<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Analysis and Comparison of the NIST SP 800-53 and ISO/IEC 27001:2013</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Yevhenii</forename><surname>Kurii</surname></persName>
							<email>yevhenii.o.kurii@lpnu.ua</email>
							<affiliation key="aff0">
								<orgName type="institution">Lviv Polytechnic National University</orgName>
								<address>
									<addrLine>12 Stepan Bandera str</addrLine>
									<postCode>79000</postCode>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Ivan</forename><surname>Opirskyy</surname></persName>
							<email>ivan.r.opirskyi@lpnu.ua</email>
							<affiliation key="aff0">
								<orgName type="institution">Lviv Polytechnic National University</orgName>
								<address>
									<addrLine>12 Stepan Bandera str</addrLine>
									<postCode>79000</postCode>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff1">
								<orgName type="department">Cybersecurity Providing in Information and Telecommunication Systems</orgName>
								<address>
									<addrLine>October 13</addrLine>
									<postCode>2022</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Analysis and Comparison of the NIST SP 800-53 and ISO/IEC 27001:2013</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">57D92D3B7B2E14D5B45C7BFB5F5A562A</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-24T18:43+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Information security</term>
					<term>cybersecurity framework</term>
					<term>security controls</term>
					<term>information security management system</term>
					<term>ISMS</term>
					<term>ISO 27001</term>
					<term>NIST 800-53</term>
					<term>controls mapping AC-5 Separation of Duties A.6.1.2 AC-6 Least Privilege A.9.1.2</term>
					<term>A.9.2.3</term>
					<term>A.9.4.4</term>
					<term>A.9.4.5 AC-7 Unsuccessful Logon Attempts A.9.4.2 AC-8 System Use Notification A.9.4.2 AC-9 Previous Logon Notification A.9.4.2 AC-10 Concurrent Session Control None Confidentiality</term>
					<term>Integrity AC-11 Device Lock A.11.2.8</term>
					<term>A.11.2.9 AC-12 Session Termination None Confidentiality</term>
					<term>Integrity AC-13 Withdrawn ---AC-14 Permitted Actions without Identification or Authentication None Confidentiality</term>
					<term>Integrity AC-15 Withdrawn ---AC-16 Security and Privacy Attributes None Confidentiality</term>
					<term>Integrity AC-17 Remote Access A.6.2.1</term>
					<term>A.6.2.2</term>
					<term>A.13.1.1</term>
					<term>A.13.2.1</term>
					<term>A.14.1.2 AC-18 Wireless Access A.6.2.1</term>
					<term>A.13.1.1</term>
					<term>A.13.2.1 AC-19 Access Control for Mobile Devices A.6.2.1</term>
					<term>A.11.1.5</term>
					<term>A.11.2.6</term>
					<term>A.13.2.1 AC-20 Use of External Systems A.11.2.6</term>
					<term>A.13.1.1</term>
					<term>A.13.2.1 AC-21 Information Sharing None Confidentiality 5.2</term>
					<term>5.3</term>
					<term>7.5.1</term>
					<term>7.5.2</term>
					<term>7.5.3</term>
					<term>A.5.1.1</term>
					<term>A.5.1.2</term>
					<term>A.6.1.1</term>
					<term>A.12.1.1</term>
					<term>A.18.1.1</term>
					<term>A.18.2.2 AT-2 Literacy Training and Awareness 7.3</term>
					<term>A.7.2.2</term>
					<term>A.12.2.1 AT-3 Role-Based Training A.7.2.2*</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Managing information security in the organization may be a daunting task, especially considering that it may encompass many areas from physical and network security to human resources security and management of suppliers. This may be especially hard for young specialists or not experienced enough specialists, who may miss some important areas due to lack of practical experience. This is where security frameworks come in handy and put formality into the process of the design and implementation of the security strategy. With a framework in place, it becomes much easier to define the processes and procedures that your organization must take to assess, monitor, and mitigate cybersecurity risk and apply proper controls to protect valuable information. But another problem came up when you are to choose the "just right" framework for your organization taking into account more business-specific characteristics like the context of the organization, area of operation, applicable laws, regulations and contractual obligations, as well as more general ones like framework's maturity, comprehensiveness or popularity. While there are a bunch of different information security frameworks out in the wild, the most commonly-found and preferred by security professionals worldwide are NIST SP 800-53 and ISO/IEC 27001:2013. They combine both the quite comprehensive set of security controls to cover the most important security areas and wide applicability which allows applying these frameworks to all kinds of organizations. But they also have a set of distinct features, that define their relevance to the particular organization. The article is aimed at giving a brief overview of these two most popular security frameworks as well as describing their key characteristics and providing a comparison of their controls.