international information security standards
SECURITY CONTROL MAPPINGS FOR ISO/IEC 27001 AND 15408
T
he mapping tables in this appendix provide organizations with a general indication of security control coverage with respect to ISO/IEC 27001, Information technology–Security techniques–Information security management systems–Requirements[113]</sup> and ISO/IEC 15408, Information technology -- Security techniques -- Evaluation criteria for IT security.[114]</sup> ISO/IEC 27001 may be applied to all types of organizations and specifies requirements for establishing, implementing, operating, monitoring, reviewing, maintaining, and improving a documented information security management system (ISMS) within the context of business risks. NIST Special Publication 800-39 includes guidance on managing risk at the organizational level, mission/business process level, and information system level, is consistent with ISO/IEC 27001, and provides additional implementation detail for the federal government and its contractors. ISO/IEC 15408 (also known as the Common Criteria) provides functionality and assurance requirements for developers of information systems and information system components (i.e., information technology products). Since many of the technical security controls defined in Appendix F are implemented in hardware, software, and firmware components of information systems, organizations can obtain significant benefit from the acquisition and employment of information technology products evaluated against the requirements of ISO/IEC 15408. The use of such products can provide evidence that certain security controls are implemented correctly, operating as intended, and producing the desired effect in satisfying stated security requirements.
Previously, the ISO/IEC 27001 mappings were created by relating the primary security topic identified in each of the Special Publication 800-53 base controls to a similar security topic in the ISO/IEC standard. This methodology resulted in a mapping of security control relationships rather than a mapping of equivalent security control requirements. The ISO/IEC 27001:2013 update provided an opportunity to reassess whether the implementation of a security control from Special Publication 800-53 satisfied the intent of the mapped control from ISO/IEC 27001 and conversely, whether the implementation of a security control from ISO/IEC 27001 satisfied the intent of the mapped control from Special Publication 800-53. To successfully meet the mapping criteria, the implementation of the mapped controls should result in an equivalent information security posture. However, this does not mean that security control equivalency based solely on the mapping tables herein should be assumed by organizations. While the revised security control mappings are more accurate, there is still some degree of subjectivity in the mapping analysis because the mappings are not always one-to-one and may not be completely equivalent. The following examples illustrate some of the mapping issues:
- Example 1: Special Publication 800-53 contingency planning and ISO/IEC 27001 business continuity management were deemed to have similar, but not the same, functionality.
- Example 2: In some cases, similar topics are addressed in the two security control sets but provide a different context, perspective, or scope. Special Publication 800-53 addresses information flow control broadly in terms of approved authorizations for controlling access between source and destination objects, whereas ISO/IEC 27001 addresses information flow more narrowly as it applies to interconnected network domains.
- Example 3: Security control A.6.1.1, Information Security Roles and Responsibilities, in ISO/IEC 27001 states that “all information security responsibilities shall be defined and allocated” while security control PM-10, Security Authorization Process, in Special Publication 800-53 that is mapped to A.6.1.1, has three distinct parts. The first part states that the organization “designates individuals to fulfill specific roles and responsibilities…” If A.6.1.1 is mapped to PM-10 without providing any additional information, organizations might assume that if they implement A.6.1.1 (i.e., all responsibilities are defined and allocated), then the intent of PM-10 would also be fully satisfied. However, this would not be the case since the other two parts of PM-10 would not have been addressed. To resolve and clarify the security control mappings, when a security control in the right column of Tables H-1 and H-2 does not fully satisfy the intent of the security control in the left column of the tables, the control in the right column is designated with an asterisk (*).
In a few cases, an ISO/IEC 27001 security control could only be directly mapped to a Special Publication 800-53 control enhancement. In such cases, the relevant enhancement is specified in Table H-2 indicating that the corresponding ISO/IEC 27001 control satisfies only the intent of the specified enhancement and does not address the associated base control from Special Publication 800-53 or any other enhancements under that base control. Where no enhancement is specified, the ISO/IEC 27001 control is relevant only to the Special Publication 800-53 base control.
And finally, the security controls from ISO/IEC 27002 were not considered in the mapping analysis since the standard is informative rather than normative.
Table H-1 provides a mapping from the security controls in NIST Special Publication 800-53 to the security controls in ISO/IEC 27001. Please review the introductory text at the beginning of Appendix H before employing the mappings in Table H-1.
TABLE H-1: MAPPING NIST SP 800-53 TO ISO/IEC 27001
NIST SP 800-53 CONTROLS | ISO/IEC 27001 CONTROLS | |
---|---|---|
AC-1 | Access Control Policy and Procedures | A.5.1.1, A.5.1.2, A.6.1.1, A.9.1.1, A.12.1.1, A.18.1.1, A.18.2.2 |
AC-2 | Account Management | A.9.2.1, A.9.2.2, A.9.2.3, A.9.2.5, A.9.2.6 |
AC-3 | Access Enforcement | A.6.2.2, A.9.1.2, A.9.4.1, A.9.4.4, A.9.4.5, A.13.1.1, A.14.1.2, A.14.1.3, A.18.1.3 |
AC-4 | Information Flow Enforcement | A.13.1.3, A.13.2.1, A.14.1.2, A.14.1.3 |
AC-5 | Separation of Duties | A.6.1.2 |
AC-6 | Least Privilege | A.9.1.2, A.9.2.3, A.9.4.4, A.9.4.5 |
AC-7 | Unsuccessful Logon Attempts | A.9.4.2 |
AC-8 | System Use Notification | A.9.4.2 |
AC-9 | Previous Logon (Access) Notification | A.9.4.2 |
AC-10 | Concurrent Session Control | None |
AC-11 | Session Lock | A.11.2.8, A.11.2.9 |
AC-12 | Session Termination | None |
AC-13 | Withdrawn | --- |
AC-14 | Permitted Actions without Identification or Authentication | None |
AC-15 | Withdrawn | --- |
AC-16 | Security Attributes | None |
AC-17 | Remote Access | A.6.2.1, A.6.2.2, A.13.1.1, A.13.2.1, A.14.1.2 |
AC-18 | Wireless Access | A.6.2.1, A.13.1.1, A.13.2.1 |
AC-19 | Access Control for Mobile Devices | A.6.2.1, A.11.2.6, A.13.2.1 |
AC-20 | Use of External Information Systems | A.11.2.6, A.13.1.1, A.13.2.1 |
AC-21 | Information Sharing | None |
AC-22 | Publicly Accessible Content | None |
AC-23 | Data Mining Protection | None |
AC-24 | Access Control Decisions | A.9.4.1* |
AC-25 | Reference Monitor | None |
AT-1 | Security Awareness and Training Policy and Procedures | A.5.1.1, A.5.1.2, A.6.1.1, A.12.1.1, A.18.1.1, A.18.2.2 |
AT-2 | Security Awareness Training | A.7.2.2, A.12.2.1 |
AT-3 | Role-Based Security Training | A.7.2.2* |
AT-4 | Security Training Records | None |
AT-5 | Withdrawn | --- |
AU-1 | Audit and Accountability Policy and Procedures | A.5.1.1, A.5.1.2, A.6.1.1, A.12.1.1, A.18.1.1, A.18.2.2 |
AU-2 | Audit Events | None |
