoping question because it ensures that only authorized personnel can deliver or remove managed devices, thereby controlling physical access to endpoints that may store sensitive data. This control is ...
NIST AC-21 Found
Information Sharing

Information sharing applies to information that may be restricted in some manner based on some formal or administrative determination. Examples of such information include, contract-sensitive informat...

Auto-Generated Generated during job processing
AC-21 (Information Sharing) is relevant to the scoping question because personnel with physical access to managed devices may have the ability to share or transfer sensitive information stored on those endpoints. This control ensures that appropriate...
NIST IA-4
Identifier Management

Common device identifiers include Media Access Control (MAC) addresses, Internet Protocol (IP) addresses, or device-unique token identifiers. The management of individual identifiers is not applicable...

Auto-Generated Generated during job processing
IA-4 (Identifier Management) is relevant to the scoping question because it ensures that each managed device with physical access is assigned and tracked using unique identifiers, such as MAC or IP addresses. This control is important for compliance ...
NIST AC-11 Found
Device Lock

Device locks are temporary actions taken to prevent logical access to organizational systems when users stop work and move away from the immediate vicinity of those systems but do not want to log out ...

Auto-Generated Generated during job processing
The AC-11 Device Lock control is directly relevant to the scoping question because it mitigates risks associated with personnel having physical access to managed devices by automatically securing endpoints when users step away. This control is import...
NIST AC-14 Found
Permitted Actions Without Identification or Authentication

Specific user actions may be permitted without identification or authentication if organizations determine that identification and authentication are not required for the specified user actions. Organ...

Auto-Generated Generated during job processing
AC-14 is relevant to the scoping question because it governs which actions can be performed on managed devices without identification or authentication, directly impacting the risks associated with physical access. This control is important for compl...
NIST SC-37 Found
Out-of-band Channels

Out-of-band channels include local, non-network accesses to systems; network paths physically separate from network paths used for operational traffic; or non-electronic paths, such as the U.S. Postal...

Auto-Generated Generated during job processing
SC-37 (Out-of-band Channels) is relevant to the scoping question because it ensures that sensitive operations—such as device configuration changes, credential delivery, or security updates—are performed through secure, physically separate channels wh...
NIST CM-13 Found
Data Action Mapping

Data actions are system operations that process personally identifiable information. The processing of such information encompasses the full information life cycle, which includes collection, generati...

Auto-Generated Generated during job processing
CM-13 (Data Action Mapping) is relevant to the scoping question because it ensures that all personally identifiable information (PII) processed on managed devices is identified, tracked, and mapped throughout its lifecycle. This control is important ...
NIST AC-20 Found
Use of External Systems

External systems are systems that are used by but not part of organizational systems, and for which the organization has no direct control over the implementation of required controls or the assessmen...

Auto-Generated Generated during job processing
**Justification:** 1. Control AC-20 addresses the scoping question by determining whether personnel will use external (non-organizationally owned) devices to access organizational systems or data, which directly impacts physical access to managed de...
NIST AC-17 Found
Remote Access

Remote access is access to organizational systems (or processes acting on behalf of users) that communicate through external networks such as the Internet. Types of remote access include dial-up, broa...

Auto-Generated Generated during job processing
**Justification:** 1. AC-17 (Remote Access) is relevant to the scoping question because it governs how personnel access managed devices over external networks, complementing physical access controls by ensuring remote connections are secure and auth...
NIST AC-1 Found
Policy and Procedures

Access control policy and procedures address the controls in the AC family that are implemented within systems and organizations. The risk management strategy is an important factor in establishing su...

Auto-Generated Generated during job processing
Control AC-1 (Policy and Procedures) is relevant to the scoping question because it requires the organization to formally establish and document access control policies and procedures, including those governing physical access to managed devices. Thi...
NIST AC-22 Found
Publicly Accessible Content

In accordance with applicable laws, executive orders, directives, policies, regulations, standards, and guidelines, the public is not authorized to have access to nonpublic information, including info...

Auto-Generated Generated during job processing
AC-22 (Publicly Accessible Content) is relevant to the scoping question because physical access to managed devices increases the risk that sensitive, nonpublic information could be intentionally or inadvertently posted to publicly accessible systems....
NIST SC-34
Non-modifiable Executable Programs

The operating environment for a system contains the code that hosts applications, including operating systems, executives, or virtual machine monitors (i.e., hypervisors). It can also include certain ...

Auto-Generated Generated during job processing
SC-34 (Non-modifiable Executable Programs) is relevant to the scoping question because physical access to managed devices increases the risk of unauthorized modification of system software or applications. By enforcing non-modifiable executable progr...
NIST SC-4 Found
Information in Shared System Resources

Preventing unauthorized and unintended information transfer via shared system resources stops information produced by the actions of prior users or roles (or the actions of processes acting on behalf ...

Auto-Generated Generated during job processing
SC-4 is relevant to the scoping question because physical access to managed devices increases the risk that unauthorized users could access residual information left in shared system resources, such as memory or storage, after legitimate use. This co...
NIST SC-43 Found
Usage Restrictions

Usage restrictions apply to all system components including but not limited to mobile code, mobile devices, wireless access, and wired and wireless peripheral components (e.g., copiers, printers, scan...

Auto-Generated Generated during job processing
SC-43 (Usage Restrictions) is directly relevant to the scoping question because it ensures that only authorized personnel can use and access managed devices, thereby mitigating risks associated with physical access such as data leakage, malware intro...
NIST SI-8 Found
Spam Protection

System entry and exit points include firewalls, remote-access servers, electronic mail servers, web servers, proxy servers, workstations, notebook computers, and mobile devices. Spam can be transporte...

Auto-Generated Generated during job processing
**Justification:** 1. The SI-8 Spam Protection control is relevant to the scoping question because managed devices with physical access can be used to receive and interact with spam messages, which may contain malicious payloads or phishing attempts...
NIST PM-25 Found
Minimization of Personally Identifiable Information Used in Testing, Training, and Research

The use of personally identifiable information in testing, research, and training increases the risk of unauthorized disclosure or misuse of such information. Organizations consult with the senior age...

Auto-Generated Generated during job processing
1. This control is relevant to the scoping question because if personnel have physical access to managed devices, there is an increased risk that personally identifiable information (PII) could be exposed during testing, training, or research activit...
NIST MP-4 Found
Media Storage

System media includes digital and non-digital media. Digital media includes flash drives, diskettes, magnetic tapes, external or removable hard disk drives (e.g., solid state, magnetic), compact discs...

Auto-Generated Generated during job processing
MP-4 (Media Storage) is relevant to the scoping question because it ensures that any physical access to managed devices is accompanied by secure handling and storage of associated media, such as removable drives or printed materials, which may contai...
NIST SC-16 Found
Transmission of Security and Privacy Attributes

Security and privacy attributes can be explicitly or implicitly associated with the information contained in organizational systems or system components. Attributes are abstractions that represent the...

Auto-Generated Generated during job processing
SC-16 (Transmission of Security and Privacy Attributes) is relevant to the scoping question because it ensures that sensitive data on managed devices is properly labeled and protected, even when personnel have physical access. This control is importa...
NIST CM-12 Found
Information Location

Information location addresses the need to understand where information is being processed and stored. Information location includes identifying where specific information types and information reside...

Auto-Generated Generated during job processing
CM-12 (Information Location) is relevant to the scoping question because it requires the organization to identify where sensitive information is processed and stored, including on managed devices such as laptops, smartphones, and tablets. This contro...
Scoping Question 3

Does the entity use proprietary or third-party technology that must be licensed separately? Flags dependencies on paid tools, platforms, or IP that add cost or complicate your management landscape. Creates unexpected cost, version-mismatch risk, and additional vendor-management overhead. License-management tracking and renewal reminders Proof-of-license audits Evaluation of alternative open-source options

16 Controls
CIS 2.1
Establish and Maintain a Software Inventory

Establish and maintain a detailed inventory of all licensed software installed on enterprise assets. The software inventory must document the title, publisher, initial install/use date, and business p...

Auto-Generated Generated during job processing
1. This control directly addresses the scoping question by requiring a comprehensive inventory of all licensed software, enabling the organization to identify proprietary or third-party technologies that require separate licensing. 2. Maintaining an ...
CIS 2.2
Ensure Authorized Software is Currently Supported

Ensure that only currently supported software is designated as authorized in the software inventory for enterprise assets. If software is unsupported, yet necessary for the fulfillment of the enterpri...

Auto-Generated Generated during job processing
Control 2.2 is relevant to the scoping question because it requires organizations to inventory and verify that all authorized software—including proprietary or third-party technology requiring separate licenses—is currently supported. This control is...
NIST AU-16 Found
Cross-organizational Audit Logging

When organizations use systems or services of external organizations, the audit logging capability necessitates a coordinated, cross-organization approach. For example, maintaining the identity of ind...

Auto-Generated Generated during job processing
AU-16 (Cross-organizational Audit Logging) is relevant to the scoping question because the use of proprietary or third-party technology often involves data and service interactions across organizational boundaries, requiring coordinated audit logging...
NIST SR-8 Found
Notification Agreements

The establishment of agreements and procedures facilitates communications among supply chain entities. Early notification of compromises and potential compromises in the supply chain that can potentia...

Auto-Generated Generated during job processing
1. Control SR-8 (Notification Agreements) addresses the scoping question by ensuring that entities using proprietary or third-party technology have formal agreements in place for timely communication about incidents, such as license expirations, brea...
NIST SR-6 Found
Supplier Assessments and Reviews

An assessment and review of supplier risk includes security and supply chain risk management processes, foreign ownership, control or influence (FOCI), and the ability of the supplier to effectively a...

Auto-Generated Generated during job processing
SR-6 (Supplier Assessments and Reviews) is directly relevant to the scoping question because it ensures that entities systematically evaluate the risks associated with proprietary or third-party technologies, including licensing, vendor reliability, ...
NIST SA-9 Found
External System Services

External system services are provided by an external provider, and the organization has no direct control over the implementation of the required controls or the assessment of control effectiveness. O...

Auto-Generated Generated during job processing
1. Control SA-9 addresses the scoping question by requiring organizations to formally manage relationships with external technology providers, including those involving proprietary or third-party licensed systems. 2. This control is important for com...
NIST CM-10 Found
Software Usage Restrictions

Software license tracking can be accomplished by manual or automated methods, depending on organizational needs. Examples of contract agreements include software license agreements and non-disclosure ...

Auto-Generated Generated during job processing
CM-10 (Software Usage Restrictions) directly addresses the scoping question by requiring organizations to track and manage software licenses, ensuring that all proprietary or third-party technologies are properly licensed and compliant with contractu...
NIST PS-7 Found
External Personnel Security

External provider refers to organizations other than the organization operating or acquiring the system. External providers include service bureaus, contractors, and other organizations that provide s...

Auto-Generated Generated during job processing
1. **How this control addresses the scoping question:** PS-7 is relevant because using proprietary or third-party technology often involves external providers whose personnel may access sensitive systems or data, requiring robust personnel security...
NIST SC-50
Software-enforced Separation and Policy Enforcement

System owners may require additional strength of mechanism to ensure domain separation and policy enforcement for specific types of threats and environments of operation.

Auto-Generated Generated during job processing
SC-50 (Software-enforced Separation and Policy Enforcement) is relevant to the scoping question because proprietary or third-party technologies often require strict separation and policy enforcement to prevent unauthorized access, misuse, or violatio...
NIST SA-22
Unsupported System Components

Support for system components includes software patches, firmware updates, replacement parts, and maintenance contracts. An example of unsupported components includes when vendors no longer provide cr...

Auto-Generated Generated during job processing
Control SA-22 is directly relevant to the scoping question because it requires organizations to identify and manage unsupported system components, including proprietary or third-party technologies that may require separate licensing and ongoing vendo...
NIST SR-4 Found
Provenance

Every system and system component has a point of origin and may be changed throughout its existence. Provenance is the chronology of the origin, development, ownership, location, and changes to a syst...

Auto-Generated Generated during job processing
1. Control SR-4 (Provenance) addresses the scoping question by requiring organizations to document and track the origin, ownership, and changes of all system components, including proprietary or third-party technologies that require separate licensin...
NIST CM-8
System Component Inventory

System components are discrete, identifiable information technology assets that include hardware, software, and firmware. Organizations may choose to implement centralized system component inventories...

Auto-Generated Generated during job processing
Control CM-8 (System Component Inventory) directly addresses the scoping question by requiring organizations to maintain a comprehensive inventory of all system components, including detailed software license information. This control is crucial for ...
NIST SA-20
Customized Development of Critical Components

Organizations determine that certain system components likely cannot be trusted due to specific threats to and vulnerabilities in those components for which there are no viable security controls to ad...