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>To successfully achieve the objectives of implementing cybersecurity at different levels, a range of procedures and standards should be followed. Cybersecurity standards determine the requirements that an organization should follow to achieve cybersecurity objectives and facilitate against cybercrimes <ref type="bibr" target="#b0">[1]</ref> and ensure the ongoing management of information security controls.</p><p>Additionally, the framework establishes a common language for defining a cybersecurity program, enabling organizations to set risk-based cybersecurity goals at the executive level that can be translated to the operations team <ref type="bibr" target="#b1">[2]</ref>.</p><p>These frameworks are a blueprint for managing and reducing organizational risk. Information security professionals use frameworks to define and prioritize the tasks required to manage the organization's security program. Frameworks are also used to help prepare for compliance and other IT and security audits. When you are choosing from the number of leading information security frameworks, you would primarily assess the number of unique information security controls (requirements) in each of them <ref type="bibr" target="#b2">[3]</ref><ref type="bibr" target="#b3">[4]</ref><ref type="bibr" target="#b5">[5]</ref>. The volume of these controls directly impacts the number of domains covered by that framework. The lesser number of controls in a framework might make it easier to implement, but it also might not provide the necessary coverage that your organization needs from the perspective of administrative, technical, and physical information security practices <ref type="bibr" target="#b6">[6]</ref>.</p><p>This is where defining the applicable and relevant framework is primarily a business decision <ref type="bibr" target="#b7">[7]</ref>, based on your organization's context and risk profile, which needs to consider applicable laws and regulations, that are required to support existing or planned business processes.</p><p>Commonly, this selection process generally leads to adopting one of the following frameworks:  ISO 27001/002 <ref type="bibr" target="#b8">[8,</ref><ref type="bibr" target="#b9">9]</ref>  NIST Special Publication 800-53 <ref type="bibr" target="#b10">[10]</ref>  NIST Cybersecurity Framework <ref type="bibr" target="#b11">[11]</ref>  PCI DSS <ref type="bibr" target="#b12">[12]</ref>  CIS Controls <ref type="bibr" target="#b13">[13,</ref><ref type="bibr" target="#b14">14]</ref>  HITRUST Common Security Framework [15]  HIPAA <ref type="bibr" target="#b15">[16]</ref>  CSA CCM <ref type="bibr" target="#b16">[17]</ref>  GDPR <ref type="bibr" target="#b17">[18]</ref>  ISO 27701 <ref type="bibr" target="#b18">[19]</ref>  AICPA Trust Services Criteria (SOC 2) <ref type="bibr" target="#b19">[20]</ref>  COBIT <ref type="bibr" target="#b20">[21]</ref> Each information security framework has its own unique specialization and depth of coverage. However, understanding this can help you make an informed decision on the most appropriate framework for your needs. <ref type="bibr" target="#b21">[22,</ref><ref type="bibr" target="#b22">23]</ref> You may even find you need to leverage a metaframework (e.g., the framework of frameworks) to address more complex compliance requirements (e.g., when the organization is holding the personal data of EU citizens and process cardholder data, it should comply with both GDPR and PCI DSS requirements).</p><p>A key consideration for choosing an information security framework would be understanding the level of content and robustness each framework offers. This will directly impact the available information security controls within each framework <ref type="bibr" target="#b23">[24]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Overview and Comparison between NIST SP 800-53 and ISO/IEC 27001:2013</head><p>The Special Publication (SP) 800-53 Security and Privacy Controls for Information Systems and Organizations from the National Institute of Standards and Technology (NIST) is currently in its 5th revision (rev5) dated September 2020. It was initially designed to protect the US federal government, but quickly gained popularity among private industry and now is considered as one of the most popular and respectable information security frameworks in the world. It was partially caused due to the significant outsourcing to private companies that do business with the US federal government.