AU-3 | Content of Audit Records | A.12.4.1* |
AU-4 | Audit Storage Capacity | A.12.1.3 |
AU-5 | Response to Audit Processing Failures | None |
AU-6 | Audit Review, Analysis, and Reporting | A.12.4.1, A.16.1.2, A.16.1.4 |
AU-7 | Audit Reduction and Report Generation | None |
AU-8 | Time Stamps | A.12.4.4 |
AU-9 | Protection of Audit Information | A.12.4.2, A.12.4.3, A.18.1.3 |
AU-10 | Non-repudiation | None |
AU-11 | Audit Record Retention | A.12.4.1, A.16.1.7 |
AU-12 | Audit Generation | A.12.4.1, A.12.4.3 |
AU-13 | Monitoring for Information Disclosure | None |
AU-14 | Session Audit | A.12.4.1* |
AU-15 | Alternate Audit Capability | None |
AU-16 | Cross-Organizational Auditing | None |
CA-1 | Security Assessment and Authorization Policies and Procedures | A.5.1.1, A.5.1.2, A.6.1.1, A.12.1.1, A.18.1.1, A.18.2.2 |
CA-2 | Security Assessments | A.14.2.8, A.18.2.2, A.18.2.3 |
CA-3 | System Interconnections | A.13.1.2, A.13.2.1, A.13.2.2 |
CA-4 | Withdrawn | --- |
CA-5 | Plan of Action and Milestones | None |
CA-6 | Security Authorization | None |
CA-7 | Continuous Monitoring | None |
CA-8 | Penetration Testing | None |
CA-9 | Internal System Connections | None |
CM-1 | Configuration Management Policy and Procedures | A.5.1.1, A.5.1.2, A.6.1.1, A.12.1.1, A.18.1.1, A.18.2.2 |
CM-2 | Baseline Configuration | None |
CM-3 | Configuration Change Control | A.12.1.2, A.14.2.2, A.14.2.3, A.14.2.4 |
CM-4 | Security Impact Analysis | A.14.2.3 |
CM-5 | Access Restrictions for Change | A.9.2.3, A.9.4.5, A.12.1.2, A.12.1.4, A.12.5.1 |
CM-6 | Configuration Settings | None |
CM-7 | Least Functionality | A.12.5.1* |
CM-8 | Information System Component Inventory | A.8.1.1, A.8.1.2 |
CM-9 | Configuration Management Plan | A.6.1.1* |
CM-10 | Software Usage Restrictions | A.18.1.2 |
CM-11 | User-Installed Software | A.12.5.1, A.12.6.2 |
CP-1 | Contingency Planning Policy and Procedures | A.5.1.1, A.5.1.2, A.6.1.1, A.12.1.1, A.18.1.1, A.18.2.2 |
CP-2 | Contingency Plan | A.6.1.1, A.17.1.1, A.17.2.1 |
CP-3 | Contingency Training | A.7.2.2* |
CP-4 | Contingency Plan Testing | A.17.1.3 |
CP-5 | Withdrawn | --- |
CP-6 | Alternate Storage Site | A.11.1.4, A.17.1.2, A.17.2.1 |
CP-7 | Alternate Processing Site | A.11.1.4, A.17.1.2, A.17.2.1 |
CP-8 | Telecommunications Services | A.11.2.2, A.17.1.2 |
CP-9 | Information System Backup | A.12.3.1, A.17.1.2, A.18.1.3 |
CP-10 | Information System Recovery and Reconstitution | A.17.1.2 |
CP-11 | Alternate Communications Protocols | A.17.1.2* |
CP-12 | Safe Mode | None |
CP-13 | Alternative Security Mechanisms | A.17.1.2* |
IA-1 | Identification and Authentication Policy and Procedures | A.5.1.1, A.5.1.2, A.6.1.1, A.12.1.1, A.18.1.1, A.18.2.2 |
IA-2 | Identification and Authentication (Organizational Users) | A.9.2.1 |
IA-3 | Device Identification and Authentication | None |
IA-4 | Identifier Management | A.9.2.1 |
IA-5 | Authenticator Management | A.9.2.1, A.9.2.4, A.9.3.1, A.9.4.3 |
IA-6 | Authenticator Feedback | A.9.4.2 |
IA-7 | Cryptographic Module Authentication | A.18.1.5 |
IA-8 | Identification and Authentication (Non-Organizational Users) | A.9.2.1 |
IA-9 | Service Identification and Authentication | None |
IA-10 | Adaptive Identification and Authentication | None |
IA-11 | Re-authentication | None |
IR-1 | Incident Response Policy and Procedures | A.5.1.1, A.5.1.2, A.6.1.1, A.12.1.1 A.18.1.1, A.18.2.2 |
IR-2 | Incident Response Training | A.7.2.2* |
IR-3 | Incident Response Testing | None |
IR-4 | Incident Handling | A.16.1.4, A.16.1.5, A.16.1.6 |
IR-5 | Incident Monitoring | None |
IR-6 | Incident Reporting | A.6.1.3, A.16.1.2 |
IR-7 | Incident Response Assistance | None |
IR-8 | Incident Response Plan | A.16.1.1 |
IR-9 | Information Spillage Response | None |
IR-10 | Integrated Information Security Analysis Team | None |
MA-1 | System Maintenance Policy and Procedures | A.5.1.1, A.5.1.2, A.6.1.1, A.12.1.1, A.18.1.1, A.18.2.2 |
MA-2 | Controlled Maintenance | A.11.2.4, A.11.2.5 |
MA-3 | Maintenance Tools | None |
MA-4 | Nonlocal Maintenance | None |
MA-5 | Maintenance Personnel | None |
MA-6 | Timely Maintenance | A.11.2.4 |
MP-1 | Media Protection Policy and Procedures | A.5.1.1, A.5.1.2, A.6.1.1, A.12.1.1, A.18.1.1, A.18.2.2 |
MP-2 | Media Access | A.8.2.3, A.8.3.1, A.11.2.9 |
MP-3 | Media Marking | A.8.2.2 |
MP-4 | Media Storage | A.8.2.3, A.8.3.1, A.11.2.9 |
MP-5 | Media Transport | A.8.2.3, A.8.3.1, A.8.3.3, A.11.2.5, A.11.2.6 |
MP-6 | Media Sanitization | A.8.2.3, A.8.3.1, A.8.3.2, A.11.2.7 |
MP-7 | Media Use | A.8.2.3, A.8.3.1 |
MP-8 | Media Downgrading | None |
PE-1 | Physical and Environmental Protection Policy and Procedures | A.5.1.1, A.5.1.2, A.6.1.1, A.12.1.1, A.18.1.1, A.18.2.2 |
PE-2 | Physical Access Authorizations | A.11.1.2* |
PE-3 | Physical Access Control | A.11.1.1, A.11.1.2, A.11.1.3 |
PE-4 | Access Control for Transmission Medium | A.11.1.2, A.11.2.3 |
PE-5 | Access Control for Output Devices | A.11.1.2, A.11.1.3 |
PE-6 | Monitoring Physical Access | None |
PE-7 | Withdrawn | --- |
PE-8 | Visitor Access Records | None |
PE-9 | Power Equipment and Cabling | A.11.1.4, A.11.2.1, A.11.2.2, A.11.2.3 |
PE-10 | Emergency Shutoff | A.11.2.2* |
PE-11 | Emergency Power | A.11.2.2 |
PE-12 | Emergency Lighting | A.11.2.2* |
PE-13 | Fire Protection | A.11.1.4, A.11.2.1 |
PE-14 | Temperature and Humidity Controls | A.11.1.4, A.11.2.1, A.11.2.2 |
PE-15 | Water Damage Protection | A.11.1.4, A.11.2.1, A.11.2.2 |
PE-16 | Delivery and Removal | A.8.2.3, A.11.1.6, A.11.2.5 |
PE-17 | Alternate Work Site | A.6.2.2, A.11.2.6, A.13.2.1 |
PE-18 | Location of Information System Components | A.8.2.3, A.11.1.4, A.11.2.1 |
PE-19 | Information Leakage | A.11.1.4, A.11.2.1 |
PE-20 | Asset Monitoring and Tracking | A.8.2.3* |
PL-1 | Security Planning Policy and Procedures | A.5.1.1, A.5.1.2, A.6.1.1, A.12.1.1, A.18.1.1, A.18.2.2 |
PL-2 | System Security Plan | A.14.1.1 |
PL-3 | Withdrawn | --- |
PL-4 | Rules of Behavior | A.7.1.2, A.7.2.1, A.8.1.3 |
PL-5 | Withdrawn | --- |
PL-6 | Withdrawn | --- |
PL-7 | Security Concept of Operations | A.14.1.1* |
PL-8 | Information Security Architecture | A.14.1.1* |
PL-9 | Central Management | None |
PS-1 | Personnel Security Policy and Procedures | A.5.1.1, A.5.1.2, A.6.1.1, A.12.1.1, A.18.1.1, A.18.2.2 |
PS-2 | Position Risk Designation | None |
PS-3 | Personnel Screening | A.7.1.1 |
PS-4 | Personnel Termination | A.7.3.1, A.8.1.4 |
PS-5 | Personnel Transfer | A.7.3.1, A.8.1.4 |
PS-6 | Access Agreements | A.7.1.2, A.7.2.1, A.13.2.4 |
PS-7 | Third-Party Personnel Security | A.6.1.1, A.7.2.1 |
PS-8 | Personnel Sanctions | A.7.2.3 |
RA-1 | Risk Assessment Policy and Procedures | A.5.1.1, A.5.1.2, A.6.1.1, A.12.1.1, A.18.1.1, A.18.2.2 |
RA-2 | Security Categorization | A.8.2.1 |
RA-3 | Risk Assessment | A.12.6.1* |
RA-4 | Withdrawn | --- |
RA-5 | Vulnerability Scanning | A.12.6.1* |
RA-6 | Technical Surveillance Countermeasures Survey | None |
SA-1 | System and Services Acquisition Policy and Procedures | A.5.1.1, A.5.1.2, A.6.1.1, A.12.1.1, A.18.1.1, A.18.2.2 |
SA-2 | Allocation of Resources | None |
SA-3 | System Development Life Cycle | A.6.1.1, A.6.1.5, A.14.1.1, A.14.2.1, A.14.2.6 |
SA-4 | Acquisition Process | A.14.1.1, A.14.2.7, A.14.2.9, A.15.1.2 |
SA-5 | Information System Documentation | A.12.1.1* |
SA-6 | Withdrawn | --- |
SA-7 | Withdrawn | --- |
SA-8 | Security Engineering Principles | A.14.2.5 |
SA-9 | External Information System Services | A.6.1.1, A.6.1.5, A.7.2.1, A.13.1.2, A.13.2.2, A.15.2.1, A.15.2.2 |
SA-10 | Developer Configuration Management | A.12.1.2, A.14.2.2, A.14.2.4, A.14.2.7 |
SA-11 | Developer Security Testing and Evaluation | A.14.2.7, A.14.2.8 |