Auto-Generated Generated during job processing
1. **How this control addresses the scoping question:** SA-20 is relevant because it requires organizations to assess the trustworthiness of proprietary or third-party technology, which directly relates to whether such components should be used, re...
NIST AC-20 Found
Use of External Systems

External systems are systems that are used by but not part of organizational systems, and for which the organization has no direct control over the implementation of required controls or the assessmen...

Auto-Generated Generated during job processing
AC-20 (Use of External Systems) is directly relevant to the scoping question because it governs how organizations manage and control access to proprietary or third-party technologies that are not under their direct control, including those requiring ...
NIST SR-5
Acquisition Strategies, Tools, and Methods

The use of the acquisition process provides an important vehicle to protect the supply chain. There are many useful tools and techniques available, including obscuring the end use of a system or syste...

Auto-Generated Generated during job processing
SR-5 is relevant to the scoping question because it ensures that acquisition processes for proprietary or third-party technologies include due diligence on licensing, supply chain risks, and vendor management. This control is important for compliance...
NIST CM-11 Found
User-installed Software

If provided the necessary privileges, users can install software in organizational systems. To maintain control over the software installed, organizations identify permitted and prohibited actions reg...

Auto-Generated Generated during job processing
CM-11 (User-installed Software) is directly relevant to the scoping question because it governs which proprietary or third-party technologies users are allowed to install, ensuring that only properly licensed and approved software is used within the ...
Scoping Question 4

Will the service integrate directly with core business processes or systems? Identifies if the entity’s outputs plug into mission-critical workflows (order processing, billing, manufacturing, etc.). A faulty integration can cascade failures into critical operations, causing downtime, data corruption, or billing errors. Formal change-management process Pre-/post-integration validation testing Role-based access controls on integrated interfaces

33 Controls
CIS 3.1 Found
Establish and Maintain a Data Management Process

Establish and maintain a documented data management process. In the process, address data sensitivity, data owner, handling of data, data retention limits, and disposal requirements, based on sensitiv...

Auto-Generated Generated during job processing
1. This control ensures that data flowing through integrations with core business processes is properly managed according to its sensitivity, ownership, and retention requirements, reducing the risk of data mishandling during integration. 2. It is im...
CIS 4.1
Establish and Maintain a Secure Configuration Process

Establish and maintain a documented secure configuration process for enterprise assets (end-user devices, including portable and mobile, non-computing/IoT devices, and servers) and software (operating...

Auto-Generated Generated during job processing
Control 4.1 is relevant to the scoping question because integrating services with core business processes or systems requires that all involved assets and software are securely configured to prevent vulnerabilities that could disrupt mission-critical...
CIS 3.8
Document Data Flows

Document data flows. Data flow documentation includes service provider data flows and should be based on the enterprise’s data management process. Review and update documentation annually, or when sig...

Auto-Generated Generated during job processing
Control 3.8, "Document Data Flows," is directly relevant to the scoping question because it ensures that all data exchanges between the service and core business systems are clearly mapped and understood. This documentation is critical for compliance...
NIST SR-8 Found
Notification Agreements

The establishment of agreements and procedures facilitates communications among supply chain entities. Early notification of compromises and potential compromises in the supply chain that can potentia...

Auto-Generated Generated during job processing
1. Control SR-8 (Notification Agreements) addresses the scoping question by ensuring that all parties involved in direct integration with core business processes are promptly informed of any supply chain compromises that could impact mission-critical...
NIST SA-9 Found
External System Services

External system services are provided by an external provider, and the organization has no direct control over the implementation of the required controls or the assessment of control effectiveness. O...

Auto-Generated Generated during job processing
1. **How this control addresses the scoping question:** SA-9 (External System Services) is directly relevant because it ensures that when a service integrates with core business processes or systems—especially through external providers—the organiz...
NIST CA-6
Authorization

Authorizations are official management decisions by senior officials to authorize operation of systems, authorize the use of common controls for inheritance by organizational systems, and explicitly a...

Auto-Generated Generated during job processing
1. Control CA-6 (Authorization) addresses the scoping question by ensuring that senior management formally approves the integration of services with core business processes or systems, explicitly accepting and managing the associated risks. 2. This c...
NIST PM-10 Found
Authorization Process

Authorization processes for organizational systems and environments of operation require the implementation of an organization-wide risk management process and associated security and privacy standard...

Auto-Generated Generated during job processing
1. PM-10 (Authorization Process) is directly relevant to the scoping question because it ensures that any service integrating with core business processes undergoes formal risk assessment and approval by designated authorizing officials, reducing the...
NIST SA-23
Specialization

It is often necessary for a system or system component that supports mission-essential services or functions to be enhanced to maximize the trustworthiness of the resource. Sometimes this enhancement ...

Auto-Generated Generated during job processing
1. Control SA-23 (Specialization) addresses the scoping question by ensuring that systems integrated with core business processes are enhanced to maximize trustworthiness, thereby reducing the risk of cascading failures in mission-critical workflows....
NIST PS-7 Found
External Personnel Security

External provider refers to organizations other than the organization operating or acquiring the system. External providers include service bureaus, contractors, and other organizations that provide s...

Auto-Generated Generated during job processing
1. PS-7 (External Personnel Security) addresses the scoping question by ensuring that external personnel involved in integrating with core business processes are subject to appropriate security requirements and oversight. 2. This control is importa...
NIST CA-9
Internal System Connections

Internal system connections are connections between organizational systems and separate constituent system components (i.e., connections between components that are part of the same system) including ...

Auto-Generated Generated during job processing
1. Control CA-9 addresses the scoping question by ensuring that all internal system connections—such as those between the service and core business systems—are authorized, reviewed, and aligned with organizational missions and business functions. 2. ...
NIST MA-6 Found
Timely Maintenance

Organizations specify the system components that result in increased risk to organizational operations and assets, individuals, other organizations, or the Nation when the functionality provided by th...

Auto-Generated Generated during job processing
1. **How this control addresses the scoping question:** MA-6 (Timely Maintenance) ensures that system components integrated with core business processes remain operational and secure, minimizing the risk of failures that could disrupt mission-criti...
NIST AC-5 Found
Separation of Duties

Separation of duties addresses the potential for abuse of authorized privileges and helps to reduce the risk of malevolent activity without collusion. Separation of duties includes dividing mission or...

Auto-Generated Generated during job processing
1. The AC-5 Separation of Duties control addresses the scoping question by ensuring that no single individual has the ability to both implement and approve integrations with core business processes or systems, thereby reducing the risk of unauthorize...
NIST CP-8 Found
Telecommunications Services

Telecommunications services (for data and voice) for primary and alternate processing and storage sites are in scope for CP-8. Alternate telecommunications services reflect the continuity requirements...

Auto-Generated Generated during job processing
1. **How this control addresses the scoping question:** CP-8 ensures that telecommunications services, including alternate connectivity options, are available to support core business processes and systems, even if primary services fail. 2. **Why ...
NIST SI-22
Information Diversity

Actions taken by a system service or a function are often driven by the information it receives. Corruption, fabrication, modification, or deletion of that information could impact the ability of the ...

Auto-Generated Generated during job processing
1. **How this control addresses the scoping question:** SI-22 (Information Diversity) is relevant because when a service integrates directly with core business processes, the integrity and availability of input data are critical to prevent cascadin...
NIST CM-3 Found
Configuration Change Control

Configuration change control for organizational systems involves the systematic proposal, justification, implementation, testing, review, and disposition of system changes, including system upgrades a...

Auto-Generated Generated during job processing
1. **How this control addresses the scoping question:** CM-3 (Configuration Change Control) ensures that any integration with core business processes or systems is systematically reviewed, tested, and approved before implementation, reducing the ri...
NIST CP-7 Found
Alternate Processing Site

Alternate processing sites are geographically distinct from primary processing sites and provide processing capability if the primary processing site is not available. The alternate processing capabil...

Auto-Generated Generated during job processing
1. **How this control addresses the scoping question:** CP-7 (Alternate Processing Site) is relevant because when a service integrates directly with core business processes or systems, any disruption at the primary site could halt mission-critical ...
NIST SA-22
Unsupported System Components

Support for system components includes software patches, firmware updates, replacement parts, and maintenance contracts. An example of unsupported components includes when vendors no longer provide cr...

Auto-Generated Generated during job processing
1. Control SA-22 ensures that all system components integrated with core business processes are actively supported, reducing the risk of vulnerabilities due to outdated or unpatched software or hardware. 2. This control is important for compliance be...
NIST MA-2
Controlled Maintenance

Controlling system maintenance addresses the information security aspects of the system maintenance program and applies to all types of maintenance to system components conducted by local or nonlocal ...

Auto-Generated Generated during job processing
MA-2 (Controlled Maintenance) is relevant to the scoping question because integrating with core business processes requires assurance that all system components—including those subject to maintenance—remain secure and reliable. This control ensures t...
NIST IA-9 Found
Service Identification and Authentication

Services that may require identification and authentication include web applications using digital certificates or services or applications that query a database. Identification and authentication met...

Auto-Generated Generated during job processing
Control IA-9 (Service Identification and Authentication) is directly relevant to the scoping question because when a service integrates with core business processes or systems, it must reliably identify and authenticate itself to prevent unauthorized...
NIST SR-4 Found
Provenance

Every system and system component has a point of origin and may be changed throughout its existence. Provenance is the chronology of the origin, development, ownership, location, and changes to a syst...

Auto-Generated Generated during job processing
1. The Provenance control (SR-4) ensures that every system and component integrated with core business processes has a documented and traceable history of origin, changes, and ownership, directly addressing the risk of faulty or unauthorized integrat...
NIST RA-9
Criticality Analysis

Not all system components, functions, or services necessarily require significant protections. For example, criticality analysis is a key tenet of supply chain risk management and informs the prioriti...

Auto-Generated Generated during job processing
1. RA-9 Criticality Analysis addresses the scoping question by systematically identifying which integrated components and functions are mission-critical within core business processes, ensuring that their importance and potential impact are understoo...
NIST PL-9 Found
Central Management

Central management refers to organization-wide management and implementation of selected controls and processes. This includes planning, implementing, assessing, authorizing, and monitoring the organi...

Auto-Generated Generated during job processing
PL-9 (Central Management) is relevant to the scoping question because integrating a service with core business processes requires consistent, organization-wide management of security controls to prevent cascading failures across mission-critical work...
NIST SI-17 Found
Fail-safe Procedures

Failure conditions include the loss of communications among critical system components or between system components and operational facilities. Fail-safe procedures include alerting operator personnel...

Auto-Generated Generated during job processing
1. SI-17 (Fail-safe Procedures) addresses the scoping question by ensuring that, if the service integration with core business processes fails, there are predefined steps to prevent cascading failures into mission-critical workflows. 2. This control ...
NIST PM-32 Found
Purposing

Systems are designed to support a specific mission or business function. However, over time, systems and system components may be used to support services and functions that are outside of the scope o...

Auto-Generated Generated during job processing
Control PM-32 (Purposing) is directly relevant to the scoping question because it ensures that systems integrated with core business processes are only used for their intended mission or business function, preventing unauthorized or unintended uses. ...
NIST SI-2
Flaw Remediation

The need to remediate system flaws applies to all types of software and firmware. Organizations identify systems affected by software flaws, including potential vulnerabilities resulting from those fl...

Auto-Generated Generated during job processing
1. SI-2 (Flaw Remediation) is relevant to the scoping question because when a service integrates directly with core business processes or systems, any unremediated software flaws in the integrated components can introduce vulnerabilities that disrupt...
NIST MA-3
Maintenance Tools

Approving, controlling, monitoring, and reviewing maintenance tools address security-related issues associated with maintenance tools that are not within system authorization boundaries and are used s...

Auto-Generated Generated during job processing
1. MA-3 (Maintenance Tools) is relevant to the scoping question because when a service integrates directly with core business processes or systems, any maintenance tools used for diagnostics or repairs could introduce security risks that impact missi...
NIST SA-1 Found
Policy and Procedures

System and services acquisition policy and procedures address the controls in the SA family that are implemented within systems and organizations. The risk management strategy is an important factor i...

Auto-Generated Generated during job processing
Control SA-1 (Policy and Procedures) is relevant to the scoping question because it ensures that formal policies and procedures govern the acquisition and integration of services with core business systems. This control is important for compliance as...
NIST SA-10
Developer Configuration Management

Organizations consider the quality and completeness of configuration management activities conducted by developers as direct evidence of applying effective security controls. Controls include protecti...

Auto-Generated Generated during job processing
1. **How this control addresses the scoping question:** SA-10 (Developer Configuration Management) ensures that all changes to system components, including those integrated with core business processes, are properly tracked, authorized, and protect...
NIST IR-8 Found
Incident Response Plan

It is important that organizations develop and implement a coordinated approach to incident response. Organizational mission and business functions determine the structure of incident response capabil...