</p><p>According to the official web page of the standard "This publication [Special Publication (SP) 800-53] provides a catalog of security and privacy controls for information systems and SO 27001 is a well-respected international information security standard that outlines the key processes and approaches a business needs to manage information security risk in a practical way <ref type="bibr" target="#b24">[26]</ref>. ISO 27001 consists of the main part and Annex A, that contains the basic overview of the security controls needed to build an Information Security Management System (ISMS). Additionally, there is a separate standard ISO 27002 that provides a detailed description of the specific controls that are necessary to actually implement ISO 27001 (essentially, you can't meet ISO 27001 without implementing ISO 27002). <ref type="bibr" target="#b25">[27,</ref><ref type="bibr">28]</ref>. The important thing about ISO is that it provides the companies with the possibility to undergo an external audit and get certified against ISO 27001.  As may be seen from the table there is an overlapping between the controls from ISO and NIST frameworks. But the most important specifics of these frameworks is that NIST 800-53 can be considered a super-set of ISO 27001. In particular, all the controls from ISO 27001 can be covered by NIST 800-53. However, ISO 27001 does not cover all of the areas of NIST 800-53. From the coverage perspective, NIST 800-53 is more comprehensive and contains much more areas and controls than ISO 27001. While the detailed analysis of the missing controls is out of the scope of this investigation let's take a look at a few examples which would show in which areas NIST, in contrast to ISO, provide more comprehensive coverage of the security-related areas.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.1.">Detailed Mapping of Controls</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>[AT-4 Training Records], [AT-6 Training</head><p>Feedback]. These two controls require the organization to document and monitor information security and privacy training activities, including security and privacy awareness training and specific role-based security and privacy training, retain individual training records, and gather feedback on organizational training results <ref type="bibr" target="#b10">[10]</ref>. These could be important indicators of the awareness process effectiveness in the organization. These controls very often are audited by auditors during the ISO 27001 certification process; however, they are not explicitly mentioned in ISO 27001.</p><p>[CM-2 Baseline Configuration], [CM-6 Configuration Settings]. These controls force organizations to develop, document, and maintain under configuration control, a current baseline configuration of the system, and configuration settings for components. Baseline configurations for systems and system components include connectivity, operational, and communications aspects of systems. Baseline configurations are documented, formally reviewed, and agreed-upon specifications for systems or configuration items within those systems. Baseline configurations serve as a basis for future builds, releases, or changes to systems and include security and privacy control implementations, operational procedures, information about system components, network topology, and logical placement of components in the system architecture <ref type="bibr" target="#b10">[10]</ref>. These controls are important for maintaining the integrity of the security configurations for the systems and components and ensuring the standard configuration for the infrastructure systems and components. Again, these aspects are not explicitly highlighted in the ISO 27001 but commonly are checked during the ISO certification process.</p><p>[PE-6 Monitoring Physical Access], [PE-8 Visitor Access Records]. NIST 800-53 requires from organizations to monitor physical access to the facility where the system resides to detect and respond to physical security incidents and to maintain and periodically review visitor access records to the facility where the system resides <ref type="bibr" target="#b10">[10]</ref>. These are other examples of controls that are extremely relevant for the protection of the organization's assets. They are especially important for small representative offices that often are lacking baseline security controls established within headquarters and are also quite often emphasized during the ISO certification audits. Nevertheless, they have been overlooked for a quite long time until the issue of the revised version of the ISO 27002 earlier this year (so they should appear in the new version of the ISO 27001 as well).</p><p>[RA-10 Threat Hunting]. Threat hunting is an active means of cyber defense in contrast to traditional protection measures, such as firewalls, intrusion detection and prevention systems, quarantining malicious code in sandboxes, and Security Information and Event Management technologies and systems. Cyber threat hunting involves proactively searching organizational systems, networks, and infrastructure for advanced threats. The objective is to track and disrupt cyber adversaries as early as possible in the attack sequence and to measurably improve the speed and accuracy of organizational responses. <ref type="bibr" target="#b10">[10]</ref>. Likewise the previous controls, this one has been also overlooked by the ISO 27001 publications, despite its extreme importance and relevance for the organizations. This inconsistency should be partially eliminated with the new version of the ISO 27001 standard -this year's revised version of ISO 27002 already contains a new control defining requirements for threat intelligence which is an integral part of the threat hunting process.