SA-12 | Supply Chain Protections | A.14.2.7, A.15.1.1, A.15.1.2, A.15.1.3 |
SA-13 | Trustworthiness | None |
SA-14 | Criticality Analysis | None |
SA-15 | Development Process, Standards, and Tools | A.6.1.5, A.14.2.1, |
SA-16 | Developer-Provided Training | None |
SA-17 | Developer Security Architecture and Design | A.14.2.1, A.14.2.5 |
SA-18 | Tamper Resistance and Detection | None |
SA-19 | Component Authenticity | None |
SA-20 | Customized Development of Critical Components | None |
SA-21 | Developer Screening | A.7.1.1 |
SA-22 | Unsupported System Components | None |
SC-1 | System and Communications Protection Policy and Procedures | A.5.1.1, A.5.1.2, A.6.1.1, A.12.1.1, A.18.1.1, A.18.2.2 |
SC-2 | Application Partitioning | None |
SC-3 | Security Function Isolation | None |
SC-4 | Information In Shared Resources | None |
SC-5 | Denial of Service Protection | None |
SC-6 | Resource Availability | None |
SC-7 | Boundary Protection | A.13.1.1, A.13.1.3, A.13.2.1, A.14.1.3 |
SC-8 | Transmission Confidentiality and Integrity | A.8.2.3, A.13.1.1, A.13.2.1, A.13.2.3, A.14.1.2, A.14.1.3 |
SC-9 | Withdrawn | --- |
SC-10 | Network Disconnect | A.13.1.1 |
SC-11 | Trusted Path | None |
SC-12 | Cryptographic Key Establishment and Management | A.10.1.2 |
SC-13 | Cryptographic Protection | A.10.1.1, A.14.1.2, A.14.1.3, A.18.1.5 |
SC-14 | Withdrawn | --- |
SC-15 | Collaborative Computing Devices | A.13.2.1* |
SC-16 | Transmission of Security Attributes | None |
SC-17 | Public Key Infrastructure Certificates | A.10.1.2 |
SC-18 | Mobile Code | None |
SC-19 | Voice Over Internet Protocol | None |
SC-20 | Secure Name/Address Resolution Service (Authoritative Source) | None |
SC-21 | Secure Name/Address Resolution Service (Recursive or Caching Resolver) | None |
SC-22 | Architecture and Provisioning for Name/Address Resolution Service | None |
SC-23 | Session Authenticity | None |
SC-24 | Fail in Known State | None |
SC-25 | Thin Nodes | None |
SC-26 | Honeypots | None |
SC-27 | Platform-Independent Applications | None |
SC-28 | Protection of Information at Rest | A.8.2.3* |
SC-29 | Heterogeneity | None |
SC-30 | Concealment and Misdirection | None |
SC-31 | Covert Channel Analysis | None |
SC-32 | Information System Partitioning | None |
SC-33 | Withdrawn | --- |
SC-34 | Non-Modifiable Executable Programs | None |
SC-35 | Honeyclients | None |
SC-36 | Distributed Processing and Storage | None |
SC-37 | Out-of-Band Channels | None |
SC-38 | Operations Security | A.12.x |
SC-39 | Process Isolation | None |
SC-40 | Wireless Link Protection | None |
SC-41 | Port and I/O Device Access | None |
SC-42 | Sensor Capability and Data | None |
SC-43 | Usage Restrictions | None |
SC-44 | Detonation Chambers | None |
SI-1 | System and Information Integrity Policy and Procedures | A.5.1.1, A.5.1.2, A.6.1.1, A.12.1.1, A.18.1.1, A.18.2.2 |
SI-2 | Flaw Remediation | A.12.6.1, A.14.2.2, A.14.2.3, A.16.1.3 |
SI-3 | Malicious Code Protection | A.12.2.1 |
SI-4 | Information System Monitoring | None |
SI-5 | Security Alerts, Advisories, and Directives | A.6.1.4* |
SI-6 | Security Function Verification | None |
SI-7 | Software, Firmware, and Information Integrity | None |
SI-8 | Spam Protection | None |
SI-9 | Withdrawn | --- |
SI-10 | Information Input Validation | None |
SI-11 | Error Handling | None |
SI-12 | Information Handling and Retention | None |
SI-13 | Predictable Failure Prevention | None |
SI-14 | Non-Persistence | None |
SI-15 | Information Output Filtering | None |
SI-16 | Memory Protection | None |
SI-17 | Fail-Safe Procedures | None |
PM-1 | Information Security Program Plan | A.5.1.1, A.5.1.2, A.6.1.1, A.18.1.1, A.18.2.2 |
PM-2 | Senior Information Security Officer | A.6.1.1* |
PM-3 | Information Security Resources | None |
PM-4 | Plan of Action and Milestones Process | None |
PM-5 | Information System Inventory | None |
PM-6 | Information Security Measures of Performance | None |
PM-7 | Enterprise Architecture | None |
PM-8 | Critical Infrastructure Plan | None |
PM-9 | Risk Management Strategy | None |
PM-10 | Security Authorization Process | A.6.1.1* |
PM-11 | Mission/Business Process Definition | None |
PM-12 | Insider Threat Program | None |
PM-13 | Information Security Workforce | A.7.2.2* |
PM-14 | Testing, Training, and Monitoring | None |
PM-15 | Contacts with Security Groups and Associations | A.6.1.4 |
PM-16 | Threat Awareness Program | None |
Table H-2 provides a mapping from the security controls in ISO/IEC 27001 to the security controls in Special Publication 800-53.[115]</sup> Please review the introductory text at the beginning of Appendix H before employing the mappings in Table H-2.
TABLE H-2: MAPPING ISO/IEC 27001 TO NIST SP 800-53
ISO/IEC 27001 CONTROLS | NIST SP 800-53 CONTROLS |
---|---|
A.5 Information Security Policies | |
A.5.1 Management direction for information security | |
A.5.1.1 Policies for information security | All XX-1 controls |
A.5.1.2 Review of the policies for information security | All XX-1 controls |
A.6 Organization of information security | |
A.6.1 Internal organization | |
A.6.1.1 Information security roles and responsibilities | All XX-1 controls, CM-9, CP-2,PS-7, SA-3, SA-9, PM- 2, PM-10 |
A.6.1.2 Segregation of duties | AC-5 |
A.6.1.3 Contact with authorities | IR-6 |
A.6.1.4 Contact with special interest groups | SI-5, PM-15 |
A.6.1.5 Information security in project management | SA-3, SA-9, SA-15 |
A.6.2 Mobile devices and teleworking | |
A.6.2.1 Mobile device policy | AC-17, AC-18, AC-19 |
A.6.2.2 Teleworking | AC-3, AC-17, PE-17 |
A.7 Human Resources Security | |
A.7.1 Prior to Employment | |
A.7.1.1 Screening | PS-3, SA-21 |
A.7.1.2 Terms and conditions of employment | PL-4, PS-6 |
A.7.2 During employment | |
A.7.2.1 Management responsibilities | PL-4, PS-6, PS-7, SA-9 |
A.7.2.2 Information security awareness, education, and training | AT-2, AT-3, CP-3, IR-2, PM-13 |
A.7.2.3 Disciplinary process | PS-8 |
A.7.3 Termination and change of employment | |
A.7.3.1 Termination or change of employment responsibilities | PS-4, PS-5 |
A.8 Asset Management | |
A.8.1 Responsibility for assets | |
A.8.1.1 Inventory of assets | CM-8 |
A.8.1.2 Ownership of assets | CM-8 |
A.8.1.3 Acceptable use of assets | PL-4 |
A.8.1.4 Return of assets | PS-4, PS-5 |
A.8.2 Information Classification | |
A.8.2.1 Classification of information | RA-2 |
A.8.2.2 Labelling of Information | MP-3 |
A.8.2.3 Handling of Assets | MP-2, MP-4, MP-5, MP-6, MP-7, PE-16, PE-18, PE- 20, SC-8, SC-28 |
A.8.3 Media Handling | |
A.8.3.1 Management of removable media | MP-2, MP-4, MP-5, MP-6, MP-7 |
A.8.3.2 Disposal of media | MP-6 |
A.8.3.3 Physical media transfer | MP-5 |
A.9 Access Control | |
A.9.1 Business requirement of access control | |
A.9.1.1 Access control policy | AC-1 |
A.9.1.2 Access to networks and network services | AC-3, AC-6 |
A.9.2 User access management | |
A.9.2.1 User registration and de-registration | AC-2, IA-2, IA-4, IA-5, IA-8 |
A.9.2.2 User access provisioning | AC-2 |
A.9.2.3 Management of privileged access rights | AC-2, AC-3, AC-6, CM-5 |
A.9.2.4 Management of secret authentication information of users | IA-5 |
A.9.2.5 Review of user access rights | AC-2 |
A.9.2.6 Removal or adjustment of access rights | AC-2 |
A.9.3 User responsibilities | |
A.9.3.1 Use of secret authentication information | IA-5 |
A.9.4 System and application access control | |
A.9.4.1 Information access restriction | AC-3, AC-24 |
A.9.4.2 Secure logon procedures | AC-7, AC-8, AC-9, IA-6 |
A.9.4.3 Password management system | IA-5 |
A.9.4.4 Use of privileged utility programs | AC-3, AC-6 |
