international information security standards

SECURITY CONTROL MAPPINGS FOR ISO/IEC 27001 AND 15408

T

he mapping tables in this appendix provide organizations with a general indication of security control coverage with respect to ISO/IEC 27001, Information technology–Security techniques–Information security management systems–Requirements[113]</sup> and ISO/IEC 15408, Information technology -- Security techniques -- Evaluation criteria for IT security.[114]</sup> ISO/IEC 27001 may be applied to all types of organizations and specifies requirements for establishing, implementing, operating, monitoring, reviewing, maintaining, and improving a documented information security management system (ISMS) within the context of business risks. NIST Special Publication 800-39 includes guidance on managing risk at the organizational level, mission/business process level, and information system level, is consistent with ISO/IEC 27001, and provides additional implementation detail for the federal government and its contractors. ISO/IEC 15408 (also known as the Common Criteria) provides functionality and assurance requirements for developers of information systems and information system components (i.e., information technology products). Since many of the technical security controls defined in Appendix F are implemented in hardware, software, and firmware components of information systems, organizations can obtain significant benefit from the acquisition and employment of information technology products evaluated against the requirements of ISO/IEC 15408. The use of such products can provide evidence that certain security controls are implemented correctly, operating as intended, and producing the desired effect in satisfying stated security requirements.

Previously, the ISO/IEC 27001 mappings were created by relating the primary security topic identified in each of the Special Publication 800-53 base controls to a similar security topic in the ISO/IEC standard. This methodology resulted in a mapping of security control relationships rather than a mapping of equivalent security control requirements. The ISO/IEC 27001:2013 update provided an opportunity to reassess whether the implementation of a security control from Special Publication 800-53 satisfied the intent of the mapped control from ISO/IEC 27001 and conversely, whether the implementation of a security control from ISO/IEC 27001 satisfied the intent of the mapped control from Special Publication 800-53. To successfully meet the mapping criteria, the implementation of the mapped controls should result in an equivalent information security posture. However, this does not mean that security control equivalency based solely on the mapping tables herein should be assumed by organizations. While the revised security control mappings are more accurate, there is still some degree of subjectivity in the mapping analysis because the mappings are not always one-to-one and may not be completely equivalent. The following examples illustrate some of the mapping issues:

  • Example 1: Special Publication 800-53 contingency planning and ISO/IEC 27001 business continuity management were deemed to have similar, but not the same, functionality.
  • Example 2: In some cases, similar topics are addressed in the two security control sets but provide a different context, perspective, or scope. Special Publication 800-53 addresses information flow control broadly in terms of approved authorizations for controlling access between source and destination objects, whereas ISO/IEC 27001 addresses information flow more narrowly as it applies to interconnected network domains.
  • Example 3: Security control A.6.1.1, Information Security Roles and Responsibilities, in ISO/IEC 27001 states that “all information security responsibilities shall be defined and allocated” while security control PM-10, Security Authorization Process, in Special Publication 800-53 that is mapped to A.6.1.1, has three distinct parts. The first part states that the organization “designates individuals to fulfill specific roles and responsibilities…” If A.6.1.1 is mapped to PM-10 without providing any additional information, organizations might assume that if they implement A.6.1.1 (i.e., all responsibilities are defined and allocated), then the intent of PM-10 would also be fully satisfied. However, this would not be the case since the other two parts of PM-10 would not have been addressed. To resolve and clarify the security control mappings, when a security control in the right column of Tables H-1 and H-2 does not fully satisfy the intent of the security control in the left column of the tables, the control in the right column is designated with an asterisk (*).

In a few cases, an ISO/IEC 27001 security control could only be directly mapped to a Special Publication 800-53 control enhancement. In such cases, the relevant enhancement is specified in Table H-2 indicating that the corresponding ISO/IEC 27001 control satisfies only the intent of the specified enhancement and does not address the associated base control from Special Publication 800-53 or any other enhancements under that base control. Where no enhancement is specified, the ISO/IEC 27001 control is relevant only to the Special Publication 800-53 base control.

And finally, the security controls from ISO/IEC 27002 were not considered in the mapping analysis since the standard is informative rather than normative.

Table H-1 provides a mapping from the security controls in NIST Special Publication 800-53 to the security controls in ISO/IEC 27001. Please review the introductory text at the beginning of Appendix H before employing the mappings in Table H-1.