</p><p>[</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>PM-18 Privacy Program Plan], [PT-1 Personally Identifiable Information Processing and Transparency Policy and Procedures], [PT-2 Authority to Process Personally Identifiable Information], [PT-4 Consent], [PT-5</head><p>Privacy Notice] and other controls related to the protection of personally identifiable information (PII) processing. The defining characteristic of the NIST 800-53 is that it contains a set of controls to address privacy requirements for the processing of PII while ISO 27001 does not specifically address privacy beyond the inherent benefits provided by maintaining the security of PII, therefore we can assume that the ISO 27001 controls do not satisfy privacy requirements with respect to PII processing <ref type="bibr" target="#b26">[29]</ref>. From this perspective, NIST has an advantage over ISO 27001 in regard to the protection of the PII processing and may be considered a good basis for GDPR compliance.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Conclusion</head><p>Understanding both the differences and similarities between these two the most known and adopted security frameworks-ISO 27001 and NIST 800-53 is crucial for implementing an effective information security program that would be tightened to the organization's context and needs and expectations of interested parties.</p><p>A common misunderstanding is that companies have to pick one or the other framework and stick with it, or that one is better than the other. In fact, both frameworks can be applied to a single organization due to their synergy and can greatly increase its information security, risk management, and security program.</p><p>It is not always necessary to choose between NIST 800-53 and ISO 27001. In fact, the two are complementary and can be used the same organization. However, if certification is your goal, you should definitely look closer at ISO 27001. Being externally audited and achieving accredited certification against ISO 27001's requirements would likely provide a higher level of confidence among clients and stakeholders and would be a prerequisite for securing certain contracts. Accredited certification to ISO 27001 demonstrates that your organization follows information security best practices, and delivers an independent, expert assessment of whether your valuable information and information assets are adequately protected. At the same time, while implementing the ISO 27001 requirements you still can leverage NIST 800-53 to strengthen the areas that are missing or not sufficiently covered in the ISO.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Figure 1 :</head><label>1</label><figDesc>Figure 1: Information security frameworks based on their specialization and coverage</figDesc><graphic coords="2,86.20,72.00,381.10,214.35" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head>Table 1</head><label>1</label><figDesc>Key differences between NIST SP 800-53 to ISO 27001</figDesc><table><row><cell></cell><cell></cell><cell></cell><cell>organizations to protect organizational operations</cell></row><row><cell></cell><cell></cell><cell></cell><cell>and assets, individuals, other organizations, and</cell></row><row><cell></cell><cell></cell><cell></cell><cell>the Nation from a diverse set of threats and risks,</cell></row><row><cell></cell><cell>NIST A recognized framework that</cell><cell>ISO</cell><cell>including hostile attacks, human errors, natural disasters, structural failures, foreign intelligence entities, and privacy risks" [25].</cell></row><row><cell>Description</cell><cell>contains security and privacy controls for information systems and organizations to protect organizational operations and assets with aim</cell><cell>An internationally recognized standard that describes how to manage information security in an organization</cell></row><row><cell></cell><cell>to effectively</cell><cell></cell></row><row><cell></cell><cell>manage risk</cell><cell></cell></row><row><cell></cell><cell></cell><cell>Can be</cell></row><row><cell></cell><cell></cell><cell>implemented</cell></row><row><cell>Target organizations</cell><cell>Was primarily created to help US federal agencies</cell><cell>in any kind of organization, profit or non-profit, private or state-</cell></row><row><cell></cell><cell></cell><cell>owned, small</cell></row><row><cell></cell><cell></cell><cell>or large</cell></row><row><cell>Structure</cell><cell>Contains 