A.9.4.5 Access control to program source code | AC-3, AC-6, CM-5 |
A.10 Cryptography | |
A.10.1 Cryptographic controls | |
A.10.1.1 Policy on the use of cryptographic controls | SC-13 |
A.10.1.2 Key Management | SC-12, SC-17 |
A.11 Physical and environmental security | |
A.11.1 Secure areas | |
A.11.1.1 Physical security perimeter | PE-3* |
A.11.1.2 Physical entry controls | PE-2, PE-3, PE-4, PE-5 |
A.11.1.3 Securing offices, rooms and facilities | PE-3, PE-5 |
A.11.1.4 Protecting against external and environmental threats | CP-6, CP-7, PE-9, PE-13, PE-14, PE-15, PE-18, PE- 19 |
A.11.1.5 Working in secure areas | SC-42(3)* |
A.11.1.6 Delivery and loading areas | PE-16 |
A.11.2 Equipment | |
A.11.2.1 Equipment siting and protection | PE-9, PE-13, PE-14, PE-15, PE-18, PE-19 |
A.11.2.2 Supporting utilities | CP-8, PE-9, PE-10, PE-11, PE-12, PE-14, PE-15 |
A.11.2.3 Cabling security | PE-4, PE-9 |
A.11.2.4 Equipment maintenance | MA-2, MA-6 |
A.11.2.5 Removal of assets | MA-2, MP-5, PE-16 |
A.11.2.6 Security of equipment and assets off-premises | AC-19, AC-20, MP-5, PE-17 |
A.11.2.7 Secure disposal or reuse of equipment | MP-6 |
A.11.2.8 Unattended user equipment | AC-11 |
A.11.2.9 Clear desk and clear screen policy | AC-11, MP-2, MP-4 |
A.12 Operations security | |
A.12.1 Operational procedures and responsibilities | |
A.12.1.1 Documented operating procedures | All XX-1 controls, SA-5 |
A.12.1.2 Change management | CM-3, CM-5, SA-10 |
A.12.1.3 Capacity management | AU-4, CP-2(2), SC-5(2) |
A.12.1.4 Separation of development, testing, and operational environments | CM-4(1), CM-5 |
A.12.2 Protection from malware | |
A.12.2.1 Controls against malware | AT-2, SI-3 |
A.12.3 Backup | |
A.12.3.1 Information backup | CP-9 |
A.12.4 Logging and monitoring | |
A.12.4.1 Event logging | AU-3, AU-6, AU-11, AU-12, AU-14 |
A.12.4.2 Protection of log information | AU-9 |
A.12.4.3 Administrator and operator logs | AU-9, AU-12 |
A.12.4.4 Clock synchronization | AU-8 |
A.12.5 Control of operational software | |
A.12.5.1 Installation of software on operational systems | CM-5, CM-7(4), CM-7(5), CM-11 |
A.12.6 Technical vulnerability management | |
A.12.6.1 Management of technical vulnerabilities | RA-3, RA-5, SI-2, SI-5 |
A.12.6.2 Restrictions on software installation | CM-11 |
A.12.7 Information systems audit considerations | |
A.12.7.1 Information systems audit controls | AU-5* |
A.13 Communications security | |
A.13.1 Network security management | |
A.13.1.1 Network controls | AC-3, AC-17, AC-18, AC-20, SC-7, SC-8, SC-10 |
A.13.1.2 Security of network services | CA-3, SA-9 |
A.13.1.3 Segregation in networks | AC-4, SC-7 |
A.13.2 Information transfer | |
A.13.2.1 Information transfer policies and procedures | AC-4, AC-17, AC-18, AC-19, AC-20, CA-3, PE-17, SC-7, SC-8, SC-15 |
A.13.2.2 Agreements on information transfer | CA-3, PS-6, SA-9 |
A.13.2.3 Electronic messaging | SC-8 |
A.13.2.4 Confidentiality or nondisclosure agreements | PS-6 |
A.14 System acquisition, development and maintenance | |
A.14.1 Security requirements of information systems | |
A.14.1.1 Information security requirements analysis and specification | PL-2, PL-7, PL-8, SA-3, SA-4 |
A.14.1.2 Securing application services on public networks | AC-3, AC-4, AC-17, SC-8, SC-13 |
A.14.1.3 Protecting application services transactions | AC-3, AC-4, SC-7, SC-8, SC-13 |
A.14.2 Security in development and support processes | |
A.14.2.1 Secure development policy | SA-3, SA-15, SA-17 |
A.14.2.2 System change control procedures | CM-3, SA-10, SI-2 |
A.14.2.3 Technical review of applications after operating platform changes | CM-3, CM-4, SI-2 |
A.14.2.4 Restrictions on changes to software packages | CM-3, SA-10 |
A.14.2.5 Secure system engineering principles | SA-8 |
A.14.2.6 Secure development environment | SA-3* |
A.14.2.7 Outsourced development | SA-4, SA-10, SA-11, SA-12, SA-15 |
A.14.2.8 System security testing | CA-2, SA-11 |
A.14.2.9 System acceptance testing | SA-4, SA-12(7) |
A.14.3 Test data | |
A.14.3.1 Protection of test data | SA-15(9)* |
A.15 Supplier Relationships | |
A.15.1 Information security in supplier relationships | |
A.15.1.1 Information security policy for supplier relationships | SA-12 |
A.15.1.2 Address security within supplier agreements | SA-4, SA-12 |
A.15.1.3 Information and communication technology supply chain | SA-12 |
A.15.2 Supplier service delivery management | |
A.15.2.1 Monitoring and review of supplier services | SA-9 |
A.15.2.2 Managing changes to supplier services | SA-9 |
A.16 Information security incident management | |
A.16.1 Managing of information security incidents and improvements | |
A.16.1.1 Responsibilities and procedures | IR-8 |
A.16.1.2 Reporting information security events | AU-6, IR-6 |
A.16.1.3 Reporting information security weaknesses | SI-2 |
A.16.1.4 Assessment of and decision on information security events | AU-6, IR-4 |
A.16.1.5 Response to information security incidents | IR-4 |
A.16.1.6 Learning from information security incidents | IR-4 |
A.16.1.7 Collection of evidence | AU-4, AU-9, AU-10(3), AU-11 |
A.17 Information security aspects of business continuity management | |
A.17.1 Information security continuity | |
A.17.1.1 Planning information security continuity | CP-2 |
A.17.1.2 Implementing information security continuity | CP-6, CP-7, CP-8, CP-9, CP-10, CP-11, CP-13 |
A.17.1.3 Verify, review, and evaluate information security continuity | CP-4 |
A.17.2 Redundancies | |
A.17.2.1 Availability of information processing facilities | CP-2,CP-6, CP-7 |
A.18 Compliance | |
A.18.1 Compliance with legal and contractual requirements | |
A.18.1.1 Identification of applicable legislation and contractual requirements | All XX-1 controls |
A.18.1.2 Intellectual property rights | CM-10 |
A.18.1.3 Protection of records | AC-3, AC-23, AU-9, AU-10, CP-9, SC-8, SC-8(1), SC-13, SC-28, SC-28(1) |
A.18.1.4 Privacy and protection of personal information | Appendix J Privacy controls |
A.18.1.5 Regulation of cryptographic controls | IA-7, SC-12, SC-13, SC-17 |
A.18.2 Information security reviews | |
A.18.2.1 Independent review of information security | CA-2(1), SA-11(3) |
A.18.2.2 Compliance with security policies and standards | All XX-1 controls, CA-2 |
A.18.2.3 Technical compliance review | CA-2 |
Note: The content of Table H-3, the mapping from the functional and assurance requirements in ISO/IEC 15408 (Common Criteria) to the security controls in Special Publication 800-53, is unaffected by the changes above.
Table H-3 provides a generalized mapping from the functional and assurance requirements in ISO/IEC 15408 (Common Criteria) to the security controls in Special Publication 800-53. The table represents an informal correspondence between security requirements and security controls (i.e., the table is not intended to determine whether the ISO/IEC 15408 security requirements are fully, partially, or not satisfied by the associated security controls). However, the table can serve as a beneficial starting point for further correspondence analysis. Organizations are cautioned that satisfying ISO/IEC 15408 security requirements for an particular evaluated and validated information technology product as represented by the presence of certain security controls from Appendix F, does not imply that such requirements have been satisfied throughout the entire information system (which may consist of multiple, integrated individual component products). Additional information explaining the specific mappings that appear in Table H-3 is available at the National Information Assurance Partnership (NIAP) website at: http://www.niap-ccevs.org.
