Free ebook: NIS2 ready using ISO 27001 best practices
Download ebook

Requirements included in the framework

ID.AM-1
NIST CSF

Physical device inventory

ID.AM-2
NIST CSF

Software and app inventory

ID.AM-3
NIST CSF

Communication and data flows

ID.AM-4
NIST CSF

External information systems

ID.AM-5
NIST CSF

Resource prioritization

ID.AM-6
NIST CSF

Cybersecurity roles and responsibilities

ID.BE
NIST CSF

Business Environment

ID.BE-1
NIST CSF

Role in supply chain

ID.BE-2
NIST CSF

Place in critical infrastructure

ID.BE-3
NIST CSF

Organizational mission, objectives and activities

ID.BE-4
NIST CSF

Dependencies and critical functions

ID.BE-5
NIST CSF

Resilience requirements

ID.GV
NIST CSF

Governance

ID.GV-1
NIST CSF

Cybersecurity policy

ID.GV-2
NIST CSF

Cybersecurity role coordination

ID.GV-3
NIST CSF

Legal and regulatory requirements

ID.GV-4
NIST CSF

Processes

ID.RA
NIST CSF

Risk Assessment

ID.RA-1
NIST CSF

Asset vulnerabilities

ID.RA-2
NIST CSF

Cyber threat intelligence

ID.RA-3
NIST CSF

Threat identification

ID.RA-4
NIST CSF

Impacts on business

ID.RA-5
NIST CSF

Risk evaluation

ID.RA-6
NIST CSF

Risk responses