TABLE H-1: MAPPING NIST SP 800-53 TO ISO/IEC 27001

NIST SP 800-53 CONTROLS ISO/IEC 27001 CONTROLS
AC-1 Access Control Policy and Procedures A.5.1.1, A.5.1.2, A.6.1.1, A.9.1.1, A.12.1.1, A.18.1.1, A.18.2.2
AC-2 Account Management A.9.2.1, A.9.2.2, A.9.2.3, A.9.2.5, A.9.2.6
AC-3 Access Enforcement A.6.2.2, A.9.1.2, A.9.4.1, A.9.4.4, A.9.4.5, A.13.1.1, A.14.1.2, A.14.1.3, A.18.1.3
AC-4 Information Flow Enforcement A.13.1.3, A.13.2.1, A.14.1.2, A.14.1.3
AC-5 Separation of Duties A.6.1.2
AC-6 Least Privilege A.9.1.2, A.9.2.3, A.9.4.4, A.9.4.5
AC-7 Unsuccessful Logon Attempts A.9.4.2
AC-8 System Use Notification A.9.4.2
AC-9 Previous Logon (Access) Notification A.9.4.2
AC-10 Concurrent Session Control None
AC-11 Session Lock A.11.2.8, A.11.2.9
AC-12 Session Termination None
AC-13 Withdrawn ---
AC-14 Permitted Actions without Identification or Authentication None
AC-15 Withdrawn ---
AC-16 Security Attributes None
AC-17 Remote Access A.6.2.1, A.6.2.2, A.13.1.1, A.13.2.1, A.14.1.2
AC-18 Wireless Access A.6.2.1, A.13.1.1, A.13.2.1
AC-19 Access Control for Mobile Devices A.6.2.1, A.11.2.6, A.13.2.1
AC-20 Use of External Information Systems A.11.2.6, A.13.1.1, A.13.2.1
AC-21 Information Sharing None
AC-22 Publicly Accessible Content None
AC-23 Data Mining Protection None
AC-24 Access Control Decisions A.9.4.1*
AC-25 Reference Monitor None
AT-1 Security Awareness and Training Policy and Procedures A.5.1.1, A.5.1.2, A.6.1.1, A.12.1.1, A.18.1.1, A.18.2.2
AT-2 Security Awareness Training A.7.2.2, A.12.2.1
AT-3 Role-Based Security Training A.7.2.2*
AT-4 Security Training Records None
AT-5 Withdrawn ---
AU-1 Audit and Accountability Policy and Procedures A.5.1.1, A.5.1.2, A.6.1.1, A.12.1.1, A.18.1.1, A.18.2.2
AU-2 Audit Events None
AU-3 Content of Audit Records A.12.4.1*
AU-4 Audit Storage Capacity A.12.1.3
AU-5 Response to Audit Processing Failures None
AU-6 Audit Review, Analysis, and Reporting A.12.4.1, A.16.1.2, A.16.1.4
AU-7 Audit Reduction and Report Generation None
AU-8 Time Stamps A.12.4.4
AU-9 Protection of Audit Information A.12.4.2, A.12.4.3, A.18.1.3
AU-10 Non-repudiation None
AU-11 Audit Record Retention A.12.4.1, A.16.1.7
AU-12 Audit Generation A.12.4.1, A.12.4.3
AU-13 Monitoring for Information Disclosure None
AU-14 Session Audit A.12.4.1*
AU-15 Alternate Audit Capability None
AU-16 Cross-Organizational Auditing None
CA-1 Security Assessment and Authorization Policies and Procedures A.5.1.1, A.5.1.2, A.6.1.1, A.12.1.1, A.18.1.1, A.18.2.2
CA-2 Security Assessments A.14.2.8, A.18.2.2, A.18.2.3
CA-3 System Interconnections A.13.1.2, A.13.2.1, A.13.2.2
CA-4 Withdrawn ---
CA-5 Plan of Action and Milestones None
CA-6 Security Authorization None
CA-7 Continuous Monitoring None
CA-8 Penetration Testing None
CA-9 Internal System Connections None
CM-1 Configuration Management Policy and Procedures A.5.1.1, A.5.1.2, A.6.1.1, A.12.1.1, A.18.1.1, A.18.2.2
CM-2 Baseline Configuration None
CM-3 Configuration Change Control A.12.1.2, A.14.2.2, A.14.2.3, A.14.2.4
CM-4 Security Impact Analysis A.14.2.3
CM-5 Access Restrictions for Change A.9.2.3, A.9.4.5, A.12.1.2, A.12.1.4, A.12.5.1
CM-6 Configuration Settings None
CM-7 Least Functionality A.12.5.1*
CM-8 Information System Component Inventory A.8.1.1, A.8.1.2
CM-9 Configuration Management Plan A.6.1.1*
CM-10 Software Usage Restrictions A.18.1.2
CM-11 User-Installed Software A.12.5.1, A.12.6.2
CP-1 Contingency Planning Policy and Procedures A.5.1.1, A.5.1.2, A.6.1.1, A.12.1.1, A.18.1.1, A.18.2.2
CP-2 Contingency Plan A.6.1.1, A.17.1.1, A.17.2.1
CP-3 Contingency Training A.7.2.2*
CP-4 Contingency Plan Testing A.17.1.3
CP-5 Withdrawn ---
CP-6 Alternate Storage Site A.11.1.4, A.17.1.2, A.17.2.1
CP-7 Alternate Processing Site A.11.1.4, A.17.1.2, A.17.2.1
CP-8 Telecommunications Services A.11.2.2, A.17.1.2
CP-9 Information System Backup A.12.3.1, A.17.1.2, A.18.1.3
CP-10 Information System Recovery and Reconstitution A.17.1.2
CP-11 Alternate Communications Protocols A.17.1.2*
CP-12 Safe Mode None
CP-13 Alternative Security Mechanisms A.17.1.2*
IA-1 Identification and Authentication Policy and Procedures A.5.1.1, A.5.1.2, A.6.1.1, A.12.1.1, A.18.1.1, A.18.2.2
IA-2 Identification and Authentication (Organizational Users) A.9.2.1
IA-3 Device Identification and Authentication None
IA-4 Identifier Management A.9.2.1
IA-5 Authenticator Management A.9.2.1, A.9.2.4, A.9.3.1, A.9.4.3
IA-6 Authenticator Feedback A.9.4.2
IA-7 Cryptographic Module Authentication A.18.1.5
IA-8 Identification and Authentication (Non-Organizational Users) A.9.2.1
IA-9 Service Identification and Authentication None
IA-10 Adaptive Identification and Authentication None
IA-11 Re-authentication None
IR-1 Incident Response Policy and Procedures A.5.1.1, A.5.1.2, A.6.1.1, A.12.1.1 A.18.1.1, A.18.2.2
IR-2 Incident Response Training A.7.2.2*
IR-3 Incident Response Testing None
IR-4 Incident Handling A.16.1.4, A.16.1.5, A.16.1.6
IR-5 Incident Monitoring None
IR-6 Incident Reporting A.6.1.3, A.16.1.2
IR-7 Incident Response Assistance None
IR-8 Incident Response Plan A.16.1.1
IR-9 Information Spillage Response None
IR-10 Integrated Information Security Analysis Team None
MA-1 System Maintenance Policy and Procedures A.5.1.1, A.5.1.2, A.6.1.1, A.12.1.1, A.18.1.1, A.18.2.2
MA-2 Controlled Maintenance A.11.2.4, A.11.2.5
MA-3 Maintenance Tools None
MA-4 Nonlocal Maintenance None
MA-5 Maintenance Personnel None
MA-6 Timely Maintenance A.11.2.4
MP-1 Media Protection Policy and Procedures A.5.1.1, A.5.1.2, A.6.1.1, A.12.1.1, A.18.1.1, A.18.2.2
MP-2 Media Access A.8.2.3, A.8.3.1, A.11.2.9
MP-3 Media Marking A.8.2.2
MP-4 Media Storage A.8.2.3, A.8.3.1, A.11.2.9
MP-5 Media Transport A.8.2.3, A.8.3.1, A.8.3.3, A.11.2.5, A.11.2.6
MP-6 Media Sanitization A.8.2.3, A.8.3.1, A.8.3.2, A.11.2.7
MP-7 Media Use A.8.2.3, A.8.3.1
MP-8 Media Downgrading None
PE-1 Physical and Environmental Protection Policy and Procedures A.5.1.1, A.5.1.2, A.6.1.1, A.12.1.1, A.18.1.1, A.18.2.2
PE-2 Physical Access Authorizations A.11.1.2*
PE-3 Physical Access Control A.11.1.1, A.11.1.2, A.11.1.3
PE-4 Access Control for Transmission Medium A.11.1.2, A.11.2.3
PE-5 Access Control for Output Devices A.11.1.2, A.11.1.3
PE-6 Monitoring Physical Access None
PE-7 Withdrawn ---