TABLE H-3: MAPPING ISO/IEC 15408 TO NIST SP 800-53
ISO/IEC 15408 REQUIREMENTS | NIST SP 800-53 CONTROLS | |||
---|---|---|---|---|
Functional Requirements | ||||
FAU_ARP.1 | Security Audit Automatic Response | AU-5 | Response to Audit Processing Failures | |
AU-5(1) | Response to Audit Processing Failures | |||
AU-5(2) | Response to Audit Processing Failures | |||
AU-5(3) | Response to Audit Processing Failures | |||
AU-5(4) | Response to Audit Processing Failures | |||
PE-6(2) | Monitoring Physical Access | |||
SI-3 | Malicious Code Protection | |||
SI-3(8) | Malicious Code Protection | |||
SI-4(5) | Information System Monitoring | |||
SI-4(7) | Information Systems Monitoring | |||
SI-4(22) | Information Systems Monitoring | |||
SI-7(2) | Software, Firmware, and Information Integrity | |||
SI-7(5) | Software, Firmware, and Information Integrity | |||
SI-7(8) | Software, Firmware, and Information Integrity | |||
FAU_GEN.1 | Security Audit Data Generation | AU-2 | Audit Events | |
AU-3 | Content of Audit Records | |||
AU-3(1) | Content of Audit Records | |||
AU-12 | Audit Generation | |||
FAU_GEN.2 | Security Audit Data Generation | AU-3 | Content of Audit Records | |
FAU_SAA.1 | Security Audit Analysis | SI-4 | Information System Monitoring | |
FAU_SAA.2 | Security Audit Analysis | AC-2(12) | Account Management | |
SI-4 | Information System Monitoring | |||
FAU_SAA.3 | Security Audit Analysis | SI-3(7) | Malicious Code Protection | |
SI-4 | Information System Monitoring | |||
FAU_SAA.4 | Security Audit Analysis | SI-3(7) | Malicious Code Protection | |
SI-4 | Information System Monitoring | |||
FAU_SAR.1 | Security Audit Review | AU-7 | Audit Reduction and Report Generation | |
FAU_SAR.2 | Security Audit Review | AU-9(6) | Protection of Audit Information | |
FAU_SAR.3 | Security Audit Review | AU-7 | Audit Reduction and Report Generation | |
AU-7(1) | Audit Reduction and Report Generation | |||
AU-7(2) | Audit Reduction and Report Generation | |||
FAU_SEL.1 | Security Audit Event Selection | AU-12 | Audit Generation | |
FAU_STG.1 | Security Audit Event Storage | AU-9 | Protection of Audit Information | |
FAU_STG.2 | Security Audit Event Storage | AU-9 | Protection of Audit Information | |
FAU_STG.3 | Security Audit Event Storage | AU-5 | Response to Audit Processing Failures | |
AU-5(1) | Response to Audit Processing Failures | |||
AU-5(2) | Response To Audit Processing Failures | |||
AU-5(4) | Response To Audit Processing Failures | |||
FAU_STG.4 | Security Audit Event Storage | AU-4 | Audit Storage Capacity | |
AU-5 | Response to Audit Processing Failures | |||
AU-5(2) | Response To Audit Processing Failures | |||
AU-5(4) | Response To Audit Processing Failures | |||
FCO_NRO.1 | Non-Repudiation of Origin | AU-10 | Non-Repudiation | |
AU-10(1) | Non-Repudiation | |||
AU-10(2) | Non-Repudiation | |||
FCO_NRO.2 | Non-Repudiation of Origin | AU-10 | Non-Repudiation | |
AU-10(1) | Non-Repudiation | |||
AU-10(2) | Non-Repudiation | |||
FCO_NRR.1 | Non-Repudiation of Receipt | AU-10 | Non-Repudiation | |
AU-10(1) | Non-Repudiation | |||
AU-10(2) | Non-Repudiation | |||
FCO_NRR.2 | Non-Repudiation of Receipt | AU-10 | Non-Repudiation | |
AU-10(1) | Non-Repudiation | |||
AU-10(2) | Non-Repudiation | |||
FCS_CKM.1 | Cryptographic Key Management | SC-12 | Cryptographic Key Establishment and Management | |
FCS_CKM.2 | Cryptographic Key Management | SC-12 | Cryptographic Key Establishment and Management | |
FCS_CKM.3 | Cryptographic Key Management | SC-12 | Cryptographic Key Establishment and Management | |
FCS_CKM.4 | Cryptographic Key Management | SC-12 | Cryptographic Key Establishment and Management | |
FCS_COP.1 | Cryptographic Operation | SC-13 | Cryptographic Protection | |
FDP_ACC.1 | Access Control Policy | AC-3 | Access Enforcement | |
AC-3(3) | Access Enforcement | |||
AC-3(4) | Access Enforcement | |||
AC-3(7) | Access Enforcement | |||
FDP_ACC.2 | Access Control Policy | AC-3 | Access Enforcement | |
AC-3(3) | Access Enforcement | |||
AC-3(4) | Access Enforcement | |||
AC-3(7) | Access Enforcement | |||
FDP_ACF.1 | Access Control Functions | AC-3 | Access Enforcement | |
AC-3(3) | Access Enforcement | |||
AC-3(4) | Access Enforcement | |||
AC-3(7) | Access Enforcement | |||
AC-16 | Security Attributes | |||
SC-16 | Transmission of Security Attributes | |||
FDP_DAU.1 | Data Authentication | SI-7 | Software, Firmware, and Information Integrity | |
SI-7(1) | Software, Firmware, and Information Integrity | |||
SI-7(6) | Software, Firmware, And Information Integrity | |||
SI-10 | Information Input Validation | |||
FDP_DAU.2 | Data Authentication | SI-7 | Software, Firmware, and Information Integrity | |
SI-7(1) | Software, Firmware, and Information Integrity | |||
SI-7(6) | Software, Firmware, And Information Integrity | |||
SI-10 | Information Input Validation | |||
FDP_ETC.1 | Export from the TOE | No Mapping. | ||
FDP_ETC.2 | Export from the TOE | AC-4(18) | Information Flow Enforcement | |
AC-16 | Security Attributes | |||
AC-16(5) | Security Attributes | |||
SC-16 | Transmission of Security Attributes | |||
FDP_IFC.1 | Information Flow Control Policy | AC-3 | Access Enforcement | |
AC-3(3) | Access Enforcement | |||
AC-4 | Information Flow Enforcement | |||
AC-4(1) | Information Flow Enforcement | |||
FDP_IFC.2 | Information Flow Control Policy | AC-3 | Access Enforcement | |
AC-3(3) | Access Enforcement | |||
AC-4 | Information Flow Enforcement | |||
FDP_IFF.1 | Information Flow Control Functions | AC-3 | Access Enforcement | |
AC-3(3) | Access Enforcement | |||
AC-4 | Information Flow Enforcement | |||
AC-4(1) | Information Flow Enforcement | |||
AC-4(2) | Information Flow Enforcement | |||
AC-4(7) | Information Flow Enforcement | |||
AC-16 | Security Attributes | |||
SC-7 | Boundary Protection | |||
FDP_IFF.2 | Information Flow Control Functions | AC-3 | Access Enforcement | |
AC-3(3) | Access Enforcement | |||
AC-4(1) | Information Flow Enforcement | |||
AC-16 | Security Attributes | |||
FDP_IFF.3 | Information Flow Control Functions | SC-31 | Covert Channel Analysis | |
SC-31(2) | Covert Channel Analysis | |||
FDP_IFF.4 | Information Flow Control Functions | SC-31 | Covert Channel Analysis | |
SC-31(2) | Covert Channel Analysis | |||
FDP_IFF.5 | Information Flow Control Functions | SC-31 | Covert Channel Analysis | |
SC-31(2) | Covert Channel Analysis | |||
FDP_IFF.6 | Information Flow Control Functions | SC-31 | Covert Channel Analysis | |
SI-4(18) | Information System Monitoring | |||
FDP_ITC.1 | Import from Outside of the TOE | AC-4(9) | Information Flow Enforcement | |
AC-4(12) | Information Flow Enforcement | |||
FDP_ITC.2 | Import from Outside of the TOE | AC-4(18) | Information Flow Enforcement | |
AC-16 | Security Attributes | |||
SC-16 | Transmission of Security Attributes | |||
FDP_ITT.1 | Internal TOE Transfer | SC-8 | Transmission Confidentiality and Integrity | |
SC-8(1) | Transmission Confidentiality and Integrity | |||
SC-5 | Denial of Service Protection | |||
FDP_ITT.2 | Internal TOE Transfer | SC-8 | Transmission Confidentiality and Integrity | |
SC-8(1) | Transmission Confidentiality and Integrity | |||
SC-5 | Denial of Service Protection | |||
AC-4(21) | Information Flow Enforcement | |||
FDP_ITT.3 | Internal TOE Transfer | SI-7 | Software, Firmware, and Information Integrity | |
SI-7(1) | Software, Firmware, and Information Integrity | |||
SC-8(1) | Transmission Integrity | |||
SI-7(5) | Software, Firmware, and Information Integrity | |||
FDP_ITT.4 | Internal TOE Transfer | SI-7 | Software, Firmware, and Information Integrity | |
SI-7(1) | Software, Firmware, and Information Integrity | |||
SC-8(1) | Transmission Integrity | |||
AC-4(21) | Information Flow Enforcement | |||
SI-7(5) | Software, Firmware, and Information Integrity | |||
FDP_RIP.1 | Residual Information Protection | SC-4 | Information in Shared Resources | |
FDP_RIP.2 | Residual Information Protection | SC-4 | Information in Shared Resources | |
FDP_ROL.1 | Rollback | CP-10(2) | Information System Recovery and Reconstitution | |
FDP_ROL.2 | Rollback | CP-10(2) | Information System Recovery and Reconstitution | |
FDP_SDI.1 | Stored Data Integrity | SI-7 | Software, Firmware, and Information Integrity | |
SI-7(1) | Software, Firmware, and Information Integrity | |||
FDP_SDI.2 | Stored Data Integrity | SI-7 | Software, Firmware, and Information Integrity | |