1007 controls broken down into 20 control families</cell><cell>Annex A provides 14 control categories with 114 controls</cell></row><row><cell></cell><cell></cell><cell>Is less</cell></row><row><cell></cell><cell></cell><cell>technical, with</cell></row><row><cell></cell><cell>Is very detailed</cell><cell>more emphasis</cell></row><row><cell>Complexity</cell><cell>and technical in</cell><cell>on risk-based</cell></row><row><cell></cell><cell>its nature</cell><cell>approach to</cell></row><row><cell></cell><cell></cell><cell>managing</cell></row><row><cell></cell><cell></cell><cell>security</cell></row><row><cell></cell><cell></cell><cell>Enables</cell></row><row><cell></cell><cell></cell><cell>companies to</cell></row><row><cell>Certification</cell><cell>Is voluntary and relies on self-assessment and self-compliance</cell><cell>become certified, relies on independent audit and</cell></row><row><cell></cell><cell></cell><cell>certification</cell></row><row><cell></cell><cell></cell><cell>bodies</cell></row><row><cell>Availability</cell><cell>Can be freely downloaded from official source</cell><cell>Distributed on the commercial basis through the official website</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_1"><head>Table 2</head><label>2</label><figDesc>provides a mapping from the security controls in NIST Special Publication 800-53 to the security controls in ISO/IEC 27001:2013<ref type="bibr" target="#b26">[29]</ref>.</figDesc><table /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_2"><head>Table 2</head><label>2</label><figDesc>Mapping NIST SP 800-53 to ISO 27001</figDesc><table /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_3"><head>NIST SP 800-53 CONTROLS ISO/IEC 27001 CONTROLS</head><label></label><figDesc></figDesc><table><row><cell>PM-2</cell><cell>Information Security Program Leadership</cell><cell>5.2, 5.3, 7.5.1, 7.5.2, 7.5.3, 5.1, 5.3, A.6.1.1</cell><cell></cell><cell>CP-11 PM-26</cell><cell>Alternate Communications Complaint Management</cell><cell>5.2, 5.3, 7.5.1, 7.5.2, 7.5.3, A.17.1.2* None</cell><cell>Confidentiality, Integrity, Availability</cell></row><row><cell cols="3">AT-4 Training Records AT-5 Withdrawn AT-6 Training Feedback CM-1 Configuration Management Policy and Procedures Role Information Security CM-2 Baseline Configuration CM-3 Configuration Change Control PM-3 and Privacy Resources PM-4 Plan of Action and Milestones Process PM-5 System Inventory CM-4 Impact Analyses CM-5 Access Restrictions for Change CM-6 Configuration Settings CM-7 Least Functionality CM-8 System Component Inventory CM-9 Configuration Management Plan CM-10 Software Usage Restrictions CM-11 User-Installed Software CM-12 Information Location None None ---None A.5.1.1, A.5.1.2, A.6.1.1, A.12.1.1, A.18.1.1, A.18.2.2 None 8.1, A.12.1.2, 5.1, 6.2, 7.1 6.1.1, 6.2, 7.5.1, 7.5.2, 7.5.3, 8.3, 9.2, 9.3, 10.1 None A.14.2.2, A.14.2.3, A.14.2.4 A.14.2.3 A.9.2.3, A.9.4.5, A.12.1.2, A.12.1.4, A.12.5.1 None A.12.5.1* A.8.1.1, A.8.1.2 A.6.1.1* A.18.1.2 A.12.5.1, A.12.6.2 CM-13 Data Action Mapping None CM-14 Signed Components None CP-1 Contingency Planning Policy and Procedures 7.5.2, 7.5.3, A.5.1.1, A.5.1.2, A.6.1.1, A.12.1.1, A.18.1.1, A.18.2.2 CP-2 Contingency Plan 7.5.1, 7.5.2, 7.5.3, A.6.1.1, A.17.1.1, A.17.2.1 CP-3 Contingency Training A.7.2.2* CP-4 Contingency Plan Testing A.17.1.3 CP-5 Withdrawn CP-6 Alternate Storage Site A.11.1.4, A.17.1.2, CP-7 Alternate Processing Site A.11.1.4, A.17.2.1 CP-8 Telecommunications Services A.11.2.2, A.17.1.2 CP-9 System Backup A.12.3.1, A.17.1.2, CP-10 System Recovery and Reconstitution A.17.1.2 Research Testing, Training, and A.18.1.3 PM-25 Identifiable Information Used in None Personally Minimization of PM-24 Data Integrity Board None A.17.1.2, PM-23 Data Governance Body None A.17.2.1 Management PM-22 Identifiable Information Quality None ---Personally PM-21 Accounting of Disclosures None PM-20 Privacy Program Information None Dissemination of PM-19 Privacy Program Leadership Role None PM-18 Privacy Program Plan None External Systems PM-17 Information on None Unclassified Protecting Controlled 5.2, 5.3, 7.5.1, PM-16 Threat Awareness Program None Associations 15 Groups and 7.4, A.6.1.4 PM-Security and Privacy PM-6 Measures of Performance 5.3, 6.1.1, 6.2, 9.1, PM-7 Enterprise Architecture None PM-14 Monitoring 6.2* Testing, Training, and PM-13 Workforce 7.2, A.7.2.2* Security and Privacy PM-12 Insider Threat Program None PM-11 Process Definition 4.1 Mission and Business PM-10 Process 9.3, A.6.1.1* Authorization 10.2 PM-8 Critical Infrastructure None Plan PM-9 Risk Management Strategy 4.3, 4.4, 6.1.1, 6.1.2, 6.2, 7.5.1, 7.5.2, 7.5.3, 9.3,</cell><cell>Integrity Integrity Integrity Integrity, Availability Integrity Confidentiality, Confidentiality, Integrity, Availability Integrity Integrity Confidentiality, Integrity Confidentiality, Integrity, Availability Confidentiality, Integrity, Availability Confidentiality, Integrity Confidentiality, Integrity Confidentiality, Integrity Confidentiality, Integrity Confidentiality, Confidentiality Integrity Confidentiality, Integrity, Availability Confidentiality, Integrity, Availability Integrity Confidentiality, Availability</cell><cell cols="3">Note: An asterisk (*) indicates that the ISO/IEC control does not fully satisfy the intent of the NIST control. 