PE-8 Visitor Access Records None
PE-9 Power Equipment and Cabling A.11.1.4, A.11.2.1, A.11.2.2, A.11.2.3
PE-10 Emergency Shutoff A.11.2.2*
PE-11 Emergency Power A.11.2.2
PE-12 Emergency Lighting A.11.2.2*
PE-13 Fire Protection A.11.1.4, A.11.2.1
PE-14 Temperature and Humidity Controls A.11.1.4, A.11.2.1, A.11.2.2
PE-15 Water Damage Protection A.11.1.4, A.11.2.1, A.11.2.2
PE-16 Delivery and Removal A.8.2.3, A.11.1.6, A.11.2.5
PE-17 Alternate Work Site A.6.2.2, A.11.2.6, A.13.2.1
PE-18 Location of Information System Components A.8.2.3, A.11.1.4, A.11.2.1
PE-19 Information Leakage A.11.1.4, A.11.2.1
PE-20 Asset Monitoring and Tracking A.8.2.3*
PL-1 Security Planning Policy and Procedures A.5.1.1, A.5.1.2, A.6.1.1, A.12.1.1, A.18.1.1, A.18.2.2
PL-2 System Security Plan A.14.1.1
PL-3 Withdrawn ---
PL-4 Rules of Behavior A.7.1.2, A.7.2.1, A.8.1.3
PL-5 Withdrawn ---
PL-6 Withdrawn ---
PL-7 Security Concept of Operations A.14.1.1*
PL-8 Information Security Architecture A.14.1.1*
PL-9 Central Management None
PS-1 Personnel Security Policy and Procedures A.5.1.1, A.5.1.2, A.6.1.1, A.12.1.1, A.18.1.1, A.18.2.2
PS-2 Position Risk Designation None
PS-3 Personnel Screening A.7.1.1
PS-4 Personnel Termination A.7.3.1, A.8.1.4
PS-5 Personnel Transfer A.7.3.1, A.8.1.4
PS-6 Access Agreements A.7.1.2, A.7.2.1, A.13.2.4
PS-7 Third-Party Personnel Security A.6.1.1, A.7.2.1
PS-8 Personnel Sanctions A.7.2.3
RA-1 Risk Assessment Policy and Procedures A.5.1.1, A.5.1.2, A.6.1.1, A.12.1.1, A.18.1.1, A.18.2.2
RA-2 Security Categorization A.8.2.1
RA-3 Risk Assessment A.12.6.1*
RA-4 Withdrawn ---
RA-5 Vulnerability Scanning A.12.6.1*
RA-6 Technical Surveillance Countermeasures Survey None
SA-1 System and Services Acquisition Policy and Procedures A.5.1.1, A.5.1.2, A.6.1.1, A.12.1.1, A.18.1.1, A.18.2.2
SA-2 Allocation of Resources None
SA-3 System Development Life Cycle A.6.1.1, A.6.1.5, A.14.1.1, A.14.2.1, A.14.2.6
SA-4 Acquisition Process A.14.1.1, A.14.2.7, A.14.2.9, A.15.1.2
SA-5 Information System Documentation A.12.1.1*
SA-6 Withdrawn ---
SA-7 Withdrawn ---
SA-8 Security Engineering Principles A.14.2.5
SA-9 External Information System Services A.6.1.1, A.6.1.5, A.7.2.1, A.13.1.2, A.13.2.2, A.15.2.1, A.15.2.2
SA-10 Developer Configuration Management A.12.1.2, A.14.2.2, A.14.2.4, A.14.2.7
SA-11 Developer Security Testing and Evaluation A.14.2.7, A.14.2.8
SA-12 Supply Chain Protections A.14.2.7, A.15.1.1, A.15.1.2, A.15.1.3
SA-13 Trustworthiness None
SA-14 Criticality Analysis None
SA-15 Development Process, Standards, and Tools A.6.1.5, A.14.2.1,
SA-16 Developer-Provided Training None
SA-17 Developer Security Architecture and Design A.14.2.1, A.14.2.5
SA-18 Tamper Resistance and Detection None
SA-19 Component Authenticity None
SA-20 Customized Development of Critical Components None
SA-21 Developer Screening A.7.1.1
SA-22 Unsupported System Components None
SC-1 System and Communications Protection Policy and Procedures A.5.1.1, A.5.1.2, A.6.1.1, A.12.1.1, A.18.1.1, A.18.2.2
SC-2 Application Partitioning None
SC-3 Security Function Isolation None
SC-4 Information In Shared Resources None
SC-5 Denial of Service Protection None
SC-6 Resource Availability None
SC-7 Boundary Protection A.13.1.1, A.13.1.3, A.13.2.1, A.14.1.3
SC-8 Transmission Confidentiality and Integrity A.8.2.3, A.13.1.1, A.13.2.1, A.13.2.3, A.14.1.2, A.14.1.3
SC-9 Withdrawn ---
SC-10 Network Disconnect A.13.1.1
SC-11 Trusted Path None
SC-12 Cryptographic Key Establishment and Management A.10.1.2
SC-13 Cryptographic Protection A.10.1.1, A.14.1.2, A.14.1.3, A.18.1.5
SC-14 Withdrawn ---
SC-15 Collaborative Computing Devices A.13.2.1*
SC-16 Transmission of Security Attributes None
SC-17 Public Key Infrastructure Certificates A.10.1.2
SC-18 Mobile Code None
SC-19 Voice Over Internet Protocol None
SC-20 Secure Name/Address Resolution Service (Authoritative Source) None
SC-21 Secure Name/Address Resolution Service (Recursive or Caching Resolver) None
SC-22 Architecture and Provisioning for Name/Address Resolution Service None
SC-23 Session Authenticity None
SC-24 Fail in Known State None
SC-25 Thin Nodes None
SC-26 Honeypots None
SC-27 Platform-Independent Applications None
SC-28 Protection of Information at Rest A.8.2.3*
SC-29 Heterogeneity None
SC-30 Concealment and Misdirection None
SC-31 Covert Channel Analysis None
SC-32 Information System Partitioning None
SC-33 Withdrawn ---
SC-34 Non-Modifiable Executable Programs None
SC-35 Honeyclients None
SC-36 Distributed Processing and Storage None
SC-37 Out-of-Band Channels None
SC-38 Operations Security A.12.x
SC-39 Process Isolation None
SC-40 Wireless Link Protection None
SC-41 Port and I/O Device Access None
SC-42 Sensor Capability and Data None
SC-43 Usage Restrictions None
SC-44 Detonation Chambers None
SI-1 System and Information Integrity Policy and Procedures A.5.1.1, A.5.1.2, A.6.1.1, A.12.1.1, A.18.1.1, A.18.2.2
SI-2 Flaw Remediation A.12.6.1, A.14.2.2, A.14.2.3, A.16.1.3
SI-3 Malicious Code Protection A.12.2.1
SI-4 Information System Monitoring None
SI-5 Security Alerts, Advisories, and Directives A.6.1.4*
SI-6 Security Function Verification None
SI-7 Software, Firmware, and Information Integrity None
SI-8 Spam Protection None
SI-9 Withdrawn ---
SI-10 Information Input Validation None
SI-11 Error Handling None
SI-12 Information Handling and Retention None
SI-13 Predictable Failure Prevention None
SI-14 Non-Persistence None
SI-15 Information Output Filtering None
SI-16 Memory Protection None
SI-17 Fail-Safe Procedures None
PM-1 Information Security Program Plan A.5.1.1, A.5.1.2, A.6.1.1, A.18.1.1, A.18.2.2
PM-2 Senior Information Security Officer A.6.1.1*
PM-3 Information Security Resources None
PM-4 Plan of Action and Milestones Process None
PM-5 Information System Inventory None
PM-6 Information Security Measures of Performance None
PM-7 Enterprise Architecture None
PM-8 Critical Infrastructure Plan None
PM-9 Risk Management Strategy None
PM-10 Security Authorization Process A.6.1.1*
PM-11 Mission/Business Process Definition None
PM-12 Insider Threat Program None
PM-13 Information Security Workforce A.7.2.2*
PM-14 Testing, Training, and Monitoring None
PM-15 Contacts with Security Groups and Associations A.6.1.4
PM-16 Threat Awareness Program None