SI-7(1) | Software, Firmware, and Information Integrity | |||
SI-7(5) | Software, Firmware, and Information Integrity | |||
FDP_UCT.1 | Inter-TSF User Data Confidentiality Transfer Protection | SC-8 | Transmission Confidentiality and Integrity | |
SC-8(1) | Transmission Confidentiality and Integrity | |||
FDP_UIT.1 | Inter-TSF User Data Integrity Transfer Protection | SC-8 | Transmission Confidentiality and Integrity | |
SC-8(1) | Transmission Confidentiality and Integrity | |||
SI-7 | Software, Firmware, and Information Integrity | |||
SI-7(6) | Software, Firmware, and Information Integrity | |||
FDP_UIT.2 | Inter-TSF User Data Integrity Transfer Protection | No Mapping. | ||
FDP_UIT.3 | Inter-TSF User Data Integrity Transfer Protection | No Mapping. | ||
FIA_AFL.1 | Authentication Failure | AC-7 | Unsuccessful Logon Attempts | |
FIA_ATD.1 | User Attribute Definition | AC-2 | Account Management | |
IA-2 | Identification and Authentication (Organizational Users) | |||
FIA_SOS.1 | Specification of Secrets | IA-5 | Authenticator Management | |
IA-5(1) | Authenticator Management | |||
IA-5(12) | Authenticator Management | |||
FIA_SOS.2 | Specification of Secrets | IA-5 | Authenticator Management | |
IA-5(1) | Authenticator Management | |||
IA-5(12) | Authenticator Management | |||
FIA_UAU.1 | User Authentication | AC-14 | Permitted Actions without Identification or Authentication | |
IA-2 | Identification and Authentication (Organizational Users) | |||
IA-8 | Identification and Authentication (Non-Organizational Users) | |||
FIA_UAU.2 | User Authentication | AC-14 | Permitted Actions without Identification or Authentication | |
IA-2 | Identification and Authentication (Organizational Users) | |||
IA-8 | Identification and Authentication (Non-Organizational Users) | |||
FIA_UAU.3 | User Authentication | IA-2(8) | Identification and Authentication (Organizational Users) | |
IA-2(9) | Identification and Authentication (Organizational Users) | |||
FIA_UAU.4 | User Authentication | IA-2(8) | Identification and Authentication (Organizational Users) | |
IA-2(9) | Identification and Authentication (Organizational Users) | |||
FIA_UAU.5 | User Authentication | IA-2(1) | Identification and Authentication (Organizational Users) | |
IA-2(2) | Identification and Authentication (Organizational Users) | |||
IA-2(3) | Identification and Authentication (Organizational Users) | |||
IA-2(4) | Identification and Authentication (Organizational Users) | |||
IA-2(6) | Identification and Authentication (Organizational Users) | |||
IA-2(7) | Identification and Authentication (Organizational Users) | |||
IA-2(11) | Identification and Authentication (Organizational Users) | |||
FIA_UAU.6 | User Authentication | IA-11 | Re-authentication | |
FIA_UAU.7 | User Authentication | IA-6 | Authenticator Feedback | |
FIA_UID.1 | User Identification | AC-14 | Permitted Actions without Identification or Authentication | |
IA-2 | Identification and Authentication (Organizational Users) | |||
IA-8 | Identification and Authentication (Non-Organizational Users) | |||
FIA_UID.2 | User Identification | AC-14 | Permitted Actions without Identification or Authentication | |
IA-2 | Identification and Authentication (Organizational Users) | |||
IA-8 | Identification and Authentication (Non-Organizational Users) | |||
FIA_USB.1 | User-Subject Binding | AC-16(3) | Security Attributes | |
FMT_MOF.1 | Management of Functions in TSF | AC-3(7) | Access Enforcement | |
AC-6 | Least Privilege | |||
AC-6(1) | Least Privilege | |||
FMT_MSA.1 | Management of Security Attributes | AC-6 | Least Privilege | |
AC-6(1) | Least Privilege | |||
AC-16(2) | Security Attributes | |||
AC-16(4) | Security Attributes | |||
AC-16(10) | Security Attributes | |||
FMT_MSA.2 | Management of Security Attributes | AC-16 | Security Attributes | |
CM-6 | Configuration Settings | |||
SI-10 | Information Input Validation | |||
FMT_MSA.3 | Management of Security Attributes | No Mapping. | ||
FMT_MSA.4 | Management of Security Attributes | No Mapping. | ||
FMT_MTD.1 | Management of TSF Data | AC-3(7) | Access Enforcement | |
AC-6 | Least Privilege | |||
AC-6(1) | Least Privilege | |||
AU-6(7) | Audit Review, Analysis, and Reporting | |||
AU-9(4) | Protection of Audit Information | |||
FMT_MTD.2 | Management of TSF Data | AC-3(7) | Access Enforcement | |
AC-6 | Least Privilege | |||
AC-6(1) | Least Privilege | |||
FMT_MTD.3 | Management of TSF Data | SI-10 | Information Input Validation | |
FMT_REV.1 | Revocation | AC-3(7) | Access Enforcement | |
AC-3(8) | Access Enforcement | |||
AC-6 | Least Privilege | |||
AC-6(1) | Least Privilege | |||
FMT_SAE.1 | Security Attribute Expiration | AC-3(7) | Access Enforcement | |
AC-6 | Least Privilege | |||
AC-6(1) | Least Privilege | |||
FMT_SMF.1 | Specification of Management Functions | No Mapping. | ||
FMT_SMR.1 | Security Management Roles | AC-2(7) | Account Management | |
AC-3(7) | Access Enforcement | |||
AC-5 | Separation of Duties | |||
AC-6 | Least Privilege | |||
FMT_SMR.2 | Security Management Roles | AC-2(7) | Account Management | |
AC-3(7) | Access Enforcement | |||
AC-5 | Separation of Duties | |||
AC-6 | Least Privilege | |||
FMT_SMR.3 | Security Management Roles | AC-6(1) | Least Privilege | |
AC-6(2) | Least Privilege | |||
FPR_ANO.1 | Anonymity | No Mapping. | ||
FPR_ANO.2 | Anonymity | No Mapping. | ||
FPR_PSE.1 | Pseudonymity | No Mapping. | ||
FPR_PSE.2 | Pseudonymity | No Mapping. | ||
FPR_PSE.3 | Pseudonymity | No Mapping. | ||
FPR_UNL.1 | Unlinkability | No Mapping. | ||
FPR_UNO.1 | Unobservability | No Mapping. | ||
FPR_UNO.2 | Unobservability | No Mapping. | ||
FPR_UNO.3 | Unobservability | No Mapping. | ||
FPR_UNO.4 | Unobservability | No Mapping. | ||
FPT_FLS.1 | Fail Secure | SC-7(18) | Boundary Protection | |
SC-24 | Fail in Known State | |||
FPT_ITA.1 | Availability of Exported TSF Data | CP-10 | Information System Recovery And Reconstitution | |
SC-5 | Denial of Service Protection | |||
SC-5(2) | Denial of Service Protection | |||
SC-5(3) | Denial of Service Protection | |||
FPT_ITC.1 | Confidentiality of Exported TSF Data | SC-8 | Transmission Confidentiality and Integrity | |
SC-8(1) | Transmission Confidentiality and Integrity | |||
FPT_ITI.1 | Integrity of Exported TSF Data | SC-8 | Transmission Confidentiality and Integrity | |
SC-8(1) | Transmission Confidentiality and Integrity | |||
SI-7 | Software, Firmware, and Information Integrity | |||
SI-7(1) | Software, Firmware, and Information Integrity | |||
SI-7(5) | Software, Firmware, and Information Integrity | |||
SI-7(6) | Software, Firmware, and Information Integrity | |||
FPT_ITI.2 | Integrity of Exported TSF Data | SC-8 | Transmission Confidentiality and Integrity | |
SC-8(1) | Transmission Confidentiality and Integrity | |||
SI-7 | Software, Firmware, and Information Integrity | |||
SI-7(1) | Software, Firmware, and Information Integrity | |||
SI-7(5) | Software, Firmware, and Information Integrity | |||
SI-7(6) | Software, Firmware, and Information Integrity | |||
FPT_ITT.1 | Internal TOE TSF Data Transfer | SC-8 | Transmission Confidentiality and Integrity | |
SC-8(1) | Transmission Confidentiality and Integrity | |||
FPT_ITT.2 | Internal TOE TSF Data Transfer | AC-4(21) | Information Flow Enforcement | |
SC-8 | Transmission Confidentiality and Integrity | |||
SC-8(1) | Transmission Confidentiality and Integrity | |||
FPT_ITT.3 | Internal TOE TSF Data Transfer | SI-7 | Software, Firmware, and Information Integrity | |
SI-7(1) | Software, Firmware, and Information Integrity | |||
SI-7(5) | Software, Firmware, and Information Integrity | |||
SI-7(6) | Software, Firmware, and Information Integrity | |||
FPT_PHP.1 | TSF Physical Protection | PE-3(5) | Physical Access Control | |
PE-6(2) | Monitoring Physical Access | |||
SA-18 | Tamper Resistance and Detection | |||
FPT_PHP.2 | TSF Physical Protection | PE-3(5) | Physical Access Control | |
PE-6(2) | Monitoring Physical Access | |||
SA-18 | Tamper Resistance and Detection | |||
FPT_PHP.3 | TSF Physical Protection | PE-3(5) | Physical Access Control | |
SA-18 | Tamper Resistance and Detection | |||
FPT_RCV.1 | Trusted Recovery | CP-10 | Information System Recovery and Reconstitution | |
CP-12 | Safe Mode | |||
FPT_RCV.2 | Trusted Recovery | CP-10 | Information System Recovery and Reconstitution | |
CP-12 | Safe Mode | |||
FPT_RCV.3 | Trusted Recovery | CP-10 | Information System Recovery and Reconstitution | |