Auto-Generated Generated during job processing
1. The Incident Response Plan (IR-8) is relevant to the scoping question because direct integration with core business processes increases the risk that incidents—such as system failures or data breaches—could disrupt mission-critical operations. 2. ...
NIST CM-9
Configuration Management Plan

Configuration management activities occur throughout the system development life cycle. As such, there are developmental configuration management activities (e.g., the control of code and software lib...

Auto-Generated Generated during job processing
1. **How this control addresses the scoping question:** CM-9 (Configuration Management Plan) ensures that any integration with core business processes or systems is governed by formal, documented procedures for managing changes, configurations, and...
NIST CP-13 Found
Alternative Security Mechanisms

Use of alternative security mechanisms supports system resiliency, contingency planning, and continuity of operations. To ensure mission and business continuity, organizations can implement alternativ...

Auto-Generated Generated during job processing
1. CP-13 (Alternative Security Mechanisms) addresses the scoping question by ensuring that, if the service integrates with core business processes or systems, there are backup security measures in place to maintain operational continuity in case prim...
NIST PL-7
Concept of Operations

The CONOPS may be included in the security or privacy plans for the system or in other system development life cycle documents. The CONOPS is a living document that requires updating throughout the sy...

Auto-Generated Generated during job processing
Control PL-7 (Concept of Operations) is relevant to the scoping question because it ensures that the integration of the service with core business processes is clearly defined, documented, and aligned with organizational objectives throughout the sys...
NIST CP-12
Safe Mode

For systems that support critical mission and business functions—including military operations, civilian space operations, nuclear power plant operations, and air traffic control operations (esp...

Auto-Generated Generated during job processing
1. The Safe Mode control (CP-12) is relevant to the scoping question because it ensures that systems integrated with core business processes can automatically revert to a predefined, restricted operational state during critical failures or adverse co...
Scoping Question 5

Will the entity’s services be subject to periodic audits by us or third parties? Identifies whether you must audit their performance, controls, or compliance on a recurring basis. Audit preparation consumes internal resources; findings may require remediation and renegotiation of contract terms. Audit schedule and scoping document Right-to-audit clauses in contract Remediation-tracking and closure reporting

29 Controls
CIS 3.1 Found
Establish and Maintain a Data Management Process

Establish and maintain a documented data management process. In the process, address data sensitivity, data owner, handling of data, data retention limits, and disposal requirements, based on sensitiv...

Auto-Generated Generated during job processing
Control 3.1 is directly relevant to the scoping question because a documented and regularly updated data management process provides the necessary evidence and structure for periodic audits of data handling, retention, and disposal practices. This co...
NIST AU-6 Found
Audit Record Review, Analysis, and Reporting

Audit record review, analysis, and reporting covers information security- and privacy-related logging performed by organizations, including logging that results from the monitoring of account usage, r...

Auto-Generated Generated during job processing
Control AU-6 is directly relevant to the scoping question because it ensures that the entity maintains and reviews audit records, enabling periodic audits of their performance, controls, and compliance. This control is important for compliance as it ...
NIST PE-3 Found
Physical Access Control

Physical access control applies to employees and visitors. Individuals with permanent physical access authorizations are not considered visitors. Physical access controls for publicly accessible areas...

Auto-Generated Generated during job processing
1. PE-3 (Physical Access Control) is relevant to the scoping question because periodic audits often require verification of how physical access to sensitive areas is managed, logged, and monitored. 2. This control is important for compliance as it en...
NIST AU-16 Found
Cross-organizational Audit Logging

When organizations use systems or services of external organizations, the audit logging capability necessitates a coordinated, cross-organization approach. For example, maintaining the identity of ind...

Auto-Generated Generated during job processing
AU-16 (Cross-organizational Audit Logging) is directly relevant to the scoping question because it ensures that audit logs are coordinated and maintained across both the entity and any external service providers, supporting effective periodic audits....
NIST SR-8 Found
Notification Agreements

The establishment of agreements and procedures facilitates communications among supply chain entities. Early notification of compromises and potential compromises in the supply chain that can potentia...

Auto-Generated Generated during job processing
SR-8 (Notification Agreements) is relevant to the scoping question because it ensures that supply chain entities have established procedures for timely communication regarding audit findings, compromises, or potential risks identified during periodic...
NIST AU-5
Response to Audit Logging Process Failures

Audit logging process failures include software and hardware errors, failures in audit log capturing mechanisms, and reaching or exceeding audit log storage capacity. Organization-defined actions incl...

Auto-Generated Generated during job processing
1. AU-5 ensures that audit logging failures are detected and appropriately managed, which directly supports the ability to conduct periodic audits as identified in the scoping question. 2. This control is important for compliance because reliable aud...
NIST SR-6 Found
Supplier Assessments and Reviews

An assessment and review of supplier risk includes security and supply chain risk management processes, foreign ownership, control or influence (FOCI), and the ability of the supplier to effectively a...

Auto-Generated Generated during job processing
Control SR-6 is directly relevant to the scoping question because it establishes the requirement for periodic assessments and reviews of supplier risk, which may be conducted by your organization or independent third parties. This control is importan...
NIST SA-9 Found
External System Services

External system services are provided by an external provider, and the organization has no direct control over the implementation of the required controls or the assessment of control effectiveness. O...

Auto-Generated Generated during job processing
1. Control SA-9 addresses the scoping question by requiring organizations to establish and document trust relationships, roles, responsibilities, and service-level agreements with external service providers, including provisions for monitoring and as...
NIST AU-11 Found
Audit Record Retention

Organizations retain audit records until it is determined that the records are no longer needed for administrative, legal, audit, or other operational purposes. This includes the retention and availab...

Auto-Generated Generated during job processing
AU-11 (Audit Record Retention) directly addresses the scoping question by ensuring that audit records are retained and available for review during periodic audits conducted by your organization or third parties. This control is critical for complianc...
NIST CA-6
Authorization

Authorizations are official management decisions by senior officials to authorize operation of systems, authorize the use of common controls for inheritance by organizational systems, and explicitly a...

Auto-Generated Generated during job processing
1. CA-6 (Authorization) directly addresses the scoping question by ensuring that senior officials formally authorize system operations based on ongoing evidence from continuous monitoring, which supports periodic audits by providing up-to-date docume...
NIST PE-6
Monitoring Physical Access

Physical access monitoring includes publicly accessible areas within organizational facilities. Examples of physical access monitoring include the employment of guards, video surveillance equipment (i...

Auto-Generated Generated during job processing
1. PE-6 (Monitoring Physical Access) addresses the scoping question by ensuring that physical access to facilities is logged, monitored, and reviewable, which is essential for periodic audits by your organization or third parties. 2. This control i...
NIST AU-1 Found
Policy and Procedures

Audit and accountability policy and procedures address the controls in the AU family that are implemented within systems and organizations. The risk management strategy is an important factor in estab...

Auto-Generated Generated during job processing
Control AU-1 (Policy and Procedures) is directly relevant to the scoping question because it ensures the organization has formalized audit and accountability policies and procedures that support periodic audits by internal or third-party entities. Th...
NIST AU-3 Found
Content of Audit Records

Audit record content that may be necessary to support the auditing function includes event descriptions (item a), time stamps (item b), source and destination addresses (item c), user or process ident...

Auto-Generated Generated during job processing
1. Control AU-3 ensures that audit records contain sufficient detail—such as event descriptions, timestamps, user identifiers, and outcomes—to support effective periodic audits by your organization or third parties, as referenced in the scoping quest...
NIST AU-9 Found
Protection of Audit Information

Audit information includes all information needed to successfully audit system activity, such as audit records, audit log settings, audit reports, and personally identifiable information. Audit loggin...

Auto-Generated Generated during job processing
AU-9: Protection of Audit Information is directly relevant to the scoping question because it ensures that all audit records and related data are securely maintained and accessible only to authorized personnel, supporting the integrity and confidenti...
NIST CA-7 Found
Continuous Monitoring

Continuous monitoring at the system level facilitates ongoing awareness of the system security and privacy posture to support organizational risk management decisions. The terms continuous and ongoing...

Auto-Generated Generated during job processing
CA-7 (Continuous Monitoring) is directly relevant to the scoping question because it ensures that the entity maintains ongoing visibility into its security and privacy posture, which supports the preparation and effectiveness of periodic audits by yo...
NIST PM-21 Found
Accounting of Disclosures

The purpose of accounting of disclosures is to allow individuals to learn to whom their personally identifiable information has been disclosed, to provide a basis for subsequently advising recipients ...

Auto-Generated Generated during job processing
1. Control PM-21 (Accounting of Disclosures) directly supports the scoping question by providing an auditable record of when and to whom personally identifiable information (PII) has been disclosed, which is essential for periodic audits by your orga...
NIST AU-4 Found
Audit Log Storage Capacity

Organizations consider the types of audit logging to be performed and the audit log processing requirements when allocating audit log storage capacity. Allocating sufficient audit log storage capacity...

Auto-Generated Generated during job processing
1. AU-4 (Audit Log Storage Capacity) is relevant to the scoping question because periodic audits require access to comprehensive and intact audit logs; sufficient storage ensures logs are retained and available for review during scheduled audits. 2. ...
NIST CA-1 Found
Policy and Procedures

Assessment, authorization, and monitoring policy and procedures address the controls in the CA family that are implemented within systems and organizations. The risk management strategy is an importan...

Auto-Generated Generated during job processing
Control CA-1 (Policy and Procedures) is directly relevant to the scoping question because it ensures the organization has documented policies and procedures for assessment, authorization, and monitoring, which are foundational for supporting periodic...
NIST AU-14 Found
Session Audit

Session audits can include monitoring keystrokes, tracking websites visited, and recording information and/or file transfers. Session audit capability is implemented in addition to event logging and m...

Auto-Generated Generated during job processing
1. AU-14 Session Audit is relevant to the scoping question because it provides detailed records of user activity, which can be reviewed during periodic audits to assess compliance with security and operational requirements. 2. This control is importa...
NIST AU-7
Audit Record Reduction and Report Generation

Audit record reduction is a process that manipulates collected audit log information and organizes it into a summary format that is more meaningful to analysts. Audit record reduction and report gener...

Auto-Generated Generated during job processing
Control AU-7 is directly relevant to the scoping question because it ensures that audit records can be efficiently reduced, analyzed, and reported in formats suitable for periodic audits by your organization or third parties. This control is importan...
NIST CM-3 Found
Configuration Change Control

Configuration change control for organizational systems involves the systematic proposal, justification, implementation, testing, review, and disposition of system changes, including system upgrades a...

Auto-Generated Generated during job processing
1. CM-3 (Configuration Change Control) addresses the scoping question by ensuring that all system changes are systematically documented, reviewed, and auditable, which directly supports periodic audits by providing evidence of proper change managemen...
NIST MA-2
Controlled Maintenance

Controlling system maintenance addresses the information security aspects of the system maintenance program and applies to all types of maintenance to system components conducted by local or nonlocal ...

Auto-Generated Generated during job processing
1. MA-2 (Controlled Maintenance) is relevant to the scoping question because it ensures that all system maintenance activities are properly documented, controlled, and auditable, which supports periodic audits by your organization or third parties. 2...
NIST SR-4 Found
Provenance

Every system and system component has a point of origin and may be changed throughout its existence. Provenance is the chronology of the origin, development, ownership, location, and changes to a syst...

Auto-Generated Generated during job processing
1. Control SR-4 (Provenance) directly supports the scoping question by ensuring that all changes, ownership, and interactions with systems and data are thoroughly documented and traceable, which is essential for effective periodic audits. 2. This con...
NIST AU-2 Found
Event Logging

An event is an observable occurrence in a system. The types of events that require logging are those events that are significant and relevant to the security of systems and the privacy of individuals....

Auto-Generated Generated during job processing
1. AU-2 (Event Logging) directly supports the scoping question by ensuring that all significant system events are recorded, which provides the necessary evidence for periodic audits conducted by your organization or third parties. 2. This control is ...
NIST SI-2
Flaw Remediation

The need to remediate system flaws applies to all types of software and firmware. Organizations identify systems affected by software flaws, including potential vulnerabilities resulting from those fl...

Auto-Generated Generated during job processing
1. SI-2 Flaw Remediation is directly relevant to the scoping question because periodic audits will assess whether the entity has effective processes for identifying, tracking, and remediating system flaws and vulnerabilities. 2. This control is impor...
NIST SA-1 Found
Policy and Procedures

System and services acquisition policy and procedures address the controls in the SA family that are implemented within systems and organizations. The risk management strategy is an important factor i...

Auto-Generated Generated during job processing
1. Control SA-1 (Policy and Procedures) addresses the scoping question by requiring the organization to establish and maintain documented policies and procedures for system and service acquisition, which include provisions for responding to audits an...
NIST SI-1 Found
Policy and Procedures

System and information integrity policy and procedures address the controls in the SI family that are implemented within systems and organizations. The risk management strategy is an important factor ...