Table H-2 provides a mapping from the security controls in ISO/IEC 27001 to the security controls in Special Publication 800-53.[115]</sup> Please review the introductory text at the beginning of Appendix H before employing the mappings in Table H-2.

TABLE H-2: MAPPING ISO/IEC 27001 TO NIST SP 800-53

ISO/IEC 27001 CONTROLS NIST SP 800-53 CONTROLS
A.5 Information Security Policies
A.5.1 Management direction for information security
A.5.1.1 Policies for information security All XX-1 controls
A.5.1.2 Review of the policies for information security All XX-1 controls
A.6 Organization of information security
A.6.1 Internal organization
A.6.1.1 Information security roles and responsibilities All XX-1 controls, CM-9, CP-2,PS-7, SA-3, SA-9, PM- 2, PM-10
A.6.1.2 Segregation of duties AC-5
A.6.1.3 Contact with authorities IR-6
A.6.1.4 Contact with special interest groups SI-5, PM-15
A.6.1.5 Information security in project management SA-3, SA-9, SA-15
A.6.2 Mobile devices and teleworking
A.6.2.1 Mobile device policy AC-17, AC-18, AC-19
A.6.2.2 Teleworking AC-3, AC-17, PE-17
A.7 Human Resources Security
A.7.1 Prior to Employment
A.7.1.1 Screening PS-3, SA-21
A.7.1.2 Terms and conditions of employment PL-4, PS-6
A.7.2 During employment
A.7.2.1 Management responsibilities PL-4, PS-6, PS-7, SA-9
A.7.2.2 Information security awareness, education, and training AT-2, AT-3, CP-3, IR-2, PM-13
A.7.2.3 Disciplinary process PS-8
A.7.3 Termination and change of employment
A.7.3.1 Termination or change of employment responsibilities PS-4, PS-5
A.8 Asset Management
A.8.1 Responsibility for assets
A.8.1.1 Inventory of assets CM-8
A.8.1.2 Ownership of assets CM-8
A.8.1.3 Acceptable use of assets PL-4
A.8.1.4 Return of assets PS-4, PS-5
A.8.2 Information Classification
A.8.2.1 Classification of information RA-2
A.8.2.2 Labelling of Information MP-3
A.8.2.3 Handling of Assets MP-2, MP-4, MP-5, MP-6, MP-7, PE-16, PE-18, PE- 20, SC-8, SC-28
A.8.3 Media Handling
A.8.3.1 Management of removable media MP-2, MP-4, MP-5, MP-6, MP-7
A.8.3.2 Disposal of media MP-6
A.8.3.3 Physical media transfer MP-5
A.9 Access Control
A.9.1 Business requirement of access control
A.9.1.1 Access control policy AC-1
A.9.1.2 Access to networks and network services AC-3, AC-6
A.9.2 User access management
A.9.2.1 User registration and de-registration AC-2, IA-2, IA-4, IA-5, IA-8
A.9.2.2 User access provisioning AC-2
A.9.2.3 Management of privileged access rights AC-2, AC-3, AC-6, CM-5
A.9.2.4 Management of secret authentication information of users IA-5
A.9.2.5 Review of user access rights AC-2
A.9.2.6 Removal or adjustment of access rights AC-2
A.9.3 User responsibilities
A.9.3.1 Use of secret authentication information IA-5
A.9.4 System and application access control
A.9.4.1 Information access restriction AC-3, AC-24
A.9.4.2 Secure logon procedures AC-7, AC-8, AC-9, IA-6
A.9.4.3 Password management system IA-5
A.9.4.4 Use of privileged utility programs AC-3, AC-6
A.9.4.5 Access control to program source code AC-3, AC-6, CM-5
A.10 Cryptography
A.10.1 Cryptographic controls
A.10.1.1 Policy on the use of cryptographic controls SC-13
A.10.1.2 Key Management SC-12, SC-17
A.11 Physical and environmental security
A.11.1 Secure areas
A.11.1.1 Physical security perimeter PE-3*
A.11.1.2 Physical entry controls PE-2, PE-3, PE-4, PE-5
A.11.1.3 Securing offices, rooms and facilities PE-3, PE-5
A.11.1.4 Protecting against external and environmental threats CP-6, CP-7, PE-9, PE-13, PE-14, PE-15, PE-18, PE- 19
A.11.1.5 Working in secure areas SC-42(3)*
A.11.1.6 Delivery and loading areas PE-16
A.11.2 Equipment
A.11.2.1 Equipment siting and protection PE-9, PE-13, PE-14, PE-15, PE-18, PE-19
A.11.2.2 Supporting utilities CP-8, PE-9, PE-10, PE-11, PE-12, PE-14, PE-15
A.11.2.3 Cabling security PE-4, PE-9
A.11.2.4 Equipment maintenance MA-2, MA-6
A.11.2.5 Removal of assets MA-2, MP-5, PE-16
A.11.2.6 Security of equipment and assets off-premises AC-19, AC-20, MP-5, PE-17
A.11.2.7 Secure disposal or reuse of equipment MP-6
A.11.2.8 Unattended user equipment AC-11
A.11.2.9 Clear desk and clear screen policy AC-11, MP-2, MP-4
A.12 Operations security
A.12.1 Operational procedures and responsibilities
A.12.1.1 Documented operating procedures All XX-1 controls, SA-5
A.12.1.2 Change management CM-3, CM-5, SA-10
A.12.1.3 Capacity management AU-4, CP-2(2), SC-5(2)
A.12.1.4 Separation of development, testing, and operational environments CM-4(1), CM-5
A.12.2 Protection from malware
A.12.2.1 Controls against malware AT-2, SI-3
A.12.3 Backup
A.12.3.1 Information backup CP-9
A.12.4 Logging and monitoring
A.12.4.1 Event logging AU-3, AU-6, AU-11, AU-12, AU-14
A.12.4.2 Protection of log information AU-9
A.12.4.3 Administrator and operator logs AU-9, AU-12
A.12.4.4 Clock synchronization AU-8
A.12.5 Control of operational software
A.12.5.1 Installation of software on operational systems CM-5, CM-7(4), CM-7(5), CM-11
A.12.6 Technical vulnerability management
A.12.6.1 Management of technical vulnerabilities RA-3, RA-5, SI-2, SI-5
A.12.6.2 Restrictions on software installation CM-11
A.12.7 Information systems audit considerations
A.12.7.1 Information systems audit controls AU-5*
A.13 Communications security
A.13.1 Network security management
A.13.1.1 Network controls AC-3, AC-17, AC-18, AC-20, SC-7, SC-8, SC-10
A.13.1.2 Security of network services CA-3, SA-9
A.13.1.3 Segregation in networks AC-4, SC-7
A.13.2 Information transfer
A.13.2.1 Information transfer policies and procedures AC-4, AC-17, AC-18, AC-19, AC-20, CA-3, PE-17, SC-7, SC-8, SC-15
A.13.2.2 Agreements on information transfer CA-3, PS-6, SA-9
A.13.2.3 Electronic messaging SC-8
A.13.2.4 Confidentiality or nondisclosure agreements PS-6
A.14 System acquisition, development and maintenance
A.14.1 Security requirements of information systems
A.14.1.1 Information security requirements analysis and specification PL-2, PL-7, PL-8, SA-3, SA-4
A.14.1.2 Securing application services on public networks AC-3, AC-4, AC-17, SC-8, SC-13
A.14.1.3 Protecting application services transactions AC-3, AC-4, SC-7, SC-8, SC-13
A.14.2 Security in development and support processes
A.14.2.1 Secure development policy SA-3, SA-15, SA-17
A.14.2.2 System change control procedures CM-3, SA-10, SI-2
A.14.2.3 Technical review of applications after operating platform changes CM-3, CM-4, SI-2
A.14.2.4 Restrictions on changes to software packages CM-3, SA-10
A.14.2.5 Secure system engineering principles SA-8
A.14.2.6 Secure development environment SA-3*
A.14.2.7 Outsourced development SA-4, SA-10, SA-11, SA-12, SA-15
A.14.2.8 System security testing CA-2, SA-11
A.14.2.9 System acceptance testing SA-4, SA-12(7)
A.14.3 Test data
A.14.3.1 Protection of test data SA-15(9)*
A.15 Supplier Relationships
A.15.1 Information security in supplier relationships
A.15.1.1 Information security policy for supplier relationships SA-12
A.15.1.2 Address security within supplier agreements SA-4, SA-12
A.15.1.3 Information and communication technology supply chain SA-12
A.15.2 Supplier service delivery management
A.15.2.1 Monitoring and review of supplier services SA-9
A.15.2.2 Managing changes to supplier services SA-9
A.16 Information security incident management
A.16.1 Managing of information security incidents and improvements
A.16.1.1 Responsibilities and procedures IR-8
A.16.1.2 Reporting information security events AU-6, IR-6
A.16.1.3 Reporting information security weaknesses SI-2
A.16.1.4 Assessment of and decision on information security events AU-6, IR-4
A.16.1.5 Response to information security incidents IR-4
A.16.1.6 Learning from information security incidents IR-4
A.16.1.7 Collection of evidence AU-4, AU-9, AU-10(3), AU-11
A.17 Information security aspects of business continuity management
A.17.1 Information security continuity
A.17.1.1 Planning information security continuity CP-2
A.17.1.2 Implementing information security continuity CP-6, CP-7, CP-8, CP-9, CP-10, CP-11, CP-13
A.17.1.3 Verify, review, and evaluate information security continuity CP-4
A.17.2 Redundancies
A.17.2.1 Availability of information processing facilities CP-2,CP-6, CP-7
A.18 Compliance
A.18.1 Compliance with legal and contractual requirements
A.18.1.1 Identification of applicable legislation and contractual requirements All XX-1 controls
A.18.1.2 Intellectual property rights CM-10
A.18.1.3 Protection of records AC-3, AC-23, AU-9, AU-10, CP-9, SC-8, SC-8(1), SC-13, SC-28, SC-28(1)
A.18.1.4 Privacy and protection of personal information Appendix J Privacy controls
A.18.1.5 Regulation of cryptographic controls IA-7, SC-12, SC-13, SC-17
A.18.2 Information security reviews
A.18.2.1 Independent review of information security CA-2(1), SA-11(3)
A.18.2.2 Compliance with security policies and standards All XX-1 controls, CA-2
A.18.2.3 Technical compliance review CA-2

Note: The content of Table H-3, the mapping from the functional and assurance requirements in ISO/IEC 15408 (Common Criteria) to the security controls in Special Publication 800-53, is unaffected by the changes above.

Table H-3 provides a generalized mapping from the functional and assurance requirements in ISO/IEC 15408 (Common Criteria) to the security controls in Special Publication 800-53. The table represents an informal correspondence between security requirements and security controls (i.e., the table is not intended to determine whether the ISO/IEC 15408 security requirements are fully, partially, or not satisfied by the associated security controls). However, the table can serve as a beneficial starting point for further correspondence analysis. Organizations are cautioned that satisfying ISO/IEC 15408 security requirements for an particular evaluated and validated information technology product as represented by the presence of certain security controls from Appendix F, does not imply that such requirements have been satisfied throughout the entire information system (which may consist of multiple, integrated individual component products). Additional information explaining the specific mappings that appear in Table H-3 is available at the National Information Assurance Partnership (NIAP) website at: http://www.niap-ccevs.org.