CP-12 | Safe Mode | |||
FPT_RCV.4 | Trusted Recovery | SI-6 | Security Function Verification | |
SI-10(3) | Information Input Validation | |||
SC-24 | Fail in Known State | |||
FPT_RPL.1 | Replay Detection | IA-2(8) | Identification and Authentication (Organizational Users) | |
IA-2(9) | Identification and Authentication (Organizational Users) | |||
SC-23 | Session Authenticity | |||
SI-3(9) | Malicious Code Protection | |||
FPT_SSP.1 | State Synchrony Protocol | No Mapping. | ||
FPT_SSP.2 | State Synchrony Protocol | No Mapping. | ||
FPT_STM.1 | Time Stamps | AU-8 | Time Stamps | |
FPT_TDC.1 | Inter-TSF TSF Data Consistency | AC-16(7) | Security Attributes | Consistent Attribute Interpretation |
AC-16(8) | Security Attributes | |||
FPT_TEE.1 | Testing of External Entities | SI-6 | Security Functionality Verification | |
FPT_TRC.1 | Internal TOE TSF Data Replication Consistency | SI-7 | Software, Firmware, and Information Integrity | |
FPT_TST.1 | TSF Self-Test | SI-6 | Security Functionality Verification | |
SI-7 | Software, Firmware, and Information Integrity | |||
FRU_FLT.1 | Fault Tolerance | AU-15 | Alternate Audit Capability | |
CP-11 | Alternate Communications Protocols | |||
SC-24 | Fail in Known State | |||
SI-13 | Predictable Failure Prevention | |||
SI-13(1) | Predictable Failure Prevention | |||
SI-13(2) | Predictable Failure Prevention | |||
SI-13(3) | Predictable Failure Prevention | |||
SI-13(4) | Predictable Failure Prevention | |||
SI-13(5) | Predictable Failure Prevention | |||
FRU_FLT.2 | Fault Tolerance | AU-15 | Alternate Audit Capability | |
CP-11 | Alternate Communications Protocols | |||
SC-24 | Fail in Known State | |||
SI-13 | Predictable Failure Prevention | |||
SI-13(1) | Predictable Failure Prevention | |||
SI-13(2) | Predictable Failure Prevention | |||
SI-13(3) | Predictable Failure Prevention | |||
SI-13(4) | Predictable Failure Prevention | |||
SI-13(5) | Predictable Failure Prevention | |||
FRU_PRS.1 | Priority of Service | SC-6 | Resource Availability | |
FRU_PRS.2 | Priority of Service | SC-6 | Resource Availability | |
FRU_RSA.1 | Resource Allocation | SC-6 | Resource Availability | |
FRU_RSA.2 | Resource Allocation | SC-6 | Resource Availability | |
FTA_LSA.1 | Limitation on Scope of Selectable Attributes | AC-2(6) | Account Management | |
AC-2(11) | Account Management | |||
FTA_MCS.1 | Limitation on Multiple Concurrent Sessions | AC-10 | Concurrent Session Control | |
FTA_MCS.2 | Limitation on Multiple Concurrent Sessions | AC-10 | Concurrent Session Control | |
FTA_SSL.1 | Session Locking and Termination | AC-11 | Session Lock | |
AC-11(1) | Session Lock | |||
FTA_SSL.2 | Session Locking and Termination | AC-11 | Session Lock | |
AC-11(1) | Session Lock | |||
FTA_SSL.3 | Session Locking and Termination | AC-12 | Session Termination | |
SC-10 | Network Disconnect | |||
FTA_SSL.4 | Session Locking and Termination | AC-12(1) | Session Termination | |
FTA_TAB.1 | TOE Access Banners | AC-8 | System Use Notification | |
FTA_TAH.1 | TOE Access History | AC-9 | Previous Login (Access) Notification | |
AC-9(1) | Previous Login (Access) Notification | |||
FTA_TSE.1 | TOE Session Establishment | AC-2(11) | Account Management | |
FTP_ITC.1 | Inter-TSF Trusted Channel | IA-3(1) | Device Identification and Authentication | |
SC-8 | Transmission Confidentiality and Integrity | |||
SC-8(1) | Transmission Confidentiality and Integrity | |||
FTP_TRP.1 | Trusted Path | SC-11 | Trusted Path | |
Assurance Requirements | ||||
ASE_INT.1 | ST Introduction | SA-4 | Acquisition Process | |
ASE_CCL.1 | Conformance Claims | PL-2 | System Security Plan | |
SA-4(7) | Acquisition Process | |||
ASE_SPD.1 | Security Problem Definition | PL-2 | System Security Plan | |
SA-4 | Acquisition Process | |||
ASE_OBJ.1 | Security Objectives | PL-2 | System Security Plan | |
SA-4 | Acquisition Process | |||
ASE_OBJ.2 | Security Objectives | PL-2 | System Security Plan | |
SA-4 | Acquisition Process | |||
ASE_ECD.1 | Extended Components Definition | No Mapping. | ||
ASE_REQ.1 | Security Requirements | PL-2 | System Security Plan | |
SA-4 | Acquisition Process | |||
ASE_REQ.2 | Security Requirements | PL-2 | System Security Plan | |
SA-4 | Acquisition Process | |||
ASE_TSS.1 | TOE Summary Specification | PL-2 | System Security Plan | |
SA-4(1) | Acquisition Process | |||
ASE_TSS.2 | TOE Summary Specification | PL-2 | System Security Plan | |
SA-4(1) | Acquisition Process | |||
SA-4(2) | Acquisition Process | |||
SA-17 | Developer Security Architecture and Design | |||
ADV_ARC.1 | Security Architecture | AC-25 | Reference Monitor | |
SA-17 | Developer Security Architecture and Design | |||
SA-18 | Tamper Resistance and Detection | |||
SC-3 | Security Function Isolation | |||
SC-3(1) | Security Function Isolation | |||
SC-3(2) | Security Function Isolation | |||
SC-41 | Process Isolation | |||
ADV_FSP.1 | Functional Specification | SA-4(1) | Acquisition Process | |
SA-4(2) | Acquisition Process | |||
ADV_FSP.2 | Functional Specification | SA-4(1) | Acquisition Process | |
SA-4(2) | Acquisition Process | |||
SA-17(4) | Developer Security Architecture and Design | |||
ADV_FSP.3 | Functional Specification | SA-4(1) | Acquisition Process | |
SA-4(2) | Acquisition Process | |||
SA-17(4) | Developer Security Architecture and Design | |||
ADV_FSP.4 | Functional Specification | SA-4(1) | Acquisition Process | |
SA-4(2) | Acquisition Process | |||
SA-17(4) | Developer Security Architecture and Design | |||
ADV_FSP.5 | Functional Specification | SA-4(1) | Acquisition Process | |
SA-4(2) | Acquisition Process | |||
SA-17(4) | Developer Security Architecture and Design | |||
ADV_FSP.6 | Functional Specification | SA-4(1) | Acquisition Process | |
SA-4(2) | Acquisition Process | |||
SA-17(3) | Developer Security Architecture and Design | |||
SA-17(4) | Developer Security Architecture and Design | |||
ADV_IMP.1 | Implementation Representation | SA-4(2) | Acquisition Process | |
ADV_IMP.2 | Implementation Representation | SA-4(2) | Acquisition Process | |
SA-17(3) | Developer Security Architecture and Design | |||
ADV_INT.1 | TSF Internals | SA-8 | Security Engineering Principles | |
SC-3(3) | Security Function Isolation | |||
SC-3(4) | Security Function Isolation | |||
SC-3(5) | Security Function Isolation | |||
ADV_INT.2 | TSF Internals | SA-8 | Security Engineering Principles | |
SC-3(3) | Security Function Isolation | |||
SC-3(4) | Security Function Isolation | |||
SC-3(5) | Security Function Isolation | |||
ADV_INT.3 | TSF Internals | SA-8 | Security Engineering Principles | |
SA-17(5) | Developer Security Architecture and Design | |||
SC-3(3) | Security Function Isolation | |||
SC-3(4) | Security Function Isolation | |||
SC-3(5) | Security Function Isolation | |||
AC-25 | Reference Monitor | |||
ADV_SPM.1 | Security Policy Modeling | SA-17(1) | Developer Security Architecture and Design | |
SA-17(3) | Developer Security Architecture and Design | |||
ADV_TDS.1 | TOE Design | SA-4(2) | Acquisition Process | |
SA-17 | Developer Security Architecture and Design | |||
ADV_TDS.2 | TOE Design | SA-4(2) | Acquisition Process | |
SA-17 | Developer Security Architecture and Design | |||
ADV_TDS.3 | TOE Design | SA-4(2) | Acquisition Process | |
SA-17 | Developer Security Architecture and Design | |||
ADV_TDS.4 | TOE Design | SA-4(2) | Acquisition Process | |
SA-17 | Developer Security Architecture and Design | |||
SA-17(2) | Developer Security Architecture and Design | |||
SA-17(4) | Developer Security Architecture and Design | |||
ADV_TDS.5 | TOE Design | SA-4(2) | Acquisition Process | |
SA-17 | Developer Security Architecture and Design | |||
SA-17(2) | Developer Security Architecture and Design | |||
SA-17(4) | Developer Security Architecture and Design | |||
ADV_TDS.6 | TOE Design | SA-4(2) | Acquisition Process | |
SA-17 | Developer Security Architecture and Design | |||
SA-17(2) | Developer Security Architecture and Design | |||
SA-17(3) | Developer Security Architecture and Design | |||
SA-17(4) | Developer Security Architecture and Design | |||
AGD_OPE.1 | Operational User Guidance | SA-5 | Information System Documentation | |
AGD_PRE.1 | Preparative Procedures | SA-5 | Information System Documentation | |
ALC_CMC.1 | CM Capabilities | CM-9 | Configuration Management Plan | |
SA-10 | Developer Configuration Management | |||