Auto-Generated Generated during job processing
Control SI-1 (Policy and Procedures) is directly relevant to the scoping question because it ensures that the entity has documented, maintained, and updated system and information integrity policies and procedures, which are essential for preparing f...
NIST MA-1 Found
Policy and Procedures

Maintenance policy and procedures address the controls in the MA family that are implemented within systems and organizations. The risk management strategy is an important factor in establishing such ...

Auto-Generated Generated during job processing
MA-1 (Policy and Procedures) is relevant to the scoping question because it ensures the organization has documented, up-to-date maintenance policies and procedures that can be reviewed during periodic audits. This control is important for compliance ...
NIST PM-27
Privacy Reporting

Through internal and external reporting, organizations promote accountability and transparency in organizational privacy operations. Reporting can also help organizations to determine progress in meet...

Auto-Generated Generated during job processing
1. Control PM-27 (Privacy Reporting) addresses the scoping question by ensuring that the organization maintains robust internal and external privacy reporting mechanisms, which directly support periodic audits by providing documented evidence of priv...
Scoping Question 6

Will the entity host entity, partner, or customer data in their own network environment? Determines if your data will reside on the provider’s infrastructure rather than your controlled systems. Loss of direct control over data storage, potential co-tenant risks, and challenges in meeting data-sovereignty or compliance requirements. Contractual data-hosting SLA and security requirements Data-segregation (logical/physical) and encryption at rest Periodic network and configuration audits Defined backup, retention, and e-discovery procedures

32 Controls
CIS 3.1 Found
Establish and Maintain a Data Management Process

Establish and maintain a documented data management process. In the process, address data sensitivity, data owner, handling of data, data retention limits, and disposal requirements, based on sensitiv...

Auto-Generated Generated during job processing
Control 3.1 is directly relevant to the scoping question because it ensures that the entity has a documented process for managing data, including data hosted in external environments. This control is important for compliance as it defines how sensiti...
CIS 1.1
Establish and Maintain Detailed Enterprise Asset Inventory

Establish and maintain an accurate, detailed, and up-to-date inventory of all enterprise assets with the potential to store or process data, to include: end-user devices (including portable and mobile...

Auto-Generated Generated during job processing
1. This control ensures that the organization maintains a comprehensive and up-to-date inventory of all assets capable of storing or processing data, including those in cloud or third-party environments. 2. Maintaining such an inventory is critical...
CIS 4.1
Establish and Maintain a Secure Configuration Process

Establish and maintain a documented secure configuration process for enterprise assets (end-user devices, including portable and mobile, non-computing/IoT devices, and servers) and software (operating...

Auto-Generated Generated during job processing
Control 4.1 is directly relevant to the scoping question because hosting entity, partner, or customer data in your own network environment requires that all systems storing or processing this data are securely configured. This control is important fo...
CIS 3.5 Found
Securely Dispose of Data

Securely dispose of data as outlined in the enterprise’s documented data management process. Ensure the disposal process and method are commensurate with the data sensitivity.

Auto-Generated Generated during job processing
Control 3.5, "Securely Dispose of Data," is directly relevant to the scoping question because hosting data in a provider’s network environment requires assurance that data is properly destroyed when no longer needed, mitigating risks associated with ...
CIS 3.4
Enforce Data Retention

Retain data according to the enterprise’s documented data management process. Data retention must include both minimum and maximum timelines.

Auto-Generated Generated during job processing
Control 3.4 (Enforce Data Retention) is directly relevant to the scoping question because hosting data in a provider’s environment requires assurance that data is retained and disposed of according to your organization’s documented policies, even whe...
CIS 4.6 Found
Securely Manage Enterprise Assets and Software

Securely manage enterprise assets and software. Example implementations include managing configuration through version-controlled Infrastructure-as-Code (IaC) and accessing administrative interfaces o...

Auto-Generated Generated during job processing
1. This control addresses the scoping question by ensuring that when entity, partner, or customer data is hosted in the provider’s network environment, all enterprise assets and software managing that data are securely configured and accessed using s...
CIS 3.2
Establish and Maintain a Data Inventory

Establish and maintain a data inventory based on the enterprise’s data management process. Inventory sensitive data annually, at a minimum. Review and update inventory annually, at a minimum, with a p...

Auto-Generated Generated during job processing
Control 3.2, "Establish and Maintain a Data Inventory," is directly relevant to the scoping question because it ensures the organization knows what sensitive data is being hosted and where it resides, especially when data is stored on a provider’s in...
CIS 3.11 Found
Encrypt Sensitive Data at Rest

Encrypt sensitive data at rest on servers, applications, and databases. Storage-layer encryption, also known as server-side encryption, meets the minimum requirement of this Safeguard. Additional encr...

Auto-Generated Generated during job processing
Control 3.11, "Encrypt Sensitive Data at Rest," directly addresses the scoping question by mitigating risks associated with hosting data on a provider’s infrastructure, where you may lose direct control over physical and logical access. Encryption en...
CIS 4.2
Establish and Maintain a Secure Configuration Process for Network Infrastructure

Establish and maintain a documented secure configuration process for network devices. Review and update documentation annually, or when significant enterprise changes occur that could impact this Safe...

Auto-Generated Generated during job processing
Control 4.2 is relevant to the scoping question because hosting entity, partner, or customer data in your own network environment requires robust security configurations to protect that data from unauthorized access and co-tenant risks. This control ...
CIS 3.13
Deploy a Data Loss Prevention Solution

Implement an automated tool, such as a host-based Data Loss Prevention (DLP) tool to identify all sensitive data stored, processed, or transmitted through enterprise assets, including those located on...

Auto-Generated Generated during job processing
1. Deploying a Data Loss Prevention (DLP) solution directly addresses the scoping question by enabling the entity to identify, monitor, and protect sensitive data hosted on their own network or on a provider’s infrastructure, ensuring visibility and ...
NIST SA-9 Found
External System Services

External system services are provided by an external provider, and the organization has no direct control over the implementation of the required controls or the assessment of control effectiveness. O...

Auto-Generated Generated during job processing
Control SA-9 (External System Services) directly addresses the scoping question by requiring organizations to formally manage and document the risks associated with hosting data on external provider infrastructure, where direct control over security ...
NIST CP-9 Found
System Backup

System-level information includes system state information, operating system software, middleware, application software, and licenses. User-level information includes information other than system-lev...

Auto-Generated Generated during job processing
Control CP-9 (System Backup) is directly relevant to the scoping question because, when an entity hosts data in its own network environment, it assumes responsibility for securely backing up both system and user-level information. This control is cri...
NIST PT-2 Found
Authority to Process Personally Identifiable Information

The processing of personally identifiable information is an operation or set of operations that the information system or organization performs with respect to personally identifiable information acro...

Auto-Generated Generated during job processing
Control PT-2 is relevant to the scoping question because it ensures that any processing of personally identifiable information (PII) within the provider’s network environment is authorized and compliant with applicable laws, regulations, and organiza...
NIST SC-28 Found
Protection of Information at Rest

Information at rest refers to the state of information when it is not in process or in transit and is located on system components. Such components include internal or external hard disk drives, stora...

Auto-Generated Generated during job processing
SC-28 (Protection of Information at Rest) is directly relevant to the scoping question because it ensures that any entity, partner, or customer data hosted within the provider’s network environment is protected against unauthorized access and tamperi...
NIST PM-23
Data Governance Body

A Data Governance Body can help ensure that the organization has coherent policies and the ability to balance the utility of data with security and privacy requirements. The Data Governance Body estab...

Auto-Generated Generated during job processing
The PM-23 Data Governance Body control is directly relevant to the scoping question because it ensures that organizational policies and oversight mechanisms are in place to manage data hosted in external environments, such as a provider’s infrastruct...
NIST CA-3 Found
Information Exchange

System information exchange requirements apply to information exchanges between two or more systems. System information exchanges include connections via leased lines or virtual private networks, conn...

Auto-Generated Generated during job processing
Control CA-3 (Information Exchange) is directly relevant to the scoping question because it governs the requirements and risk management for exchanging data between your systems and those hosted by a provider, partner, or customer. This control is im...
NIST PT-7 Found
Specific Categories of Personally Identifiable Information

Organizations apply any conditions or protections that may be necessary for specific categories of personally identifiable information. These conditions may be required by laws, executive orders, dire...

Auto-Generated Generated during job processing
Control PT-7 is relevant to the scoping question because hosting data in a provider’s network environment may involve storing specific categories of personally identifiable information (PII) subject to heightened legal and regulatory protections. Thi...
NIST CP-8 Found
Telecommunications Services

Telecommunications services (for data and voice) for primary and alternate processing and storage sites are in scope for CP-8. Alternate telecommunications services reflect the continuity requirements...

Auto-Generated Generated during job processing
CP-8 (Telecommunications Services) is relevant to the scoping question because hosting data in the entity’s own network environment requires reliable and resilient telecommunications infrastructure to ensure ongoing access to hosted data, especially ...
NIST CP-6 Found
Alternate Storage Site

Alternate storage sites are geographically distinct from primary storage sites and maintain duplicate copies of information and data if the primary storage site is not available. Similarly, alternate ...

Auto-Generated Generated during job processing
Control CP-6 (Alternate Storage Site) is relevant to the scoping question because it ensures that if customer, partner, or entity data is hosted on the provider’s infrastructure, there are contingency measures in place to maintain data availability a...
NIST AC-4 Found
Information Flow Enforcement

Information flow control regulates where information can travel within a system and between systems (in contrast to who is allowed to access the information) and without regard to subsequent accesses ...

Auto-Generated Generated during job processing
**Justification:** 1. AC-4 (Information Flow Enforcement) directly addresses the scoping question by ensuring that when entity, partner, or customer data is hosted in a provider’s network environment, strict controls are in place to regulate how inf...
NIST IA-9 Found
Service Identification and Authentication

Services that may require identification and authentication include web applications using digital certificates or services or applications that query a database. Identification and authentication met...

Auto-Generated Generated during job processing
Control IA-9 (Service Identification and Authentication) is relevant to the scoping question because when entity, partner, or customer data is hosted in the provider’s network environment, it is critical to ensure that only authorized services and ap...
NIST CM-8
System Component Inventory

System components are discrete, identifiable information technology assets that include hardware, software, and firmware. Organizations may choose to implement centralized system component inventories...

Auto-Generated Generated during job processing
1. **How this control addresses the scoping question:** CM-8 (System Component Inventory) ensures that all hardware and software assets involved in hosting entity, partner, or customer data are accurately identified and tracked, regardless of wheth...
NIST AC-21 Found
Information Sharing

Information sharing applies to information that may be restricted in some manner based on some formal or administrative determination. Examples of such information include, contract-sensitive informat...

Auto-Generated Generated during job processing
AC-21 (Information Sharing) is directly relevant to the scoping question because hosting data in a provider’s environment introduces new information-sharing risks, especially when data may be accessed or managed by third parties or co-tenants. This c...
NIST SC-20
Secure Name/Address Resolution Service (Authoritative Source)

Providing authoritative source information enables external clients, including remote Internet clients, to obtain origin authentication and integrity verification assurances for the host/service name ...

Auto-Generated Generated during job processing
SC-20 (Secure Name/Address Resolution Service) is relevant to the scoping question because when an entity hosts data in its own network environment, it is responsible for ensuring the authenticity and integrity of network address resolution (e.g., DN...
NIST SC-37 Found
Out-of-band Channels

Out-of-band channels include local, non-network accesses to systems; network paths physically separate from network paths used for operational traffic; or non-electronic paths, such as the U.S. Postal...

Auto-Generated Generated during job processing
1. **How this control addresses the scoping question:** SC-37 (Out-of-band Channels) is relevant because when an entity hosts data in their own or a provider’s network environment, secure management and transmission of sensitive information—such as...
NIST CM-13 Found
Data Action Mapping

Data actions are system operations that process personally identifiable information. The processing of such information encompasses the full information life cycle, which includes collection, generati...

Auto-Generated Generated during job processing
CM-13 Data Action Mapping is directly relevant to the scoping question because it provides a comprehensive understanding of how, where, and by whom personally identifiable information (PII) is processed within the entity’s network environment. This c...
NIST AC-17 Found
Remote Access

Remote access is access to organizational systems (or processes acting on behalf of users) that communicate through external networks such as the Internet. Types of remote access include dial-up, broa...

Auto-Generated Generated during job processing
**Justification:** 1. AC-17 (Remote Access) is relevant to the scoping question because, when an entity hosts partner or customer data in its own network environment, secure remote access controls are essential to protect that data from unauthorized...
NIST SA-10
Developer Configuration Management

Organizations consider the quality and completeness of configuration management activities conducted by developers as direct evidence of applying effective security controls. Controls include protecti...

