C2M278
ACCESS-1.A (MIL1) · ACCESS-1.B (MIL1) · ACCESS-2.A (MIL1) · ACCESS-2.B (MIL1) · ACCESS-2.C (MIL2) · ACCESS-2.D (MIL2) · ACCESS-2.E (MIL2) · ACCESS-2.F (MIL3) · ARCHITECTURE-1.A (MIL1) · ARCHITECTURE-1.B (MIL1) · ARCHITECTURE-1.C (MIL2) · ARCHITECTURE-1.D (MIL2) · ARCHITECTURE-1.E (MIL3) · ASSET-1.A (MIL1) · ASSET-1.B (MIL1) · ASSET-1.C (MIL1) · ASSET-2.A (MIL1) · ASSET-2.B (MIL2) · ASSET-3.A (MIL1) · ASSET-3.B (MIL1) · ASSET-3.C (MIL2) · ASSET-3.D (MIL2) · ASSET-3.E (MIL3) · C2M2 · ISC-1.A (MIL1) · ISC-1.B (MIL2) · ISC-1.C (MIL3) · PROGRAM-1.A (MIL1) · PROGRAM-1.B (MIL1) · PROGRAM-1.C (MIL2) · PROGRAM-1.D (MIL2) · PROGRAM-1.E (MIL2) · PROGRAM-1.F (MIL3) · RESPONSE-1.A (MIL1) · RESPONSE-1.B (MIL1) · RESPONSE-2.A (MIL1) · RESPONSE-2.B (MIL1) · RESPONSE-2.C (MIL1) · RESPONSE-2.D (MIL2) · RESPONSE-3.A (MIL1) · RESPONSE-3.B (MIL2) · RESPONSE-3.C (MIL3) · RISK-1.A (MIL1) · RISK-1.B (MIL1) · RISK-1.C (MIL1) · RISK-1.D (MIL2) · RISK-1.E (MIL2) · RISK-1.F (MIL3) · SITUATION-1.A (MIL1) · SITUATION-1.B (MIL1) · SITUATION-1.C (MIL2) · SITUATION-1.D (MIL3) · THIRD-PARTIES-1.A (MIL1) · THIRD-PARTIES-1.B (MIL1) · THIRD-PARTIES-1.C (MIL2) · THIRD-PARTIES-1.D (MIL3) · THREAT-1.A (MIL1) · THREAT-1.B (MIL1) · THREAT-1.C (MIL2) · THREAT-2.A (MIL1) · THREAT-2.B (MIL1) · THREAT-2.C (MIL2) · THREAT-2.D (MIL3) · WORKFORCE-1.A (MIL1) · WORKFORCE-1.B (MIL1) · WORKFORCE-1.C (MIL1) · WORKFORCE-1.D (MIL1) · WORKFORCE-1.E (MIL2) · WORKFORCE-1.F (MIL3)
Requirements in this framework
- Access Granting and Revoking
- Access Requirements
- Access Review
- Architecture and resilience engineering
- Asset Inventory Prioritization
- Asset Management Governance
- Asset, change, and configuration management
- Change Impact Analysis
- Change Logging
- Change Management Process
- Change Rollback Procedures
- Configuration Baselines
- Configuration Monitoring
- Continuity of Operations Planning
- Continuity Plan Testing
- Cybersecurity Architecture Design
- Cybersecurity Architecture Governance
- Cybersecurity governance maturity
- Cybersecurity Program Governance
- Cybersecurity Program Improvement
- Cybersecurity Program Metrics
- Cybersecurity Program Resources
- Cybersecurity Program Sponsorship
- Cybersecurity Program Strategy
- Cybersecurity Responsibilities Assignment
- Cybersecurity State Communication
- Cybersecurity Training
- Cybersecurity workforce capability development
- Data Protection Controls
- Dependency Identification
- Event Analysis
- Event Detection
- Identity and Access Management Governance
- Identity and access management maturity
- Identity Deprovisioning
- Identity Management
- Incident Declaration
- Incident Escalation
- Incident Response
- Incident response and continuity
- Incident Response Governance
- Incident Root Cause Analysis
- Information Asset Inventory
- Information sharing and stakeholder coordination
- Information Sharing Governance
- IT and OT Asset Inventory
- Log Review and Analysis
- Logging and Monitoring
- Multifactor Authentication
- Network Segmentation
- Operational situational awareness
- Personnel Vetting
- Privileged Access Management
- Reporting Obligations
- Risk Analysis and Prioritization
- Risk Identification
- Risk Management Strategy
- Risk Register
- Risk Response
- Risk Tolerance Definition
- Secure Software Development
- Security Awareness Program
- Situational Awareness Governance
- Supplier Cybersecurity Requirements
- Supplier Risk Assessment
- Supply chain and external dependency risk
- Supply Chain Risk Management Governance
- Threat and vulnerability management
- Threat and Vulnerability Management Governance
- Threat Identification
- Threat Intelligence Sharing
- Threat Intelligence Sources
- Threat Profile Development
- Vulnerability Identification
- Vulnerability Remediation
- Vulnerability Scanning
- Workforce Management Governance
- Workforce Skills Assessment