TABLE H-3: MAPPING ISO/IEC 15408 TO NIST SP 800-53

ISO/IEC 15408 REQUIREMENTS NIST SP 800-53 CONTROLS
Functional Requirements
FAU_ARP.1 Security Audit Automatic Response AU-5 Response to Audit Processing Failures
AU-5(1) Response to Audit Processing Failures
AU-5(2) Response to Audit Processing Failures
AU-5(3) Response to Audit Processing Failures
AU-5(4) Response to Audit Processing Failures
PE-6(2) Monitoring Physical Access
SI-3 Malicious Code Protection
SI-3(8) Malicious Code Protection
SI-4(5) Information System Monitoring
SI-4(7) Information Systems Monitoring
SI-4(22) Information Systems Monitoring
SI-7(2) Software, Firmware, and Information Integrity
SI-7(5) Software, Firmware, and Information Integrity
SI-7(8) Software, Firmware, and Information Integrity
FAU_GEN.1 Security Audit Data Generation AU-2 Audit Events
AU-3 Content of Audit Records
AU-3(1) Content of Audit Records
AU-12 Audit Generation
FAU_GEN.2 Security Audit Data Generation AU-3 Content of Audit Records
FAU_SAA.1 Security Audit Analysis SI-4 Information System Monitoring
FAU_SAA.2 Security Audit Analysis AC-2(12) Account Management
SI-4 Information System Monitoring
FAU_SAA.3 Security Audit Analysis SI-3(7) Malicious Code Protection
SI-4 Information System Monitoring
FAU_SAA.4 Security Audit Analysis SI-3(7) Malicious Code Protection
SI-4 Information System Monitoring
FAU_SAR.1 Security Audit Review AU-7 Audit Reduction and Report Generation
FAU_SAR.2 Security Audit Review AU-9(6) Protection of Audit Information
FAU_SAR.3 Security Audit Review AU-7 Audit Reduction and Report Generation
AU-7(1) Audit Reduction and Report Generation
AU-7(2) Audit Reduction and Report Generation
FAU_SEL.1 Security Audit Event Selection AU-12 Audit Generation
FAU_STG.1 Security Audit Event Storage AU-9 Protection of Audit Information
FAU_STG.2 Security Audit Event Storage AU-9 Protection of Audit Information
FAU_STG.3 Security Audit Event Storage AU-5 Response to Audit Processing Failures
AU-5(1) Response to Audit Processing Failures
AU-5(2) Response To Audit Processing Failures
AU-5(4) Response To Audit Processing Failures
FAU_STG.4 Security Audit Event Storage AU-4 Audit Storage Capacity
AU-5 Response to Audit Processing Failures
AU-5(2) Response To Audit Processing Failures
AU-5(4) Response To Audit Processing Failures
FCO_NRO.1 Non-Repudiation of Origin AU-10 Non-Repudiation
AU-10(1) Non-Repudiation
AU-10(2) Non-Repudiation
FCO_NRO.2 Non-Repudiation of Origin AU-10 Non-Repudiation
AU-10(1) Non-Repudiation
AU-10(2) Non-Repudiation
FCO_NRR.1 Non-Repudiation of Receipt AU-10 Non-Repudiation
AU-10(1) Non-Repudiation
AU-10(2) Non-Repudiation
FCO_NRR.2 Non-Repudiation of Receipt AU-10 Non-Repudiation
AU-10(1) Non-Repudiation
AU-10(2) Non-Repudiation
FCS_CKM.1 Cryptographic Key Management SC-12 Cryptographic Key Establishment and Management
FCS_CKM.2 Cryptographic Key Management SC-12 Cryptographic Key Establishment and Management
FCS_CKM.3 Cryptographic Key Management SC-12 Cryptographic Key Establishment and Management
FCS_CKM.4 Cryptographic Key Management SC-12 Cryptographic Key Establishment and Management
FCS_COP.1 Cryptographic Operation SC-13 Cryptographic Protection
FDP_ACC.1 Access Control Policy AC-3 Access Enforcement
AC-3(3) Access Enforcement
AC-3(4) Access Enforcement
AC-3(7) Access Enforcement
FDP_ACC.2 Access Control Policy AC-3 Access Enforcement
AC-3(3) Access Enforcement
AC-3(4) Access Enforcement
AC-3(7) Access Enforcement
FDP_ACF.1 Access Control Functions AC-3 Access Enforcement
AC-3(3) Access Enforcement
AC-3(4) Access Enforcement
AC-3(7) Access Enforcement
AC-16 Security Attributes
SC-16 Transmission of Security Attributes
FDP_DAU.1 Data Authentication SI-7 Software, Firmware, and Information Integrity
SI-7(1) Software, Firmware, and Information Integrity
SI-7(6) Software, Firmware, And Information Integrity
SI-10 Information Input Validation
FDP_DAU.2 Data Authentication SI-7 Software, Firmware, and Information Integrity
SI-7(1) Software, Firmware, and Information Integrity
SI-7(6) Software, Firmware, And Information Integrity
SI-10 Information Input Validation
FDP_ETC.1 Export from the TOE No Mapping.
FDP_ETC.2 Export from the TOE AC-4(18) Information Flow Enforcement
AC-16 Security Attributes
AC-16(5) Security Attributes
SC-16 Transmission of Security Attributes
FDP_IFC.1 Information Flow Control Policy AC-3 Access Enforcement
AC-3(3) Access Enforcement
AC-4 Information Flow Enforcement
AC-4(1) Information Flow Enforcement
FDP_IFC.2 Information Flow Control Policy AC-3 Access Enforcement
AC-3(3) Access Enforcement
AC-4 Information Flow Enforcement
FDP_IFF.1 Information Flow Control Functions AC-3 Access Enforcement
AC-3(3) Access Enforcement
AC-4 Information Flow Enforcement
AC-4(1) Information Flow Enforcement
AC-4(2) Information Flow Enforcement
AC-4(7) Information Flow Enforcement
AC-16 Security Attributes
SC-7 Boundary Protection
FDP_IFF.2 Information Flow Control Functions AC-3 Access Enforcement
AC-3(3) Access Enforcement
AC-4(1) Information Flow Enforcement
AC-16 Security Attributes
FDP_IFF.3 Information Flow Control Functions SC-31 Covert Channel Analysis
SC-31(2) Covert Channel Analysis
FDP_IFF.4 Information Flow Control Functions SC-31 Covert Channel Analysis
SC-31(2) Covert Channel Analysis
FDP_IFF.5 Information Flow Control Functions SC-31 Covert Channel Analysis
SC-31(2) Covert Channel Analysis
FDP_IFF.6 Information Flow Control Functions SC-31 Covert Channel Analysis
SI-4(18) Information System Monitoring
FDP_ITC.1 Import from Outside of the TOE AC-4(9) Information Flow Enforcement
AC-4(12) Information Flow Enforcement
FDP_ITC.2 Import from Outside of the TOE AC-4(18) Information Flow Enforcement
AC-16 Security Attributes
SC-16 Transmission of Security Attributes
FDP_ITT.1 Internal TOE Transfer SC-8 Transmission Confidentiality and Integrity
SC-8(1) Transmission Confidentiality and Integrity
SC-5 Denial of Service Protection
FDP_ITT.2 Internal TOE Transfer SC-8 Transmission Confidentiality and Integrity
SC-8(1) Transmission Confidentiality and Integrity
SC-5 Denial of Service Protection
AC-4(21) Information Flow Enforcement
FDP_ITT.3 Internal TOE Transfer SI-7 Software, Firmware, and Information Integrity
SI-7(1) Software, Firmware, and Information Integrity
SC-8(1) Transmission Integrity
SI-7(5) Software, Firmware, and Information Integrity
FDP_ITT.4 Internal TOE Transfer SI-7 Software, Firmware, and Information Integrity
SI-7(1) Software, Firmware, and Information Integrity
SC-8(1) Transmission Integrity
AC-4(21) Information Flow Enforcement
SI-7(5) Software, Firmware, and Information Integrity
FDP_RIP.1 Residual Information Protection SC-4 Information in Shared Resources
FDP_RIP.2 Residual Information Protection SC-4 Information in Shared Resources
FDP_ROL.1 Rollback CP-10(2) Information System Recovery and Reconstitution
FDP_ROL.2 Rollback CP-10(2) Information System Recovery and Reconstitution
FDP_SDI.1 Stored Data Integrity SI-7 Software, Firmware, and Information Integrity
SI-7(1) Software, Firmware, and Information Integrity
FDP_SDI.2 Stored Data Integrity SI-7 Software, Firmware, and Information Integrity
SI-7(1) Software, Firmware, and Information Integrity
SI-7(5) Software, Firmware, and Information Integrity