Auto-Generated Generated during job processing
1. **How this control addresses the scoping question:** SA-10 Developer Configuration Management ensures that any system hosting entity, partner, or customer data is securely and consistently configured, reducing the risk of unauthorized changes or...
NIST SC-36
Distributed Processing and Storage

Distributing processing and storage across multiple physical locations or logical domains provides a degree of redundancy or overlap for organizations. The redundancy and overlap increase the work fac...

Auto-Generated Generated during job processing
SC-36 (Distributed Processing and Storage) is relevant to the scoping question because it directly addresses how and where entity, partner, or customer data is stored and processed within the provider’s infrastructure. This control is important for c...
NIST SA-2 Found
Allocation of Resources

Resource allocation for information security and privacy includes funding for system and services acquisition, sustainment, and supply chain-related risks throughout the system development life cycle.

Auto-Generated Generated during job processing
1. Control SA-2 ensures that adequate resources are allocated for information security and privacy throughout the system’s lifecycle, including when hosting partner or customer data in the entity’s own network environment. 2. This control is importan...
NIST SC-8 Found
Transmission Confidentiality and Integrity

Protecting the confidentiality and integrity of transmitted information applies to internal and external networks as well as any system components that can transmit information, including servers, not...

Auto-Generated Generated during job processing
Control SC-8 is relevant to the scoping question because, when an entity hosts data in its own or a provider’s network environment, the confidentiality and integrity of data transmissions become critical due to potential loss of direct control and in...
NIST SC-7 Found
Boundary Protection

Managed interfaces include gateways, routers, firewalls, guards, network-based malicious code analysis, virtualization systems, or encrypted tunnels implemented within a security architecture. Subnetw...

Auto-Generated Generated during job processing
SC-7 Boundary Protection is directly relevant to the scoping question because hosting data in the provider’s network environment introduces risks related to unauthorized access and data exposure across network boundaries. This control ensures that ma...
Scoping Question 7

Does the service require handling or custody of the entity’s physical assets (e.g., hardware, inventory)? Flags responsibility for equipment, shipments, or on-site physical items under the entity’s care. Asset damage, loss, or theft can disrupt operations and lead to replacement costs or insurance claims. Asset-tagging and inventory management system Insurance and liability clauses Chain-of-custody documentation for transfers

22 Controls
CIS 1.1
Establish and Maintain Detailed Enterprise Asset Inventory

Establish and maintain an accurate, detailed, and up-to-date inventory of all enterprise assets with the potential to store or process data, to include: end-user devices (including portable and mobile...

Auto-Generated Generated during job processing
Control 1.1 is directly relevant to the scoping question because it ensures the organization maintains a comprehensive and current inventory of all physical assets under its custody, including hardware and devices that may store or process data. This...
NIST SA-9 Found
External System Services

External system services are provided by an external provider, and the organization has no direct control over the implementation of the required controls or the assessment of control effectiveness. O...

Auto-Generated Generated during job processing
Control SA-9 is relevant to the scoping question because it ensures that when physical assets are managed or handled by external service providers, the organization maintains oversight and risk management through documented agreements and defined res...
NIST AC-3 Found
Access Enforcement

Access control policies control access between active entities or subjects (i.e., users or processes acting on behalf of users) and passive entities or objects (i.e., devices, files, records, domains)...

Auto-Generated Generated during job processing
AC-3 (Access Enforcement) is relevant to the scoping question because it ensures that only authorized users or processes can access or interact with physical assets managed by the entity, such as hardware or inventory. This control is important for c...
NIST CP-9 Found
System Backup

System-level information includes system state information, operating system software, middleware, application software, and licenses. User-level information includes information other than system-lev...

Auto-Generated Generated during job processing
Control CP-9 (System Backup) is relevant to the scoping question because it ensures that critical information related to physical assets—such as inventory records, asset-tagging data, and chain-of-custody documentation—is regularly backed up and prot...
NIST MP-5 Found
Media Transport

System media includes digital and non-digital media. Digital media includes flash drives, diskettes, magnetic tapes, external or removable hard disk drives (e.g., solid state and magnetic), compact d...

Auto-Generated Generated during job processing
Control MP-5 (Media Transport) is relevant to the scoping question because it establishes requirements for securely handling and tracking physical assets—specifically system media—during transport, directly addressing the risks of asset damage, loss,...
NIST PS-7 Found
External Personnel Security

External provider refers to organizations other than the organization operating or acquiring the system. External providers include service bureaus, contractors, and other organizations that provide s...

Auto-Generated Generated during job processing
Control PS-7 (External Personnel Security) is relevant to the scoping question because it ensures that external personnel who may handle or have custody of the entity’s physical assets are subject to defined security requirements, such as credentiali...
NIST SR-3 Found
Supply Chain Controls and Processes

Supply chain elements include organizations, entities, or tools employed for the research and development, design, manufacturing, acquisition, delivery, integration, operations and maintenance, and di...

Auto-Generated Generated during job processing
SR-3 (Supply Chain Controls and Processes) is directly relevant to the scoping question because it governs the procedures for handling, transferring, and safeguarding physical assets throughout their lifecycle, including acquisition, delivery, and di...
NIST MA-6 Found
Timely Maintenance

Organizations specify the system components that result in increased risk to organizational operations and assets, individuals, other organizations, or the Nation when the functionality provided by th...

Auto-Generated Generated during job processing
MA-6 (Timely Maintenance) is relevant to the scoping question because it ensures that physical assets—such as hardware or inventory—are properly maintained to prevent operational disruptions, damage, or loss. This control is important for compliance ...
NIST AC-5 Found
Separation of Duties

Separation of duties addresses the potential for abuse of authorized privileges and helps to reduce the risk of malevolent activity without collusion. Separation of duties includes dividing mission or...

Auto-Generated Generated during job processing
1. AC-5 (Separation of Duties) is relevant to the scoping question because handling or custody of physical assets requires clear assignment of responsibilities to prevent unauthorized access, misuse, or theft. 2. This control is important for complia...
NIST PE-20
Asset Monitoring and Tracking

Asset location technologies can help ensure that critical assets—including vehicles, equipment, and system components—remain in authorized locations. Organizations consult with the Office ...

Auto-Generated Generated during job processing
Control PE-20 (Asset Monitoring and Tracking) directly addresses the scoping question by ensuring that physical assets under the entity’s custody are continuously monitored and remain in authorized locations, reducing the risk of loss, theft, or unau...
NIST MA-2
Controlled Maintenance

Controlling system maintenance addresses the information security aspects of the system maintenance program and applies to all types of maintenance to system components conducted by local or nonlocal ...

Auto-Generated Generated during job processing
MA-2 (Controlled Maintenance) is relevant to the scoping question because it ensures that all maintenance activities involving physical assets—such as hardware or inventory—are properly documented and controlled, including tracking equipment removal,...
NIST SR-4 Found
Provenance

Every system and system component has a point of origin and may be changed throughout its existence. Provenance is the chronology of the origin, development, ownership, location, and changes to a syst...

Auto-Generated Generated during job processing
Control SR-4 (Provenance) is relevant to the scoping question because it ensures that the origin, ownership, location, and changes to physical assets are thoroughly documented and tracked throughout their lifecycle. This control is important for comp...
NIST CM-8
System Component Inventory

System components are discrete, identifiable information technology assets that include hardware, software, and firmware. Organizations may choose to implement centralized system component inventories...

Auto-Generated Generated during job processing
Control CM-8 (System Component Inventory) directly addresses the scoping question by requiring organizations to maintain a detailed, accurate inventory of all physical assets, such as hardware, under their custody. This control is essential for compl...
NIST SR-7 Found
Supply Chain Operations Security

Supply chain OPSEC expands the scope of OPSEC to include suppliers and potential suppliers. OPSEC is a process that includes identifying critical information, analyzing friendly actions related to ope...

Auto-Generated Generated during job processing
Control SR-7 (Supply Chain Operations Security) is relevant to the scoping question because it ensures that operational security measures extend to suppliers who may handle or have custody of the entity’s physical assets. This control is important fo...
NIST PS-5 Found
Personnel Transfer

Personnel transfer applies when reassignments or transfers of individuals are permanent or of such extended duration as to make the actions warranted. Organizations define actions appropriate for the ...

Auto-Generated Generated during job processing
The PS-5 Personnel Transfer control is relevant to the scoping question because it ensures that when staff members who handle or have custody of physical assets are reassigned or transferred, their access to equipment, inventory, and related faciliti...
NIST SA-1 Found
Policy and Procedures

System and services acquisition policy and procedures address the controls in the SA family that are implemented within systems and organizations. The risk management strategy is an important factor i...

Auto-Generated Generated during job processing
Control SA-1 (Policy and Procedures) is relevant to the scoping question because it ensures that formal policies and procedures are established for the acquisition and management of systems and services, including those involving the handling or cust...
NIST IR-8 Found
Incident Response Plan

It is important that organizations develop and implement a coordinated approach to incident response. Organizational mission and business functions determine the structure of incident response capabil...

Auto-Generated Generated during job processing
1. The Incident Response Plan (IR-8) addresses the scoping question by ensuring the organization is prepared to respond to incidents involving physical assets, such as damage, loss, or theft of equipment or inventory under its custody. 2. This contro...
NIST SR-1 Found
Policy and Procedures

Supply chain risk management policy and procedures address the controls in the SR family as well as supply chain-related controls in other families that are implemented within systems and organization...

Auto-Generated Generated during job processing
Control SR-1 (Policy and Procedures) is relevant to the scoping question because it requires the organization to formally define and document how physical assets—such as hardware and inventory—are managed and protected throughout the supply chain. Th...
NIST SR-2 Found
Supply Chain Risk Management Plan

The dependence on products, systems, and services from external providers, as well as the nature of the relationships with those providers, present an increasing level of risk to an organization. Thre...

Auto-Generated Generated during job processing
1. The Supply Chain Risk Management Plan (SR-2) directly addresses the scoping question by requiring organizations to identify, assess, and manage risks related to the handling or custody of physical assets, including hardware and inventory, througho...
NIST MA-1 Found
Policy and Procedures

Maintenance policy and procedures address the controls in the MA family that are implemented within systems and organizations. The risk management strategy is an important factor in establishing such ...

Auto-Generated Generated during job processing
MA-1 (Policy and Procedures) is relevant to the scoping question because it ensures that formal policies and documented procedures are in place for the maintenance and handling of physical assets under the entity’s custody. This control is important ...
NIST SR-12 Found
Component Disposal

Data, documentation, tools, or system components can be disposed of at any time during the system development life cycle (not only in the disposal or retirement phase of the life cycle). For example, ...

Auto-Generated Generated during job processing
SR-12 (Component Disposal) is relevant to the scoping question because it ensures that any physical assets—such as hardware, inventory, or documentation—handled by the service are securely and properly disposed of throughout their lifecycle. This con...
NIST IR-4 Found
Incident Handling

Organizations recognize that incident response capabilities are dependent on the capabilities of organizational systems and the mission and business processes being supported by those systems. Organiz...

Auto-Generated Generated during job processing
1. **How this control addresses the scoping question:** IR-4 (Incident Handling) is relevant because handling or custody of physical assets introduces risks such as asset loss, theft, or tampering, all of which require a defined incident response p...
Scoping Question 8

Will the entity’s staff operate on-site at entity facilities? Determines whether the entity’s personnel need to be co-located with your teams, impacting coordination and oversight. Increases insider/physical-security risk (tailgating, unauthorised access); adds complexity for facility management and supervision. Badge-based physical access controls Escort and visitor logging policy Segregated work areas with monitoring cameras

41 Controls
NIST AU-6 Found
Audit Record Review, Analysis, and Reporting

Audit record review, analysis, and reporting covers information security- and privacy-related logging performed by organizations, including logging that results from the monitoring of account usage, r...

Auto-Generated Generated during job processing
1. AU-6 (Audit Record Review, Analysis, and Reporting) is relevant to the scoping question because when staff operate on-site, there is increased risk of unauthorized physical access and insider threats, making it essential to review and analyze audi...
NIST PE-3 Found
Physical Access Control

Physical access control applies to employees and visitors. Individuals with permanent physical access authorizations are not considered visitors. Physical access controls for publicly accessible areas...

Auto-Generated Generated during job processing
PE-3 Physical Access Control is directly relevant to the scoping question because it establishes mechanisms—such as badge-based access, visitor logging, and monitored work areas—to manage and restrict on-site staff movement within entity facilities. ...
NIST AU-16 Found
Cross-organizational Audit Logging

When organizations use systems or services of external organizations, the audit logging capability necessitates a coordinated, cross-organization approach. For example, maintaining the identity of ind...

Auto-Generated Generated during job processing
1. AU-16 (Cross-organizational Audit Logging) is relevant to the scoping question because when staff operate on-site at entity facilities, their actions may span both the entity’s and external organizations’ systems, requiring coordinated audit loggi...
NIST AT-3
Role-based Training

Organizations determine the content of training based on the assigned roles and responsibilities of individuals as well as the security and privacy requirements of organizations and the systems to whi...