5.2, 5.3, 7.5.1, 7.5.2, 7.5.3, A.5.1.1, A.5.1.2, A.6.1.1, A.9.1.1, A.12.1.1, A.18.1.1, A.18.2.2 A.9.2.1, A.9.2.2, A.9.2.3, A.9.2.5, A.9.2.6 A.6.2.2, A.9.1.2, A.9.4.1, A.9.4.4, A.9.4.5, A.13.1.1, A.14.1.2, A.14.1.3, A.18.1.3 A.13.1.3, A.13.2.1, A.14.1.2, A.14.1.3 A.5.1.1, A.5.1.2, A.6.1.1, A.12.1.1, A.18.1.1, A.18.2.2 None A.12.4.1* A.12.1.3 None A.12.4.1, A.16.1.2, A.16.1.4 None A.12.4.4 A.12.4.2, A.12.4.3, A.18.1.3 None A.12.4.1, A.16.1.7 A.12.4.1, A.12.4.3 None A.12.4.1* ---None 5.2, 5.3, 7.5.1, 7.5.2, 7.5.3, A.5.1.1, A.5.1.2, A.6.1.1, A.12.1.1, A.18.1.1, A.18.2.2 A.14.2.8, A.18.2.2, A.18.2.3 A.13.1.2, A.13.2.1, A.13.2.2 ---8.3, 9.2, 10.1* 9.3* 9.1, 9.2, A.18.2.2, A.18.2.3* CA-8 Penetration Testing None AC-1 Access Control Policy and Procedures AC-2 Account Management AC-3 Access Enforcement AC-4 Information Flow Enforcement AU-1 Audit and Accountability Policy and Procedures AU-2 Event Logging AU-3 Content of Audit Records AU-4 Audit Log Storage Capacity AU-5 Response to Audit Logging Process Failures AU-6 Audit Record Review, Analysis, and Reporting AU-7 Audit Record Reduction and Report Generation AU-8 Time Stamps AU-9 Protection of Audit Information AU-10 Non-repudiation AU-11 Audit Record Retention AU-12 Audit Record Generation AU-13 Monitoring for Information Disclosure AU-14 Session Audit AU-15 Withdrawn AU-16 Cross-Organizational Audit Logging CA-1 Assessment and Authorization Policies and Procedures CA-2 Control Assessments CA-3 Information Exchange CA-4 Withdrawn CA-5 Plan of Action and Milestones CA-6 Authorization CA-7 Continuous Monitoring CA-9 Internal System Connections None Protocols CP-12 Safe Mode None PM-27 Privacy Reporting None CP-13 Alternative Security Mechanisms A.17.1.2* IA-1 Identification and Authentication Policy 5.2, 5.3, 7.5.1, 7.5.2, 7.5.3, A.5.1.1, A.5.1.2, A.6.1.1, 4.3, 6.1.2, 6.2, PM-Risk Framing 7.4, 7.5.1, 7.5.2, 28 7.5.3 PM-29 Risk Management 5.1, 5.3, 9.2, Program Leadership A.6.1.1 Roles IR-10 Withdrawn ---IR-9 Information Spillage Response None IR-6 Incident Reporting A.6.1.3, A.16.1.2 IR-7 Incident Response Assistance None IR-8 Incident Response Plan 7.5.3, A.16.1.1 7.5.1, 7.5.2, IR-5 Incident Monitoring None IR-4 Incident Handling A.16.1.4, A.16.1.6 A.16.1.5, IA-11 Re-authentication None IA-12 Identity Proofing None IR-1 Incident Response Policy and A.18.1.1, A.18.2.2 IR-2 Training IR-3 Testing None Incident Response A.7.2.2* Incident Response Procedures 5.2, 5.3, 7.5.1, A.5.1.1, A.5.1.2, A.6.1.1, A.12.1.1 7.5.2, 7.5.3, IA-9 Service Identification and Authentication None IA-10 Identification and Authentication None Adaptive and Procedures A.12.1.1, A.18.1.1, A.18.2.2 IA-2 Identification and Supply Chain Risk 4.4, 6.2, 7.5.1, PM-Management 7.5.2, 7.5.3, 30 Strategy 10.2* 4.4, 6.2, 7.4, Authentication (Organizational Users) A.9.2.1 IA-3 Device Identification and Authentication None IA-4 IA-5 Authenticator Management A.9.2.1, A.9.2.4, IA-6 Authentication IA-7 Cryptographic Module Authentication IA-8 Authentication (Non-Organizational Users) A.9.2.1 Identification and A.18.1.5 Feedback A.9.4.2 A.9.3.1, A.9.4.3 Management A.9.2.1 Identifier PM-Continuous 7.5.1, 7.5.2, 31 Monitoring Strategy 7.5.3, 9.1, 10.1, 10.2 PM-32 Purposing None</cell><cell>Effected CIA triad element Confidentiality, Integrity, Availability Integrity, Availability Integrity, Availability Integrity Confidentiality Confidentiality, Integrity Confidentiality, Integrity, Availability Confidentiality, Integrity, Availability Integrity, Availability Confidentiality, Integrity, Availability Integrity, Availability Confidentiality, Integrity, Availability Confidentiality, Confidentiality, Integrity, Availability Integrity Availability Integrity Confidentiality, Confidentiality, Confidentiality, Integrity Confidentiality, Integrity Confidentiality, Integrity</cell></row></table></figure>
		</body>
		<back>
			<div type="annex">
<div xmlns="http://www.tei-c.org/ns/1.0"><head>MA-1</head><p>System Maintenance Policy and Procedures 5.2, 5.3, 7.5.1, 7.5.2, 7.5.3, A.5.1.1, A.5.1.2, A.6.1.1, A.12.1.1, A. <ref type="bibr" target="#b17">18</ref> </p></div>			</div>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<monogr>
		<title level="m" type="main">Understanding Cybersecurity Frameworks and Information Security Standards-A Review and Comprehensive Overview</title>
		<author>
			<persName><forename type="first">H</forename><surname>Taherdoost</surname></persName>
		</author>
		<idno type="DOI">10.3390/electronics11142181</idno>
		<imprint>
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Improving Cybersecurity through the Use of the Cybersecurity Framework</title>