FDP_UCT.1 Inter-TSF User Data Confidentiality Transfer Protection SC-8 Transmission Confidentiality and Integrity
SC-8(1) Transmission Confidentiality and Integrity
FDP_UIT.1 Inter-TSF User Data Integrity Transfer Protection SC-8 Transmission Confidentiality and Integrity
SC-8(1) Transmission Confidentiality and Integrity
SI-7 Software, Firmware, and Information Integrity
SI-7(6) Software, Firmware, and Information Integrity
FDP_UIT.2 Inter-TSF User Data Integrity Transfer Protection No Mapping.
FDP_UIT.3 Inter-TSF User Data Integrity Transfer Protection No Mapping.
FIA_AFL.1 Authentication Failure AC-7 Unsuccessful Logon Attempts
FIA_ATD.1 User Attribute Definition AC-2 Account Management
IA-2 Identification and Authentication (Organizational Users)
FIA_SOS.1 Specification of Secrets IA-5 Authenticator Management
IA-5(1) Authenticator Management
IA-5(12) Authenticator Management
FIA_SOS.2 Specification of Secrets IA-5 Authenticator Management
IA-5(1) Authenticator Management
IA-5(12) Authenticator Management
FIA_UAU.1 User Authentication AC-14 Permitted Actions without Identification or Authentication
IA-2 Identification and Authentication (Organizational Users)
IA-8 Identification and Authentication (Non-Organizational Users)
FIA_UAU.2 User Authentication AC-14 Permitted Actions without Identification or Authentication
IA-2 Identification and Authentication (Organizational Users)
IA-8 Identification and Authentication (Non-Organizational Users)
FIA_UAU.3 User Authentication IA-2(8) Identification and Authentication (Organizational Users)
IA-2(9) Identification and Authentication (Organizational Users)
FIA_UAU.4 User Authentication IA-2(8) Identification and Authentication (Organizational Users)
IA-2(9) Identification and Authentication (Organizational Users)
FIA_UAU.5 User Authentication IA-2(1) Identification and Authentication (Organizational Users)
IA-2(2) Identification and Authentication (Organizational Users)
IA-2(3) Identification and Authentication (Organizational Users)
IA-2(4) Identification and Authentication (Organizational Users)
IA-2(6) Identification and Authentication (Organizational Users)
IA-2(7) Identification and Authentication (Organizational Users)
IA-2(11) Identification and Authentication (Organizational Users)
FIA_UAU.6 User Authentication IA-11 Re-authentication
FIA_UAU.7 User Authentication IA-6 Authenticator Feedback
FIA_UID.1 User Identification AC-14 Permitted Actions without Identification or Authentication
IA-2 Identification and Authentication (Organizational Users)
IA-8 Identification and Authentication (Non-Organizational Users)
FIA_UID.2 User Identification AC-14 Permitted Actions without Identification or Authentication
IA-2 Identification and Authentication (Organizational Users)
IA-8 Identification and Authentication (Non-Organizational Users)
FIA_USB.1 User-Subject Binding AC-16(3) Security Attributes
FMT_MOF.1 Management of Functions in TSF AC-3(7) Access Enforcement
AC-6 Least Privilege
AC-6(1) Least Privilege
FMT_MSA.1 Management of Security Attributes AC-6 Least Privilege
AC-6(1) Least Privilege
AC-16(2) Security Attributes
AC-16(4) Security Attributes
AC-16(10) Security Attributes
FMT_MSA.2 Management of Security Attributes AC-16 Security Attributes
CM-6 Configuration Settings
SI-10 Information Input Validation
FMT_MSA.3 Management of Security Attributes No Mapping.
FMT_MSA.4 Management of Security Attributes No Mapping.
FMT_MTD.1 Management of TSF Data AC-3(7) Access Enforcement
AC-6 Least Privilege
AC-6(1) Least Privilege
AU-6(7) Audit Review, Analysis, and Reporting
AU-9(4) Protection of Audit Information
FMT_MTD.2 Management of TSF Data AC-3(7) Access Enforcement
AC-6 Least Privilege
AC-6(1) Least Privilege
FMT_MTD.3 Management of TSF Data SI-10 Information Input Validation
FMT_REV.1 Revocation AC-3(7) Access Enforcement
AC-3(8) Access Enforcement
AC-6 Least Privilege
AC-6(1) Least Privilege
FMT_SAE.1 Security Attribute Expiration AC-3(7) Access Enforcement
AC-6 Least Privilege
AC-6(1) Least Privilege
FMT_SMF.1 Specification of Management Functions No Mapping.
FMT_SMR.1 Security Management Roles AC-2(7) Account Management
AC-3(7) Access Enforcement
AC-5 Separation of Duties
AC-6 Least Privilege
FMT_SMR.2 Security Management Roles AC-2(7) Account Management
AC-3(7) Access Enforcement
AC-5 Separation of Duties
AC-6 Least Privilege
FMT_SMR.3 Security Management Roles AC-6(1) Least Privilege
AC-6(2) Least Privilege
FPR_ANO.1 Anonymity No Mapping.
FPR_ANO.2 Anonymity No Mapping.
FPR_PSE.1 Pseudonymity No Mapping.
FPR_PSE.2 Pseudonymity No Mapping.
FPR_PSE.3 Pseudonymity No Mapping.
FPR_UNL.1 Unlinkability No Mapping.
FPR_UNO.1 Unobservability No Mapping.
FPR_UNO.2 Unobservability No Mapping.
FPR_UNO.3 Unobservability No Mapping.
FPR_UNO.4 Unobservability No Mapping.
FPT_FLS.1 Fail Secure SC-7(18) Boundary Protection
SC-24 Fail in Known State
FPT_ITA.1 Availability of Exported TSF Data CP-10 Information System Recovery And Reconstitution
SC-5 Denial of Service Protection
SC-5(2) Denial of Service Protection
SC-5(3) Denial of Service Protection
FPT_ITC.1 Confidentiality of Exported TSF Data SC-8 Transmission Confidentiality and Integrity
SC-8(1) Transmission Confidentiality and Integrity
FPT_ITI.1 Integrity of Exported TSF Data SC-8 Transmission Confidentiality and Integrity
SC-8(1) Transmission Confidentiality and Integrity
SI-7 Software, Firmware, and Information Integrity
SI-7(1) Software, Firmware, and Information Integrity
SI-7(5) Software, Firmware, and Information Integrity
SI-7(6) Software, Firmware, and Information Integrity
FPT_ITI.2 Integrity of Exported TSF Data SC-8 Transmission Confidentiality and Integrity
SC-8(1) Transmission Confidentiality and Integrity
SI-7 Software, Firmware, and Information Integrity
SI-7(1) Software, Firmware, and Information Integrity
SI-7(5) Software, Firmware, and Information Integrity
SI-7(6) Software, Firmware, and Information Integrity
FPT_ITT.1 Internal TOE TSF Data Transfer SC-8 Transmission Confidentiality and Integrity
SC-8(1) Transmission Confidentiality and Integrity
FPT_ITT.2 Internal TOE TSF Data Transfer AC-4(21) Information Flow Enforcement
SC-8 Transmission Confidentiality and Integrity
SC-8(1) Transmission Confidentiality and Integrity
FPT_ITT.3 Internal TOE TSF Data Transfer SI-7 Software, Firmware, and Information Integrity
SI-7(1) Software, Firmware, and Information Integrity
SI-7(5) Software, Firmware, and Information Integrity
SI-7(6) Software, Firmware, and Information Integrity
FPT_PHP.1 TSF Physical Protection PE-3(5) Physical Access Control
PE-6(2) Monitoring Physical Access
SA-18 Tamper Resistance and Detection
FPT_PHP.2 TSF Physical Protection PE-3(5) Physical Access Control
PE-6(2) Monitoring Physical Access
SA-18 Tamper Resistance and Detection
FPT_PHP.3 TSF Physical Protection PE-3(5) Physical Access Control
SA-18 Tamper Resistance and Detection
FPT_RCV.1 Trusted Recovery CP-10 Information System Recovery and Reconstitution
CP-12 Safe Mode
FPT_RCV.2 Trusted Recovery CP-10 Information System Recovery and Reconstitution
CP-12 Safe Mode
FPT_RCV.3 Trusted Recovery CP-10 Information System Recovery and Reconstitution
CP-12 Safe Mode