Auto-Generated Generated during job processing
1. **How this control addresses the scoping question:** AT-3 (Role-based Training) ensures that staff operating on-site at entity facilities receive training tailored to their specific roles, including physical security protocols and facility acces...
NIST CA-6
Authorization

Authorizations are official management decisions by senior officials to authorize operation of systems, authorize the use of common controls for inheritance by organizational systems, and explicitly a...

Auto-Generated Generated during job processing
CA-6 (Authorization) is relevant to the scoping question because it requires senior management to formally assess and accept the risks associated with staff operating on-site, including insider and physical security risks such as unauthorized access ...
NIST PE-2 Found
Physical Access Authorizations

Physical access authorizations apply to employees and visitors. Individuals with permanent physical access authorization credentials are not considered visitors. Authorization credentials include ID b...

Auto-Generated Generated during job processing
PE-2 (Physical Access Authorizations) directly addresses the scoping question by ensuring that only authorized staff and visitors are permitted physical access to entity facilities, thereby mitigating insider and physical-security risks associated wi...
NIST AC-3 Found
Access Enforcement

Access control policies control access between active entities or subjects (i.e., users or processes acting on behalf of users) and passive entities or objects (i.e., devices, files, records, domains)...

Auto-Generated Generated during job processing
AC-3 (Access Enforcement) is relevant to the scoping question because it ensures that only authorized staff can access systems and data when operating on-site at entity facilities. This control is important for compliance as it enforces access restri...
NIST CM-5 Found
Access Restrictions for Change

Changes to the hardware, software, or firmware components of systems or the operational procedures related to the system can potentially have significant effects on the security of the systems or indi...

Auto-Generated Generated during job processing
CM-5 (Access Restrictions for Change) is relevant to the scoping question because when staff operate on-site, there is increased potential for unauthorized physical or logical access to systems, especially during change management activities. This co...
NIST PM-10 Found
Authorization Process

Authorization processes for organizational systems and environments of operation require the implementation of an organization-wide risk management process and associated security and privacy standard...

Auto-Generated Generated during job processing
1. PM-10 (Authorization Process) is relevant to the scoping question because it ensures that any decision to allow staff to operate on-site is subject to formal risk assessment and approval by designated authorizing officials, integrating physical se...
NIST PS-3
Personnel Screening

Personnel screening and rescreening activities reflect applicable laws, executive orders, directives, regulations, policies, standards, guidelines, and specific criteria established for the risk desig...

Auto-Generated Generated during job processing
The PS-3 Personnel Screening control is directly relevant to the scoping question because when staff operate on-site, there is increased risk of insider threats and unauthorized physical access. Implementing personnel screening ensures that only vett...
NIST IA-2 Found
Identification and Authentication (Organizational Users)

Organizations can satisfy the identification and authentication requirements by complying with the requirements in HSPD 12. Organizational users include employees or individuals who organizations cons...

Auto-Generated Generated during job processing
1. **How this control addresses the scoping question:** IA-2 ensures that all organizational users, including on-site staff, are uniquely identified and authenticated before accessing systems or facilities, directly addressing the risks associated ...
NIST PE-6
Monitoring Physical Access

Physical access monitoring includes publicly accessible areas within organizational facilities. Examples of physical access monitoring include the employment of guards, video surveillance equipment (i...

Auto-Generated Generated during job processing
1. This control addresses the scoping question by ensuring that when staff operate on-site at entity facilities, their physical access is actively monitored to detect and respond to unauthorized or suspicious activities. 2. It is important for compli...
NIST MP-5 Found
Media Transport

System media includes digital and non-digital media. Digital media includes flash drives, diskettes, magnetic tapes, external or removable hard disk drives (e.g., solid state and magnetic), compact d...

Auto-Generated Generated during job processing
Control MP-5 (Media Transport) is relevant to the scoping question because when staff operate on-site, there is an increased likelihood that sensitive media—both digital and non-digital—will be physically moved within or out of the facility. This con...
NIST AC-2 Found
Account Management

Examples of system account types include individual, shared, group, system, guest, anonymous, emergency, developer, temporary, and service. Identification of authorized system users and the specificat...

Auto-Generated Generated during job processing
1. AC-2 (Account Management) is relevant to the scoping question because when staff operate on-site, it is essential to ensure that only authorized personnel have access to systems and data within the facility. 2. This control is important for compli...
NIST MA-5 Found
Maintenance Personnel

Maintenance personnel refers to individuals who perform hardware or software maintenance on organizational systems, while PE-2 addresses physical access for individuals whose maintenance duties place ...

Auto-Generated Generated during job processing
1. MA-5 (Maintenance Personnel) addresses the scoping question by ensuring that only authorized and technically competent individuals are permitted to perform maintenance activities on-site, which is critical when staff operate within entity faciliti...
NIST PT-7 Found
Specific Categories of Personally Identifiable Information

Organizations apply any conditions or protections that may be necessary for specific categories of personally identifiable information. These conditions may be required by laws, executive orders, dire...

Auto-Generated Generated during job processing
1. This control is relevant to the scoping question because when staff operate on-site, there is increased potential for exposure to specific categories of personally identifiable information (PII), requiring tailored protections based on sensitivity...
NIST PE-17 Found
Alternate Work Site

Alternate work sites include government facilities or the private residences of employees. While distinct from alternative processing sites, alternate work sites can provide readily available alternat...

Auto-Generated Generated during job processing
Control PE-17 (Alternate Work Site) is relevant to the scoping question because it ensures that appropriate physical and security controls are applied when staff operate at locations other than the primary entity facility, such as remote offices or p...
NIST PE-18 Found
Location of System Components

Physical and environmental hazards include floods, fires, tornadoes, earthquakes, hurricanes, terrorism, vandalism, an electromagnetic pulse, electrical interference, and other forms of incoming elect...

Auto-Generated Generated during job processing
Control PE-18 is directly relevant to the scoping question because it requires organizations to assess and manage risks associated with the physical location of system components, especially when staff operate on-site. This control is important for c...
NIST MA-6 Found
Timely Maintenance

Organizations specify the system components that result in increased risk to organizational operations and assets, individuals, other organizations, or the Nation when the functionality provided by th...

Auto-Generated Generated during job processing
MA-6 (Timely Maintenance) is relevant to the scoping question because on-site staff may be responsible for maintaining critical system components within entity facilities. Ensuring timely maintenance reduces the risk of operational disruptions and se...
NIST AC-5 Found
Separation of Duties

Separation of duties addresses the potential for abuse of authorized privileges and helps to reduce the risk of malevolent activity without collusion. Separation of duties includes dividing mission or...

Auto-Generated Generated during job processing
The AC-5 Separation of Duties control is relevant to the scoping question because when staff operate on-site, there is increased risk of unauthorized or collusive activities due to physical proximity and access to sensitive areas. This control ensure...
NIST PE-20
Asset Monitoring and Tracking

Asset location technologies can help ensure that critical assets—including vehicles, equipment, and system components—remain in authorized locations. Organizations consult with the Office ...

Auto-Generated Generated during job processing
PE-20 (Asset Monitoring and Tracking) is relevant to the scoping question because when staff operate on-site, there is increased risk of unauthorized movement or removal of critical assets within the facility. This control ensures that assets remain ...
NIST SC-50
Software-enforced Separation and Policy Enforcement

System owners may require additional strength of mechanism to ensure domain separation and policy enforcement for specific types of threats and environments of operation.

Auto-Generated Generated during job processing
SC-50 (Software-enforced Separation and Policy Enforcement) is relevant to the scoping question because when staff operate on-site, there is increased risk of unauthorized access to sensitive systems and data. This control ensures that even within sh...
NIST AU-14 Found
Session Audit

Session audits can include monitoring keystrokes, tracking websites visited, and recording information and/or file transfers. Session audit capability is implemented in addition to event logging and m...

Auto-Generated Generated during job processing
1. The AU-14 Session Audit control is relevant to the scoping question because on-site staff operating at entity facilities may access sensitive systems directly, increasing the need to monitor and audit their activities for potential insider threats...
NIST AC-4 Found
Information Flow Enforcement

Information flow control regulates where information can travel within a system and between systems (in contrast to who is allowed to access the information) and without regard to subsequent accesses ...

Auto-Generated Generated during job processing
1. AC-4 (Information Flow Enforcement) is relevant to the scoping question because when staff operate on-site, there is increased risk of unauthorized information transfer between systems or domains within the facility, especially in areas with mixed...
NIST PS-1 Found
Policy and Procedures

Personnel security policy and procedures for the controls in the PS family that are implemented within systems and organizations. The risk management strategy is an important factor in establishing su...

Auto-Generated Generated during job processing
Control PS-1 (Policy and Procedures) is directly relevant to the scoping question because it requires the organization to establish and maintain personnel security policies and procedures that govern staff operations at on-site facilities. This contr...
NIST PS-9 Found
Position Descriptions

Specification of security and privacy roles in individual organizational position descriptions facilitates clarity in understanding the security or privacy responsibilities associated with the roles a...

Auto-Generated Generated during job processing
Control PS-9 (Position Descriptions) is relevant to the scoping question because clearly defined security and privacy responsibilities in staff position descriptions ensure that personnel operating on-site understand their roles in maintaining physic...
NIST PE-16 Found
Delivery and Removal

Enforcing authorizations for entry and exit of system components may require restricting access to delivery areas and isolating the areas from the system and media libraries.

Auto-Generated Generated during job processing
PE-16 (Delivery and Removal) is relevant to the scoping question because when staff operate on-site, there is increased movement of system components and media within the facility, raising the risk of unauthorized delivery or removal. This control en...
NIST AT-1 Found
Policy and Procedures

Awareness and training policy and procedures address the controls in the AT family that are implemented within systems and organizations. The risk management strategy is an important factor in establi...

Auto-Generated Generated during job processing
1. The AT-1 control ensures that staff operating on-site are governed by formal awareness and training policies and procedures, which directly address the increased insider and physical security risks identified in the scoping question. 2. This contr...
NIST SC-37 Found
Out-of-band Channels

Out-of-band channels include local, non-network accesses to systems; network paths physically separate from network paths used for operational traffic; or non-electronic paths, such as the U.S. Postal...

Auto-Generated Generated during job processing
SC-37 (Out-of-band Channels) is relevant to the scoping question because on-site staff may require secure, non-network methods for transmitting sensitive information, credentials, or updates within the facility. This control is important for complian...
NIST PE-8
Visitor Access Records

Visitor access records include the names and organizations of individuals visiting, visitor signatures, forms of identification, dates of access, entry and departure times, purpose of visits, and the ...

Auto-Generated Generated during job processing
PE-8 (Visitor Access Records) is directly relevant to the scoping question because when entity staff operate on-site, there is an increased risk of unauthorized physical access and insider threats. Maintaining detailed visitor access records enables ...
NIST PM-31
Continuous Monitoring Strategy

Continuous monitoring at the organization level facilitates ongoing awareness of the security and privacy posture across the organization to support organizational risk management decisions. The terms...

Auto-Generated Generated during job processing
1. PM-31 (Continuous Monitoring Strategy) addresses the scoping question by ensuring that physical security controls—such as badge-based access, visitor logging, and monitored work areas—are regularly assessed and monitored when staff operate on-site...
NIST PE-14
Environmental Controls

The provision of environmental controls applies primarily to organizational facilities that contain concentrations of system resources (e.g., data centers, mainframe computer rooms, and server rooms)....

Auto-Generated Generated during job processing
PE-14 (Environmental Controls) is relevant to the scoping question because when staff operate on-site at entity facilities, the physical environment must be safeguarded to ensure the availability and integrity of critical systems and resources. This ...
NIST PM-12
Insider Threat Program

Organizations that handle classified information are required, under Executive Order 13587 EO 13587 and the National Insider Threat Policy ODNI NITP, to establish insider threat programs. The same sta...

Auto-Generated Generated during job processing
1. The Insider Threat Program (PM-12) directly addresses the scoping question by establishing formal mechanisms to detect and mitigate risks posed by staff operating on-site at entity facilities, where insider and physical security threats are height...
NIST AC-1 Found
Policy and Procedures

Access control policy and procedures address the controls in the AC family that are implemented within systems and organizations. The risk management strategy is an important factor in establishing su...

Auto-Generated Generated during job processing
AC-1 (Policy and Procedures) is directly relevant to the scoping question because it ensures that formal access control policies and procedures are established to govern how staff operate on-site, including requirements for badge-based access, escort...
NIST PS-5 Found
Personnel Transfer

Personnel transfer applies when reassignments or transfers of individuals are permanent or of such extended duration as to make the actions warranted. Organizations define actions appropriate for the ...