		<author>
			<persName><forename type="first">T</forename><surname>Conkle</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Witte</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">9th International Topical Meeting on Nuclear Plant Instrumentation, Control, and Human-Machine Interface Technologies, NPIC and HMIT</title>
				<imprint>
			<date type="published" when="2015">2015</date>
			<biblScope unit="volume">3</biblScope>
			<biblScope unit="page" from="2479" to="2486" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Security Rating Metrics for Distributed Wireless Systems</title>
		<author>
			<persName><forename type="first">V</forename><surname>Buriachok</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Sokolov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Skladannyi</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">8th International Conference on &quot;Mathematics. Information Technologies. Education</title>
				<imprint>
			<date type="published" when="2019">2019</date>
			<biblScope unit="volume">2386</biblScope>
			<biblScope unit="page" from="222" to="233" />
		</imprint>
	</monogr>
	<note>Modern Machine Learning Technologies and Data Science (MoMLeT and DS)</note>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Assessing Approaches of IT Infrastructure Audit</title>
		<author>
			<persName><forename type="first">F</forename><surname>Kipchuk</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">IEEE 8th</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<monogr>
		<idno type="DOI">10.1109/picst54195.2021.9772181</idno>
		<title level="m">International Conference on Problems of Infocommunications</title>
				<meeting><address><addrLine>PICST</addrLine></address></meeting>
		<imprint>
			<publisher>Science and Technology</publisher>
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Investigation of the IoT Device Lifetime with Secure Data Transmission, Internet of Things, Smart Spaces</title>
		<author>
			<persName><forename type="first">I</forename><surname>Kuzminykh</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-030-30859-9_2</idno>
	</analytic>
	<monogr>
		<title level="m">and Next Generation Networks and Systems</title>
				<imprint>
			<date type="published" when="2019">2019</date>
			<biblScope unit="page" from="16" to="27" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<monogr>
		<idno>Framework vs ISO 27001/27002</idno>
		<ptr target="https://www.complianceforge.com/faq/nist-800-53-vs-iso-27002-vs-nist-csf-vs-scf" />
		<title level="m">vs NIST 800-53 vs Secure Controls Framework</title>
				<imprint/>
		<respStmt>
			<orgName>NIST Cybersecurity</orgName>
		</respStmt>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<monogr>
		<title level="m" type="main">Information Security Management Needs More Holistic Approach: A Literature Review</title>
		<author>
			<persName><forename type="first">A</forename><surname>Zahoor</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.ijinfomgt.2015.11.009</idno>
		<imprint>
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<monogr>
		<idno>ISO/IEC 27001</idno>
		<ptr target="https://www.iso.org/standard/54534.html" />
		<title level="m">Information Technology-Security Techniques-Information Security Management Systems-Requirements</title>
				<imprint>
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<monogr>
		<idno>ISO/IEC 27002</idno>
		<ptr target="https://www.iso.org/standard/54533.html" />
		<title level="m">Information Technology-Security Techniques-Code of Practice for Information Security Controls</title>
				<imprint>
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<monogr>
		<ptr target="https://csrc.nist.gov/publications/detail/sp/800-53/rev-5/final" />
		<title level="m">Security and Privacy Controls for Information Systems and Organizations Special Publication (SP) 800-53 Rev 5</title>
				<imprint>
			<publisher>U.S. Department of Commerce</publisher>
			<date type="published" when="2020">2020. 2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<monogr>
		<ptr target="https://1path2020b.websitetotalcare.com/blog/overviewof-thenist-cybersecurity-framework" />
		<title level="m">Overview of the NIST Cybersecurity Framework</title>
				<imprint>
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">PCI DSS Quick Reference Guide</title>
		<ptr target="https://www.pcisecuritystandards.org/documents/PCI_DSS-QRG-v3_2_1.pdf" />
	</analytic>
	<monogr>
		<title level="m">Understanding the Payment Card Industry Data Security Standard</title>
				<imprint>
			<date type="published" when="2018">2018</date>
			<biblScope unit="volume">3</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<monogr>
		<ptr target="https://www.cisecurity.org/controls/v8/" />
		<title level="m">CIS Controls v8</title>
				<imprint>
			<date type="published" when="2021">2021</date>
		</imprint>
		<respStmt>
			<orgName>Center for Internet Security</orgName>
		</respStmt>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<monogr>