FPT_RCV.4 Trusted Recovery SI-6 Security Function Verification
SI-10(3) Information Input Validation
SC-24 Fail in Known State
FPT_RPL.1 Replay Detection IA-2(8) Identification and Authentication (Organizational Users)
IA-2(9) Identification and Authentication (Organizational Users)
SC-23 Session Authenticity
SI-3(9) Malicious Code Protection
FPT_SSP.1 State Synchrony Protocol No Mapping.
FPT_SSP.2 State Synchrony Protocol No Mapping.
FPT_STM.1 Time Stamps AU-8 Time Stamps
FPT_TDC.1 Inter-TSF TSF Data Consistency AC-16(7) Security Attributes Consistent Attribute Interpretation
AC-16(8) Security Attributes
FPT_TEE.1 Testing of External Entities SI-6 Security Functionality Verification
FPT_TRC.1 Internal TOE TSF Data Replication Consistency SI-7 Software, Firmware, and Information Integrity
FPT_TST.1 TSF Self-Test SI-6 Security Functionality Verification
SI-7 Software, Firmware, and Information Integrity
FRU_FLT.1 Fault Tolerance AU-15 Alternate Audit Capability
CP-11 Alternate Communications Protocols
SC-24 Fail in Known State
SI-13 Predictable Failure Prevention
SI-13(1) Predictable Failure Prevention
SI-13(2) Predictable Failure Prevention
SI-13(3) Predictable Failure Prevention
SI-13(4) Predictable Failure Prevention
SI-13(5) Predictable Failure Prevention
FRU_FLT.2 Fault Tolerance AU-15 Alternate Audit Capability
CP-11 Alternate Communications Protocols
SC-24 Fail in Known State
SI-13 Predictable Failure Prevention
SI-13(1) Predictable Failure Prevention
SI-13(2) Predictable Failure Prevention
SI-13(3) Predictable Failure Prevention
SI-13(4) Predictable Failure Prevention
SI-13(5) Predictable Failure Prevention
FRU_PRS.1 Priority of Service SC-6 Resource Availability
FRU_PRS.2 Priority of Service SC-6 Resource Availability
FRU_RSA.1 Resource Allocation SC-6 Resource Availability
FRU_RSA.2 Resource Allocation SC-6 Resource Availability
FTA_LSA.1 Limitation on Scope of Selectable Attributes AC-2(6) Account Management
AC-2(11) Account Management
FTA_MCS.1 Limitation on Multiple Concurrent Sessions AC-10 Concurrent Session Control
FTA_MCS.2 Limitation on Multiple Concurrent Sessions AC-10 Concurrent Session Control
FTA_SSL.1 Session Locking and Termination AC-11 Session Lock
AC-11(1) Session Lock
FTA_SSL.2 Session Locking and Termination AC-11 Session Lock
AC-11(1) Session Lock
FTA_SSL.3 Session Locking and Termination AC-12 Session Termination
SC-10 Network Disconnect
FTA_SSL.4 Session Locking and Termination AC-12(1) Session Termination
FTA_TAB.1 TOE Access Banners AC-8 System Use Notification
FTA_TAH.1 TOE Access History AC-9 Previous Login (Access) Notification
AC-9(1) Previous Login (Access) Notification
FTA_TSE.1 TOE Session Establishment AC-2(11) Account Management
FTP_ITC.1 Inter-TSF Trusted Channel IA-3(1) Device Identification and Authentication
SC-8 Transmission Confidentiality and Integrity
SC-8(1) Transmission Confidentiality and Integrity
FTP_TRP.1 Trusted Path SC-11 Trusted Path
Assurance Requirements
ASE_INT.1 ST Introduction SA-4 Acquisition Process
ASE_CCL.1 Conformance Claims PL-2 System Security Plan
SA-4(7) Acquisition Process
ASE_SPD.1 Security Problem Definition PL-2 System Security Plan
SA-4 Acquisition Process
ASE_OBJ.1 Security Objectives PL-2 System Security Plan
SA-4 Acquisition Process
ASE_OBJ.2 Security Objectives PL-2 System Security Plan
SA-4 Acquisition Process
ASE_ECD.1 Extended Components Definition No Mapping.
ASE_REQ.1 Security Requirements PL-2 System Security Plan
SA-4 Acquisition Process
ASE_REQ.2 Security Requirements PL-2 System Security Plan
SA-4 Acquisition Process
ASE_TSS.1 TOE Summary Specification PL-2 System Security Plan
SA-4(1) Acquisition Process
ASE_TSS.2 TOE Summary Specification PL-2 System Security Plan
SA-4(1) Acquisition Process
SA-4(2) Acquisition Process
SA-17 Developer Security Architecture and Design
ADV_ARC.1 Security Architecture AC-25 Reference Monitor
SA-17 Developer Security Architecture and Design
SA-18 Tamper Resistance and Detection
SC-3 Security Function Isolation
SC-3(1) Security Function Isolation
SC-3(2) Security Function Isolation
SC-41 Process Isolation
ADV_FSP.1 Functional Specification SA-4(1) Acquisition Process
SA-4(2) Acquisition Process
ADV_FSP.2 Functional Specification SA-4(1) Acquisition Process
SA-4(2) Acquisition Process
SA-17(4) Developer Security Architecture and Design
ADV_FSP.3 Functional Specification SA-4(1) Acquisition Process
SA-4(2) Acquisition Process
SA-17(4) Developer Security Architecture and Design
ADV_FSP.4 Functional Specification SA-4(1) Acquisition Process
SA-4(2) Acquisition Process
SA-17(4) Developer Security Architecture and Design
ADV_FSP.5 Functional Specification SA-4(1) Acquisition Process
SA-4(2) Acquisition Process
SA-17(4) Developer Security Architecture and Design
ADV_FSP.6 Functional Specification SA-4(1) Acquisition Process
SA-4(2) Acquisition Process
SA-17(3) Developer Security Architecture and Design
SA-17(4) Developer Security Architecture and Design
ADV_IMP.1 Implementation Representation SA-4(2) Acquisition Process
ADV_IMP.2 Implementation Representation SA-4(2) Acquisition Process
SA-17(3) Developer Security Architecture and Design
ADV_INT.1 TSF Internals SA-8 Security Engineering Principles
SC-3(3) Security Function Isolation
SC-3(4) Security Function Isolation
SC-3(5) Security Function Isolation
ADV_INT.2 TSF Internals SA-8 Security Engineering Principles
SC-3(3) Security Function Isolation
SC-3(4) Security Function Isolation
SC-3(5) Security Function Isolation
ADV_INT.3 TSF Internals SA-8 Security Engineering Principles
SA-17(5) Developer Security Architecture and Design
SC-3(3) Security Function Isolation
SC-3(4) Security Function Isolation
SC-3(5) Security Function Isolation
AC-25 Reference Monitor
ADV_SPM.1 Security Policy Modeling SA-17(1) Developer Security Architecture and Design
SA-17(3) Developer Security Architecture and Design
ADV_TDS.1 TOE Design SA-4(2) Acquisition Process
SA-17 Developer Security Architecture and Design
ADV_TDS.2 TOE Design SA-4(2) Acquisition Process
SA-17 Developer Security Architecture and Design
ADV_TDS.3 TOE Design SA-4(2) Acquisition Process
SA-17 Developer Security Architecture and Design
ADV_TDS.4 TOE Design SA-4(2) Acquisition Process
SA-17 Developer Security Architecture and Design
SA-17(2) Developer Security Architecture and Design
SA-17(4) Developer Security Architecture and Design
ADV_TDS.5 TOE Design SA-4(2) Acquisition Process
SA-17 Developer Security Architecture and Design
SA-17(2) Developer Security Architecture and Design
SA-17(4) Developer Security Architecture and Design
ADV_TDS.6 TOE Design SA-4(2) Acquisition Process
SA-17 Developer Security Architecture and Design
SA-17(2) Developer Security Architecture and Design
SA-17(3) Developer Security Architecture and Design
SA-17(4) Developer Security Architecture and Design
AGD_OPE.1 Operational User Guidance SA-5 Information System Documentation
AGD_PRE.1 Preparative Procedures SA-5 Information System Documentation
ALC_CMC.1 CM Capabilities CM-9 Configuration Management Plan
SA-10 Developer Configuration Management
ALC_CMC.2 CM Capabilities CM-9 Configuration Management Plan
SA-10 Developer Configuration Management
ALC_CMC.3 CM Capabilities CM-3 Configuration Change Control