Auto-Generated Generated during job processing
The PS-5 Personnel Transfer control is relevant to the scoping question because when staff operate on-site, their physical and logical access must be properly managed during transfers or reassignments to prevent unauthorized access to facilities and ...
NIST CM-4 Found
Impact Analyses

Organizational personnel with security or privacy responsibilities conduct impact analyses. Individuals conducting impact analyses possess the necessary skills and technical expertise to analyze the c...

Auto-Generated Generated during job processing
CM-4 (Impact Analyses) is relevant to the scoping question because it ensures that any decision to have staff operate on-site is systematically evaluated for its security and privacy implications, such as increased insider and physical-security risks...
NIST SC-46 Found
Cross Domain Policy Enforcement

For logical policy enforcement mechanisms, organizations avoid creating a logical path between interfaces to prevent the ability to bypass the policy enforcement mechanism. For physical policy enforce...

Auto-Generated Generated during job processing
SC-46 (Cross Domain Policy Enforcement) is relevant to the scoping question because on-site staff increase the risk of unauthorized access to sensitive systems and data, potentially creating logical or physical paths that bypass established security ...
NIST PS-8 Found
Personnel Sanctions

Organizational sanctions reflect applicable laws, executive orders, directives, regulations, policies, standards, and guidelines. Sanctions processes are described in access agreements and can be incl...

Auto-Generated Generated during job processing
Control PS-8 (Personnel Sanctions) is relevant to the scoping question because when staff operate on-site, the risk of insider threats and physical security incidents increases. This control ensures that there are clear consequences for violating sec...
NIST MP-1 Found
Policy and Procedures

Media protection policy and procedures address the controls in the MP family that are implemented within systems and organizations. The risk management strategy is an important factor in establishing ...

Auto-Generated Generated during job processing
1. MP-1 (Policy and Procedures) is relevant to the scoping question because it ensures that formal media protection policies and procedures are established and enforced when staff operate on-site, directly addressing risks associated with physical ac...
NIST SC-48 Found
Sensor Relocation

Adversaries may take various paths and use different approaches as they move laterally through an organization (including its systems) to reach their target or as they attempt to exfiltrate informatio...

Auto-Generated Generated during job processing
1. The SC-48 Sensor Relocation control addresses the scoping question by enhancing physical and insider threat detection when staff operate on-site, ensuring monitoring capabilities adapt to changing risk areas within the facility. 2. This control is...
NIST SC-49
Hardware-enforced Separation and Policy Enforcement

System owners may require additional strength of mechanism and robustness to ensure domain separation and policy enforcement for specific types of threats and environments of operation. Hardware-enfor...

Auto-Generated Generated during job processing
SC-49 (Hardware-enforced Separation and Policy Enforcement) is relevant to the scoping question because on-site staff increase the risk of unauthorized physical access and insider threats, making robust domain separation essential. This control ensur...
Scoping Question 9

Will the entity subcontract any portion of this engagement to other providers? Checks if the prime entity relies on fourth parties, affecting visibility into who actually performs the work. Sub-providers may have weaker controls, inconsistent quality, and introduce hidden compliance or contractual gaps. Flow-down contractual requirements Right-to-audit sub-providers Sub-vendor inventory and control reviews

7 Controls
NIST AU-16 Found
Cross-organizational Audit Logging

When organizations use systems or services of external organizations, the audit logging capability necessitates a coordinated, cross-organization approach. For example, maintaining the identity of ind...

Auto-Generated Generated during job processing
AU-16 (Cross-organizational Audit Logging) is directly relevant to the scoping question because subcontracting introduces external providers whose systems and personnel may process sensitive data or perform critical functions. This control ensures th...
NIST SR-8 Found
Notification Agreements

The establishment of agreements and procedures facilitates communications among supply chain entities. Early notification of compromises and potential compromises in the supply chain that can potentia...

Auto-Generated Generated during job processing
1. Control SR-8 (Notification Agreements) addresses the scoping question by requiring formal agreements and procedures for timely communication of incidents or compromises involving subcontractors or other supply chain entities. 2. This control is im...
NIST SR-6 Found
Supplier Assessments and Reviews

An assessment and review of supplier risk includes security and supply chain risk management processes, foreign ownership, control or influence (FOCI), and the ability of the supplier to effectively a...

Auto-Generated Generated during job processing
Control SR-6 is directly relevant to the scoping question because it ensures that any subcontracted providers are subject to thorough risk assessments and reviews, including evaluation of their own subcontractors (fourth parties). This control is imp...
NIST SA-9 Found
External System Services

External system services are provided by an external provider, and the organization has no direct control over the implementation of the required controls or the assessment of control effectiveness. O...

Auto-Generated Generated during job processing
Control SA-9 (External System Services) is directly relevant to the scoping question because it requires organizations to manage and document the risks associated with using external providers, including subcontractors. This control is important for ...
NIST PS-7 Found
External Personnel Security

External provider refers to organizations other than the organization operating or acquiring the system. External providers include service bureaus, contractors, and other organizations that provide s...

Auto-Generated Generated during job processing
Control PS-7 (External Personnel Security) directly addresses the scoping question by ensuring that any subcontracted providers adhere to defined personnel security requirements, including proper credentialing, access management, and notification of ...
NIST SR-7 Found
Supply Chain Operations Security

Supply chain OPSEC expands the scope of OPSEC to include suppliers and potential suppliers. OPSEC is a process that includes identifying critical information, analyzing friendly actions related to ope...

Auto-Generated Generated during job processing
1. This control addresses the scoping question by requiring the entity to assess and manage operational security risks introduced by subcontractors and suppliers, ensuring that sensitive information and critical operations are protected throughout th...
NIST SR-5
Acquisition Strategies, Tools, and Methods

The use of the acquisition process provides an important vehicle to protect the supply chain. There are many useful tools and techniques available, including obscuring the end use of a system or syste...

Auto-Generated Generated during job processing
1. Control SR-5 is directly relevant to the scoping question because it establishes requirements and strategies for managing risks associated with subcontracting, including the selection, oversight, and contractual obligations of sub-providers. 2. Th...
Scoping Question 10

Does the entity’s performance depend on access to proprietary processes or intellectual property? Clarifies whether the entity needs to understand or use your unique methodologies, algorithms, or trade secrets. Exposure of IP risks theft or leakage, eroding competitive advantage and complicating future provider transitions. NDAs and IP assignment clauses ACLs on sensitive repositories Periodic IP-use audits

16 Controls
NIST AU-16 Found
Cross-organizational Audit Logging

When organizations use systems or services of external organizations, the audit logging capability necessitates a coordinated, cross-organization approach. For example, maintaining the identity of ind...

Auto-Generated Generated during job processing
AU-16 (Cross-organizational Audit Logging) is relevant to the scoping question because it ensures that access to proprietary processes or intellectual property is traceable across organizational boundaries, helping to detect and prevent unauthorized ...
NIST SR-8 Found
Notification Agreements

The establishment of agreements and procedures facilitates communications among supply chain entities. Early notification of compromises and potential compromises in the supply chain that can potentia...

Auto-Generated Generated during job processing
SR-8 (Notification Agreements) is relevant to the scoping question because it ensures timely communication of any compromises or risks related to proprietary processes or intellectual property within the supply chain. This control is important for co...
NIST CM-5 Found
Access Restrictions for Change

Changes to the hardware, software, or firmware components of systems or the operational procedures related to the system can potentially have significant effects on the security of the systems or indi...

Auto-Generated Generated during job processing
CM-5 (Access Restrictions for Change) is relevant to the scoping question because it ensures that only authorized individuals can modify systems or processes that may involve proprietary methodologies, algorithms, or trade secrets. This control is im...
NIST PT-2 Found
Authority to Process Personally Identifiable Information

The processing of personally identifiable information is an operation or set of operations that the information system or organization performs with respect to personally identifiable information acro...

Auto-Generated Generated during job processing
Control PT-2 is relevant to the scoping question because it ensures that any access to proprietary processes or intellectual property involving personally identifiable information (PII) is properly authorized and managed. This control is important fo...
NIST PT-7 Found
Specific Categories of Personally Identifiable Information

Organizations apply any conditions or protections that may be necessary for specific categories of personally identifiable information. These conditions may be required by laws, executive orders, dire...

Auto-Generated Generated during job processing
Control PT-7 is relevant to the scoping question because proprietary processes or intellectual property may involve handling specific categories of personally identifiable information (PII) that require heightened protection. This control ensures tha...
NIST PM-21 Found
Accounting of Disclosures

The purpose of accounting of disclosures is to allow individuals to learn to whom their personally identifiable information has been disclosed, to provide a basis for subsequently advising recipients ...

Auto-Generated Generated during job processing
Control PM-21 (Accounting of Disclosures) is relevant to the scoping question because it ensures that any disclosures of proprietary processes or intellectual property—including those containing personally identifiable information—are tracked and aud...
NIST AC-4 Found
Information Flow Enforcement

Information flow control regulates where information can travel within a system and between systems (in contrast to who is allowed to access the information) and without regard to subsequent accesses ...

Auto-Generated Generated during job processing
AC-4 (Information Flow Enforcement) is directly relevant to the scoping question because it ensures that proprietary processes and intellectual property are only transmitted within authorized boundaries and are not inadvertently or maliciously leaked...
NIST CM-8
System Component Inventory

System components are discrete, identifiable information technology assets that include hardware, software, and firmware. Organizations may choose to implement centralized system component inventories...

Auto-Generated Generated during job processing
1. CM-8 (System Component Inventory) addresses the scoping question by ensuring the organization maintains a comprehensive and accurate inventory of all IT assets, including those that store or process proprietary processes or intellectual property (...
NIST AC-21 Found
Information Sharing

Information sharing applies to information that may be restricted in some manner based on some formal or administrative determination. Examples of such information include, contract-sensitive informat...

Auto-Generated Generated during job processing
AC-21 (Information Sharing) is directly relevant to the scoping question because it governs how proprietary processes and intellectual property (IP) are shared and protected within and outside the organization. This control is important for complianc...
NIST IA-8
Identification and Authentication (Non-organizational Users)

Non-organizational users include system users other than organizational users explicitly covered by IA-2. Non-organizational users are uniquely identified and authenticated for accesses other than tho...

Auto-Generated Generated during job processing
1. Control IA-8 ensures that only uniquely identified and authenticated non-organizational users can access systems containing proprietary processes or intellectual property, directly addressing the risk of unauthorized access highlighted in the scop...
NIST SA-20
Customized Development of Critical Components

Organizations determine that certain system components likely cannot be trusted due to specific threats to and vulnerabilities in those components for which there are no viable security controls to ad...

Auto-Generated Generated during job processing
1. Control SA-20 is relevant to the scoping question because it ensures that critical system components, which may embody proprietary processes or intellectual property, are either custom-developed or subject to enhanced protections when standard sol...
NIST AC-17 Found
Remote Access

Remote access is access to organizational systems (or processes acting on behalf of users) that communicate through external networks such as the Internet. Types of remote access include dial-up, broa...

Auto-Generated Generated during job processing
AC-17 (Remote Access) is relevant to the scoping question because it ensures that remote connections to systems containing proprietary processes or intellectual property (IP) are secured and controlled. This control is important for compliance as it ...
NIST SR-5
Acquisition Strategies, Tools, and Methods

The use of the acquisition process provides an important vehicle to protect the supply chain. There are many useful tools and techniques available, including obscuring the end use of a system or syste...

Auto-Generated Generated during job processing
SR-5 is relevant to the scoping question because it establishes strategies and contractual safeguards to protect proprietary processes and intellectual property throughout the supply chain. This control is important for compliance as it mitigates ris...
NIST SI-18 Found
Personally Identifiable Information Quality Operations

Personally identifiable information quality operations include the steps that organizations take to confirm the accuracy and relevance of personally identifiable information throughout the information...

Auto-Generated Generated during job processing
SI-18 (Personally Identifiable Information Quality Operations) is relevant to the scoping question because proprietary processes or intellectual property may involve the handling of sensitive PII as part of unique methodologies or algorithms. Ensurin...
NIST AU-13 Found
Monitoring for Information Disclosure

Unauthorized disclosure of information is a form of data leakage. Open-source information includes social networking sites and code-sharing platforms and repositories. Examples of organizational infor...

Auto-Generated Generated during job processing
1. AU-13: Monitoring for Information Disclosure is directly relevant to the scoping question because it helps detect and prevent unauthorized exposure of proprietary processes or intellectual property (IP) through open-source platforms, code reposito...
NIST SA-2 Found
Allocation of Resources

Resource allocation for information security and privacy includes funding for system and services acquisition, sustainment, and supply chain-related risks throughout the system development life cycle.