		<idno>SP 800- 53</idno>
		<title level="m">CIS Controls v8 Mapping to NIST</title>
				<imprint>
			<date type="published" when="2021">2021</date>
		</imprint>
		<respStmt>
			<orgName>Center for Internet Security</orgName>
		</respStmt>
	</monogr>
	<note>Rev 5</note>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title/>
	</analytic>
	<monogr>
		<title level="j">HIPAA; Pub. L</title>
		<imprint>
			<biblScope unit="page">110</biblScope>
			<date type="published" when="1936-08-21">1936. August 21, 1996</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<monogr>
		<ptr target="https://cloudsecurityalliance.org/artifacts/cloud-controls-matrix-v4/" />
		<title level="m">Cloud Controls Matrix, Cloud Security Alliance</title>
				<imprint>
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">679 of the European Parliament and of the Council</title>
	</analytic>
	<monogr>
		<title level="m">on the Protection of Natural Persons with Regard to the Processing of Personal Data and on the Free Movement of Such Data</title>
				<imprint>
			<date type="published" when="2016">2016. 2018</date>
			<biblScope unit="page" from="1" to="88" />
		</imprint>
	</monogr>
	<note>Regulation (EU)</note>
</biblStruct>

<biblStruct xml:id="b18">
	<monogr>
		<idno>ISO/IEC 27701:2019</idno>
		<ptr target="https://www.iso.org/standard/71670.html" />
		<title level="m">Security Techniques -Extension to ISO/IEC 27001 and ISO/IEC 27002 for Privacy Information Management -Requirements and Guidelines</title>
				<imprint>
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<monogr>
		<ptr target="https://www.aicpa.org/content/dam/aicpa/interestareas/frc/assuranceadvisoryservices/downloadabledocuments/trust-services-criteria.pdf" />
		<title level="m">Trust Services Criteria Issued by the AICPA Assurance Services Executive Committee</title>
				<imprint>
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b20">
	<monogr>
		<title level="m">COBIT 5, A Framework for the Governance and Management of Enterprise IT</title>
				<imprint>
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b21">
	<analytic>
		<title level="a" type="main">Comparative Analysis and Design of Cybersecurity Maturity Assessment Methodology Using NIST CSF COBIT ISO/IEC 27002 and PCI DSS</title>
		<author>
			<persName><forename type="first">D</forename><surname>Sulistyowati</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Handayani</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Suryanto</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">International Journal on Informatics Visualization</title>
		<imprint>
			<biblScope unit="volume">4</biblScope>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page" from="225" to="230" />
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b22">
	<analytic>
		<title level="a" type="main">Information Security Management Standards: Problems and Solutions</title>
		<author>
			<persName><forename type="first">M</forename><surname>Siponen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Willison</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">J. Information &amp; Management</title>
		<imprint>
			<biblScope unit="volume">46</biblScope>
			<biblScope unit="page" from="267" to="270" />
			<date type="published" when="2009">2009</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b23">
	<monogr>
		<author>
			<persName><forename type="first">S</forename><surname>Yevseiev</surname></persName>
		</author>
		<title level="m">Synergy of Building Cybersecurity Systems: Monograph</title>
				<imprint>
			<date type="published" when="2021">2021</date>
		</imprint>
		<respStmt>
			<orgName>PC Technology Center</orgName>
		</respStmt>
	</monogr>
</biblStruct>

<biblStruct xml:id="b24">
	<analytic>
		<title level="a" type="main">Methodology of ISMS Establishment Against Modern Cybersecurity Threats, in Future Intent-Based Networking</title>
		<author>
			<persName><forename type="first">V</forename><surname>Susukailo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Opirsky</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Yaremko</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-030-92435-5_15</idno>
	</analytic>
	<monogr>
		<title level="j">Lecture Notes in Electrical Engineering</title>
		<imprint>
			<biblScope unit="volume">831</biblScope>
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b25">
	<monogr>
		<ptr target="https://www.riskmanagementstudio.com/best-practice-iso-27001-required-documentation/" />
		<title level="m">ISO Official website-ISO/IEC 27001 Information security management</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b26">
	<monogr>
		<idno>NIST SP 800-53</idno>
		<ptr target="https://csrc.nist.gov/CSRC/media/Publications/sp/800-53/rev-5/final/documents/sp800-53r5-to-iso-27001-mapping.docx" />
		<title level="m">Revision 5 Control Mappings to ISO/IEC 27001</title>
				<imprint/>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