ALC_CMC.2 | CM Capabilities | CM-9 | Configuration Management Plan | |
SA-10 | Developer Configuration Management | |||
ALC_CMC.3 | CM Capabilities | CM-3 | Configuration Change Control | |
CM-9 | Configuration Management Plan | |||
SA-10 | Developer Configuration Management | |||
ALC_CMC.4 | CM Capabilities | CM-3 | Configuration Change Control | |
CM-3(1) | Configuration Change Control | |||
CM-3(3) | Configuration Change Control | |||
CM-9 | Configuration Management Plan | |||
SA-10 | Developer Configuration Management | |||
ALC_CMC.5 | CM Capabilities | CM-3 | Configuration Change Control | |
CM-3(1) | Configuration Change Control | |||
CM-3(2) | Configuration Change Control | |||
CM-3(3) | Configuration Change Control | |||
CM-9 | Configuration Management Plan | |||
SA-10 | Developer Configuration Management | |||
ALC_CMS.1 | CM Scope | CM-9 | Configuration Management Plan | |
SA-10 | Developer Configuration Management | |||
ALC_CMS.2 | CM Scope | CM-9 | Configuration Management Plan | |
SA-10 | Developer Configuration Management | |||
ALC_CMS.3 | CM Scope | CM-9 | Configuration Management Plan | |
SA-10 | Developer Configuration Management | |||
ALC_CMS.4 | CM Scope | CM-9 | Configuration Management Plan | |
SA-10 | Developer Configuration Management | |||
ALC_CMS.5 | CM Scope | CM-9 | Configuration Management Plan | |
SA-10 | Developer Configuration Management | |||
ALC_DEL.1 | Delivery | MP-5 | Media Transport | |
SA-10(1) | Developer Configuration Management | |||
SA-10(6) | Developer Configuration Management | |||
SA-18 | Tamper Resistance and Detection | |||
SA-19 | Component Authenticity | |||
ALC_DVS.1 | Development Security | SA-1 | System and Services Acquisition Policy and Procedures | |
SA-3 | System Development Lifecycle | |||
SA-12 | Supply Chain Protection | |||
ALC_DVS.2 | Development Security | CM-5 | Access Restrictions for Change | |
SA-3 | System Development Lifecycle | |||
SA-12 | Supply Chain Protection | |||
ALC_FLR.1 | Flaw Remediation | SA-10 | Developer Configuration Management | |
SA-11 | Developer Security Testing / Evaluation | |||
SI-2 | Flaw Remediation | |||
ALC_FLR.2 | Flaw Remediation | SA-10 | Developer Configuration Management | |
SA-11 | Developer Security Testing / Evaluation | |||
SI-2 | Flaw Remediation | |||
ALC_FLR.3 | Flaw Remediation | SA-10 | Developer Configuration Management | |
SA-11 | Developer Security Testing / Evaluation | |||
SI-2 | Flaw Remediation | |||
ALC_LCD.1 | Life-Cycle Definition | SA-3 | System Development Life Cycle | |
SA-15 | Development Process, Standards, and Tools | |||
ALC_LCD.2 | Life-Cycle Definition | SA-3 | System Development Life Cycle | |
SA-15 | Development Process, Standards, and Tools | |||
ALC_TAT.1 | Tools and Techniques | SA-15 | Development Process, Standards, and Tools | |
ALC_TAT.2 | Tools and Techniques | SA-15 | Development Process, Standards, and Tools | |
ALC_TAT.3 | Tools and Techniques | SA-15 | Development Process, Standards, and Tools | |
ATE_COV.1 | Coverage | SA-11 | Developer Security Testing and Evaluation | |
SA-11(7) | Developer Security Testing and Evaluation Verify Scope of Testing / Evaluation | |||
ATE_COV.2 | Coverage | SA-11 | Developer Security Testing and Evaluation | |
SA-11(7) | Developer Security Testing and Evaluation Verify Scope of Testing / Evaluation | |||
ATE_COV.3 | Coverage | SA-11 | Developer Security Testing and Evaluation | |
SA-11(7) | Developer Security Testing and Evaluation Verify Scope of Testing / Evaluation | |||
ATE_DPT.1 | Depth | SA-11 | Developer Security Testing and Evaluation | |
SA-11(7) | Developer Security Testing and Evaluation Verify Scope of Testing / Evaluation | |||
ATE_DPT.2 | Depth | SA-11 | Developer Security Testing and Evaluation | |
SA-11(7) | Developer Security Testing and Evaluation Verify Scope of Testing / Evaluation | |||
ATE_DPT.3 | Depth | SA-11 | Developer Security Testing and Evaluation | |
SA-11(7) | Developer Security Testing and Evaluation Verify Scope of Testing / Evaluation | |||
ATE_DPT.4 | Depth | SA-11 | Developer Security Testing and Evaluation | |
SA-11(7) | Developer Security Testing and Evaluation Verify Scope of Testing / Evaluation | |||
ATE_FUN.1 | Functional Tests | SA-11 | Developer Security Testing and Evaluation | |
ATE_FUN.2 | Functional Tests | SA-11 | Developer Security Testing and Evaluation | |
ATE_IND.1 | Independent Testing | CA-2 | Security Assessments | |
CA-2(1) | Security Assessments | |||
SA-11(3) | Developer Security Testing and Evaluation Independent Verification of Assessment Plans / Evidence | |||
ATE_IND.2 | Independent Testing | CA-2 | Security Assessments | |
CA-2(1) | Security Assessments | |||
SA-11(3) | Developer Security Testing and Evaluation Independent Verification of Assessment Plans / Evidence | |||
ATE_IND.3 | Independent Testing | CA-2 | Security Assessments | |
CA-2(1) | Security Assessments | |||
SA-11(3) | Developer Security Testing and Evaluation Independent Verification of Assessment Plans / Evidence | |||
AVA_VAN.1 | Vulnerability Analysis | CA-2(2) | Security Assessments | |
CA-8 | Penetration Testing | |||
RA-3 | Risk Assessment | |||
SA-11(2) | Developer Security Testing and Evaluation Threat And Vulnerability Analyses / Flaw Remediation | |||
SA-11(5) | Developer Security Testing and Evaluation Penetration Testing | |||
AVA_VAN.2 | Vulnerability Analysis | CA-2(2) | Security Assessments | |
CA-8 | Penetration Testing | |||
RA-3 | Risk Assessment | |||
SA-11(2) | Developer Security Testing and Evaluation Threat And Vulnerability Analyses / Flaw Remediation | |||
SA-11(5) | Developer Security Testing and Evaluation Penetration Testing | |||
AVA_VAN.3 | Vulnerability Analysis | CA-2(2) | Security Assessments | |
CA-8 | Penetration Testing | |||
RA-3 | Risk Assessment | |||
SA-11( 2) | Developer Security Testing and Evaluation Threat And Vulnerability Analyses / Flaw Remediation | |||
SA-11(5) | Developer Security Testing and Evaluation Penetration Testing | |||
AVA_VAN.4 | Vulnerability Analysis | CA-2(2) | Security Assessments | |
CA-8 | Penetration Testing | |||
RA-3 | Risk Assessment | |||
SA-11(2) | Developer Security Testing and Evaluation Threat And Vulnerability Analyses / Flaw Remediation | |||
SA-11(5) | Developer Security Testing and Evaluation Penetration Testing | |||
AVA_VAN.5 | Vulnerability Analysis | CA-2(2) | Security Assessments | |
CA-8 | Penetration Testing | |||
RA-3 | Risk Assessment | |||
SA-11(2) | Developer Security Testing and Evaluation Threat And Vulnerability Analyses / Flaw Remediation | |||
SA-11(5) | Developer Security Testing and Evaluation Penetration Testing | |||
ACO_COR.1 | Composition Rationale | SA-17 | Developer Security Architecture and Design | |
ACO_DEV.1 | Development Evidence | SA-17 | Developer Security Architecture and Design | |
ACO_DEV.2 | Development Evidence | SA-17 | Developer Security Architecture and Design | |
ACO_DEV.3 | Development Evidence | SA-17 | Developer Security Architecture and Design | |
ACO_REL.1 | Reliance on Dependent Component | SA-17 | Developer Security Architecture and Design | |
ACO_REL.2 | Reliance on Dependent Component | SA-17 | Developer Security Architecture and Design | |
ACO_CTT.1 | Composed TOE Testing | SA-11 | Developer Security Testing and Evaluation | |
ACO_CTT.2 | Composed TOE Testing | SA-11 | Developer Security Testing and Evaluation | |
ACO_VUL.1 | Composition Vulnerability Analysis | CA-2 | Security Assessments | |
CA-8 | Penetration Testing | |||
RA-3 | Risk Assessment | |||
SA-11 | Developer Security Testing and Evaluation | |||
ACO_VUL.2 | Composition Vulnerability Analysis | CA-2 | Security Assessments | |
CA-8 | Penetration Testing | |||
RA-3 | Risk Assessment | |||
SA-11 | Developer Security Testing and Evaluation | |||
ACO_VUL.3 | Composition Vulnerability Analysis | CA-2 | Security Assessments | |
CA-8 | Penetration Testing | |||
RA-3 | Risk Assessment | |||
SA-11 | Developer Security Testing and Evaluation |
appendix i
113. ISO/IEC 27001 was published in October 2013 by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC). ↩
114. ISO/IEC 15408 was published in September 2012 by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC). ↩
115. The use of the term XX-1 controls in mapping Table H-2 refers to the set of security controls represented by the first control in each family in Appendix F, where XX is a placeholder for the two-letter family identifier. ↩