Auto-Generated Generated during job processing
1. Control SA-2 ensures that adequate resources are allocated to protect proprietary processes and intellectual property throughout the system development life cycle, directly addressing the need to safeguard unique methodologies, algorithms, or trad...
Scoping Question 11

Does the entity use third parties to deliver services outside the United States? Identifies whether any part of service delivery is outsourced internationally, beyond your direct oversight. Offshore third parties can fall under different regulatory regimes, complicate compliance, data-sovereignty, and oversight. International due-diligence and risk assessments Flow-down contract clauses for compliance and data handling Regular third-party audits and SLAs

10 Controls
NIST AU-16 Found
Cross-organizational Audit Logging

When organizations use systems or services of external organizations, the audit logging capability necessitates a coordinated, cross-organization approach. For example, maintaining the identity of ind...

Auto-Generated Generated during job processing
AU-16 (Cross-organizational Audit Logging) is directly relevant to the scoping question because it ensures that audit trails are maintained and coordinated when services are delivered by third parties outside the United States. This control is import...
NIST SR-8 Found
Notification Agreements

The establishment of agreements and procedures facilitates communications among supply chain entities. Early notification of compromises and potential compromises in the supply chain that can potentia...

Auto-Generated Generated during job processing
SR-8 (Notification Agreements) is directly relevant to the scoping question because it ensures that offshore third-party service providers are contractually obligated to promptly notify the entity of any security compromises or incidents. This contro...
NIST SR-6 Found
Supplier Assessments and Reviews

An assessment and review of supplier risk includes security and supply chain risk management processes, foreign ownership, control or influence (FOCI), and the ability of the supplier to effectively a...

Auto-Generated Generated during job processing
Control SR-6 is directly relevant to the scoping question because it requires organizations to assess and review the risks associated with suppliers, including those located outside the United States. This control is important for compliance as it en...
NIST SA-9 Found
External System Services

External system services are provided by an external provider, and the organization has no direct control over the implementation of the required controls or the assessment of control effectiveness. O...

Auto-Generated Generated during job processing
Control SA-9 (External System Services) directly addresses the scoping question by requiring organizations to establish and document trust relationships, security roles, and service-level agreements with external service providers, including those lo...
NIST SA-21
Developer Screening

Developer screening is directed at external developers. Internal developer screening is addressed by PS-3. Because the system, system component, or system service may be used in critical activities es...

Auto-Generated Generated during job processing
1. **How this control addresses the scoping question:** SA-21 Developer Screening is directly relevant to the scoping question because it ensures that external developers, including those located outside the United States, are properly vetted for t...
NIST PS-7 Found
External Personnel Security

External provider refers to organizations other than the organization operating or acquiring the system. External providers include service bureaus, contractors, and other organizations that provide s...

Auto-Generated Generated during job processing
Control PS-7 (External Personnel Security) is directly relevant to the scoping question because it ensures that personnel security requirements are applied to third-party providers, including those delivering services outside the United States. This ...
NIST SI-5 Found
Security Alerts, Advisories, and Directives

The Cybersecurity and Infrastructure Security Agency (CISA) generates security alerts and advisories to maintain situational awareness throughout the Federal Government. Security directives are issued...

Auto-Generated Generated during job processing
1. **How this control addresses the scoping question:** SI-5 ensures that security alerts, advisories, and directives are communicated and acted upon not only within the organization but also across external service providers, including offshore th...
NIST AC-20 Found
Use of External Systems

External systems are systems that are used by but not part of organizational systems, and for which the organization has no direct control over the implementation of required controls or the assessmen...

Auto-Generated Generated during job processing
Control AC-20 is directly relevant to the scoping question because it governs the use of external systems, including those operated by third parties outside the United States, for service delivery. This control is important for compliance as it ensur...
NIST SR-7 Found
Supply Chain Operations Security

Supply chain OPSEC expands the scope of OPSEC to include suppliers and potential suppliers. OPSEC is a process that includes identifying critical information, analyzing friendly actions related to ope...

Auto-Generated Generated during job processing
1. Control SR-7 (Supply Chain Operations Security) addresses the scoping question by ensuring that operational security practices extend to third-party suppliers, including those located outside the United States, to protect sensitive information and...
NIST IR-8 Found
Incident Response Plan

It is important that organizations develop and implement a coordinated approach to incident response. Organizational mission and business functions determine the structure of incident response capabil...

Auto-Generated Generated during job processing
1. Control IR-8 is relevant to the scoping question because it ensures that incident response plans include coordination with international third-party service providers, addressing the risks associated with outsourcing services outside the United St...
Scoping Question 12

Will the service generate customer-facing deliverables or directly impact end users? Determines if the entity’s outputs (reports, portals, APIs) are visible to or used by your customers or partners. Errors or downtime become public, risking reputational damage, customer churn, and potential SLA penalties. QA review gates Pre-release user-acceptance testing (UAT) Versioned API contracts and rollback procedures

2 Controls
NIST SR-8 Found
Notification Agreements

The establishment of agreements and procedures facilitates communications among supply chain entities. Early notification of compromises and potential compromises in the supply chain that can potentia...

Auto-Generated Generated during job processing
1. Control SR-8 (Notification Agreements) addresses the scoping question by ensuring that any incidents, compromises, or significant changes affecting customer-facing deliverables are promptly communicated to relevant stakeholders, including customer...
NIST SA-9 Found
External System Services

External system services are provided by an external provider, and the organization has no direct control over the implementation of the required controls or the assessment of control effectiveness. O...

Auto-Generated Generated during job processing
Control SA-9 (External System Services) is relevant to the scoping question because when a service generates customer-facing deliverables or directly impacts end users, any reliance on external providers introduces additional risks to the quality, av...
Scoping Question 13

Is continuous (24/7) availability required for this service? Establishes whether the service must run without interruption (e.g., call center, global e-commerce). Leaves little maintenance window, higher ops burden, risk of slip-ups or fatigue-related errors in support shifts. SLAs with uptime guarantees Geographically redundant infrastructure Automated alerting and escalation paths

9 Controls
NIST CA-7 Found
Continuous Monitoring

Continuous monitoring at the system level facilitates ongoing awareness of the system security and privacy posture to support organizational risk management decisions. The terms continuous and ongoing...

Auto-Generated Generated during job processing
CA-7 Continuous Monitoring is directly relevant to the scoping question regarding 24/7 service availability because it ensures ongoing awareness of system security and operational status, enabling rapid detection and response to incidents that could ...
NIST MA-6 Found
Timely Maintenance

Organizations specify the system components that result in increased risk to organizational operations and assets, individuals, other organizations, or the Nation when the functionality provided by th...

Auto-Generated Generated during job processing
Control MA-6 (Timely Maintenance) is directly relevant to the scoping question about 24/7 service availability because it ensures that critical system components are maintained without causing prolonged downtime or service interruptions. This control...
NIST CP-8 Found
Telecommunications Services

Telecommunications services (for data and voice) for primary and alternate processing and storage sites are in scope for CP-8. Alternate telecommunications services reflect the continuity requirements...

Auto-Generated Generated during job processing
CP-8 (Telecommunications Services) is directly relevant to the scoping question regarding 24/7 availability, as it ensures that both primary and alternate telecommunications services are in place to support uninterrupted operations. This control is i...
NIST CP-7 Found
Alternate Processing Site

Alternate processing sites are geographically distinct from primary processing sites and provide processing capability if the primary processing site is not available. The alternate processing capabil...

Auto-Generated Generated during job processing
1. The CP-7 Alternate Processing Site control directly addresses the scoping question by ensuring that the service can maintain continuous (24/7) availability, even if the primary site experiences disruption or failure. 2. This control is important...
NIST SI-17 Found
Fail-safe Procedures

Failure conditions include the loss of communications among critical system components or between system components and operational facilities. Fail-safe procedures include alerting operator personnel...

Auto-Generated Generated during job processing
Control SI-17 (Fail-safe Procedures) is directly relevant to the scoping question about 24/7 service availability because it ensures that, in the event of a failure or loss of communication, there are predefined steps to maintain or quickly restore s...
NIST PM-31
Continuous Monitoring Strategy

Continuous monitoring at the organization level facilitates ongoing awareness of the security and privacy posture across the organization to support organizational risk management decisions. The terms...

Auto-Generated Generated during job processing
**Justification:** 1. The Continuous Monitoring Strategy (PM-31) directly addresses the scoping question by ensuring that the service’s security and privacy posture is continuously assessed, which is essential for services requiring 24/7 availabilit...
NIST SI-13 Found
Predictable Failure Prevention

While MTTF is primarily a reliability issue, predictable failure prevention is intended to address potential failures of system components that provide security capabilities. Failure rates reflect ins...

Auto-Generated Generated during job processing
1. SI-13 (Predictable Failure Prevention) directly addresses the scoping question by ensuring that critical security components remain available and operational even during failures, which is essential for services requiring continuous (24/7) availab...
NIST CP-2 Found
Contingency Plan

Contingency planning for systems is part of an overall program for achieving continuity of operations for organizational mission and business functions. Contingency planning addresses system restorati...

Auto-Generated Generated during job processing
CP-2 (Contingency Plan) is directly relevant to the scoping question because it ensures that systems supporting services requiring continuous (24/7) availability have documented and tested plans for rapid restoration and alternative operations in cas...
NIST PE-12 Found
Emergency Lighting

The provision of emergency lighting applies primarily to organizational facilities that contain concentrations of system resources, including data centers, server rooms, and mainframe computer rooms. ...

Auto-Generated Generated during job processing
1. Emergency lighting (PE-12) ensures that critical facilities, such as data centers, remain safely accessible and operational during power outages, directly supporting the requirement for continuous (24/7) service availability. 2. This control is im...
Scoping Question 14

Will any part of the work be performed—or deliverables hosted—outside the United States? Reveals cross-border execution or hosting, with implications for time zones, language, and differing regulations. May violate data-sovereignty laws, complicate breach-notification requirements, and introduce communication or time-zone challenges. Data-residency and export-control policies Encryption of data in transit and at rest Jurisdiction-specific compliance attestations

4 Controls
NIST SI-5 Found
Security Alerts, Advisories, and Directives

The Cybersecurity and Infrastructure Security Agency (CISA) generates security alerts and advisories to maintain situational awareness throughout the Federal Government. Security directives are issued...

Auto-Generated Generated during job processing
1. **How this control addresses the scoping question:** SI-5 ensures that organizations, including those with operations or data hosted outside the United States, promptly receive and act on security alerts, advisories, and directives relevant to t...
NIST CP-6 Found
Alternate Storage Site

Alternate storage sites are geographically distinct from primary storage sites and maintain duplicate copies of information and data if the primary storage site is not available. Similarly, alternate ...

Auto-Generated Generated during job processing
Control CP-6 (Alternate Storage Site) is directly relevant to the scoping question because it requires organizations to identify and manage the geographic location of backup and processing sites, which may be outside the United States. This control i...
NIST AC-4 Found
Information Flow Enforcement

Information flow control regulates where information can travel within a system and between systems (in contrast to who is allowed to access the information) and without regard to subsequent accesses ...

Auto-Generated Generated during job processing
**Justification:** 1. AC-4 (Information Flow Enforcement) directly addresses the scoping question by ensuring that information transfers between systems—including those located or operated outside the United States—are strictly controlled and compli...
NIST CP-7 Found
Alternate Processing Site

Alternate processing sites are geographically distinct from primary processing sites and provide processing capability if the primary processing site is not available. The alternate processing capabil...

Auto-Generated Generated during job processing
Control CP-7 (Alternate Processing Site) is directly relevant to the scoping question because it requires organizations to identify and manage alternate processing locations, which may be outside the United States. This control is important for compl...
Scoping Question 15

Does the service entail custom or bespoke development unique to entity? Flags projects that require tailored code, configurations, or processes rather than off-the-shelf solutions. Custom solutions are harder to maintain, increase dependency, and may not be supported by other providers or future upgrades. Secure SDLC with code reviews Version-controlled documentation Exit-ready source-code escrow

3 Controls
NIST SA-22
Unsupported System Components

Support for system components includes software patches, firmware updates, replacement parts, and maintenance contracts. An example of unsupported components includes when vendors no longer provide cr...

Auto-Generated Generated during job processing
1. This control addresses the scoping question by ensuring that custom or bespoke development, which often results in unique system components, remains supported through patches, updates, or alternative support arrangements when vendor support is una...
NIST SA-20
Customized Development of Critical Components

Organizations determine that certain system components likely cannot be trusted due to specific threats to and vulnerabilities in those components for which there are no viable security controls to ad...

Auto-Generated Generated during job processing
Control SA-20 is directly relevant to the scoping question because it addresses the risks associated with custom or bespoke development, which often involves components that cannot be adequately protected by standard security controls. This control i...
NIST SA-15 Found
Development Process, Standards, and Tools

Development tools include programming languages and computer-aided design systems. Reviews of development processes include the use of maturity models to determine the potential effectiveness of such ...

Auto-Generated Generated during job processing
Control SA-15 is directly relevant to the scoping question because it ensures that custom or bespoke development follows defined processes, standards, and configuration controls throughout the system development life cycle. This is important for comp...
Processing...

Please wait while we process your request