CM-9 Configuration Management Plan
SA-10 Developer Configuration Management
ALC_CMC.4 CM Capabilities CM-3 Configuration Change Control
CM-3(1) Configuration Change Control
CM-3(3) Configuration Change Control
CM-9 Configuration Management Plan
SA-10 Developer Configuration Management
ALC_CMC.5 CM Capabilities CM-3 Configuration Change Control
CM-3(1) Configuration Change Control
CM-3(2) Configuration Change Control
CM-3(3) Configuration Change Control
CM-9 Configuration Management Plan
SA-10 Developer Configuration Management
ALC_CMS.1 CM Scope CM-9 Configuration Management Plan
SA-10 Developer Configuration Management
ALC_CMS.2 CM Scope CM-9 Configuration Management Plan
SA-10 Developer Configuration Management
ALC_CMS.3 CM Scope CM-9 Configuration Management Plan
SA-10 Developer Configuration Management
ALC_CMS.4 CM Scope CM-9 Configuration Management Plan
SA-10 Developer Configuration Management
ALC_CMS.5 CM Scope CM-9 Configuration Management Plan
SA-10 Developer Configuration Management
ALC_DEL.1 Delivery MP-5 Media Transport
SA-10(1) Developer Configuration Management
SA-10(6) Developer Configuration Management
SA-18 Tamper Resistance and Detection
SA-19 Component Authenticity
ALC_DVS.1 Development Security SA-1 System and Services Acquisition Policy and Procedures
SA-3 System Development Lifecycle
SA-12 Supply Chain Protection
ALC_DVS.2 Development Security CM-5 Access Restrictions for Change
SA-3 System Development Lifecycle
SA-12 Supply Chain Protection
ALC_FLR.1 Flaw Remediation SA-10 Developer Configuration Management
SA-11 Developer Security Testing / Evaluation
SI-2 Flaw Remediation
ALC_FLR.2 Flaw Remediation SA-10 Developer Configuration Management
SA-11 Developer Security Testing / Evaluation
SI-2 Flaw Remediation
ALC_FLR.3 Flaw Remediation SA-10 Developer Configuration Management
SA-11 Developer Security Testing / Evaluation
SI-2 Flaw Remediation
ALC_LCD.1 Life-Cycle Definition SA-3 System Development Life Cycle
SA-15 Development Process, Standards, and Tools
ALC_LCD.2 Life-Cycle Definition SA-3 System Development Life Cycle
SA-15 Development Process, Standards, and Tools
ALC_TAT.1 Tools and Techniques SA-15 Development Process, Standards, and Tools
ALC_TAT.2 Tools and Techniques SA-15 Development Process, Standards, and Tools
ALC_TAT.3 Tools and Techniques SA-15 Development Process, Standards, and Tools
ATE_COV.1 Coverage SA-11 Developer Security Testing and Evaluation
SA-11(7) Developer Security Testing and Evaluation Verify Scope of Testing / Evaluation
ATE_COV.2 Coverage SA-11 Developer Security Testing and Evaluation
SA-11(7) Developer Security Testing and Evaluation Verify Scope of Testing / Evaluation
ATE_COV.3 Coverage SA-11 Developer Security Testing and Evaluation
SA-11(7) Developer Security Testing and Evaluation Verify Scope of Testing / Evaluation
ATE_DPT.1 Depth SA-11 Developer Security Testing and Evaluation
SA-11(7) Developer Security Testing and Evaluation Verify Scope of Testing / Evaluation
ATE_DPT.2 Depth SA-11 Developer Security Testing and Evaluation
SA-11(7) Developer Security Testing and Evaluation Verify Scope of Testing / Evaluation
ATE_DPT.3 Depth SA-11 Developer Security Testing and Evaluation
SA-11(7) Developer Security Testing and Evaluation Verify Scope of Testing / Evaluation
ATE_DPT.4 Depth SA-11 Developer Security Testing and Evaluation
SA-11(7) Developer Security Testing and Evaluation Verify Scope of Testing / Evaluation
ATE_FUN.1 Functional Tests SA-11 Developer Security Testing and Evaluation
ATE_FUN.2 Functional Tests SA-11 Developer Security Testing and Evaluation
ATE_IND.1 Independent Testing CA-2 Security Assessments
CA-2(1) Security Assessments
SA-11(3) Developer Security Testing and Evaluation Independent Verification of Assessment Plans / Evidence
ATE_IND.2 Independent Testing CA-2 Security Assessments
CA-2(1) Security Assessments
SA-11(3) Developer Security Testing and Evaluation Independent Verification of Assessment Plans / Evidence
ATE_IND.3 Independent Testing CA-2 Security Assessments
CA-2(1) Security Assessments
SA-11(3) Developer Security Testing and Evaluation Independent Verification of Assessment Plans / Evidence
AVA_VAN.1 Vulnerability Analysis CA-2(2) Security Assessments
CA-8 Penetration Testing
RA-3 Risk Assessment
SA-11(2) Developer Security Testing and Evaluation Threat And Vulnerability Analyses / Flaw Remediation
SA-11(5) Developer Security Testing and Evaluation Penetration Testing
AVA_VAN.2 Vulnerability Analysis CA-2(2) Security Assessments
CA-8 Penetration Testing
RA-3 Risk Assessment
SA-11(2) Developer Security Testing and Evaluation Threat And Vulnerability Analyses / Flaw Remediation
SA-11(5) Developer Security Testing and Evaluation Penetration Testing
AVA_VAN.3 Vulnerability Analysis CA-2(2) Security Assessments
CA-8 Penetration Testing
RA-3 Risk Assessment
SA-11( 2) Developer Security Testing and Evaluation Threat And Vulnerability Analyses / Flaw Remediation
SA-11(5) Developer Security Testing and Evaluation Penetration Testing
AVA_VAN.4 Vulnerability Analysis CA-2(2) Security Assessments
CA-8 Penetration Testing
RA-3 Risk Assessment
SA-11(2) Developer Security Testing and Evaluation Threat And Vulnerability Analyses / Flaw Remediation
SA-11(5) Developer Security Testing and Evaluation Penetration Testing
AVA_VAN.5 Vulnerability Analysis CA-2(2) Security Assessments
CA-8 Penetration Testing
RA-3 Risk Assessment
SA-11(2) Developer Security Testing and Evaluation Threat And Vulnerability Analyses / Flaw Remediation
SA-11(5) Developer Security Testing and Evaluation Penetration Testing
ACO_COR.1 Composition Rationale SA-17 Developer Security Architecture and Design
ACO_DEV.1 Development Evidence SA-17 Developer Security Architecture and Design
ACO_DEV.2 Development Evidence SA-17 Developer Security Architecture and Design
ACO_DEV.3 Development Evidence SA-17 Developer Security Architecture and Design
ACO_REL.1 Reliance on Dependent Component SA-17 Developer Security Architecture and Design
ACO_REL.2 Reliance on Dependent Component SA-17 Developer Security Architecture and Design
ACO_CTT.1 Composed TOE Testing SA-11 Developer Security Testing and Evaluation
ACO_CTT.2 Composed TOE Testing SA-11 Developer Security Testing and Evaluation
ACO_VUL.1 Composition Vulnerability Analysis CA-2 Security Assessments
CA-8 Penetration Testing
RA-3 Risk Assessment
SA-11 Developer Security Testing and Evaluation
ACO_VUL.2 Composition Vulnerability Analysis CA-2 Security Assessments
CA-8 Penetration Testing
RA-3 Risk Assessment
SA-11 Developer Security Testing and Evaluation
ACO_VUL.3 Composition Vulnerability Analysis CA-2 Security Assessments
CA-8 Penetration Testing
RA-3 Risk Assessment
SA-11 Developer Security Testing and Evaluation

appendix i

113. ISO/IEC 27001 was published in October 2013 by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC).
114. ISO/IEC 15408 was published in September 2012 by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC).
115. The use of the term XX-1 controls in mapping Table H-2 refers to the set of security controls represented by the first control in each family in Appendix F, where XX is a placeholder for the two-letter family identifier.

results matching ""

    No results matching ""