Asset Management (AM)

Organizational communication and data flows are mapped


Login

Asset Management (AM)

External information systems are catalogued


Login

Asset Management (AM)

Resources (e.g., hardware, devices, data, time, personnel, and software) are prioritized based on their classification, criticality, and business value


Login

Asset Management (AM)

Cybersecurity roles and responsibilities for the entire workforce and third-party stakeholders (e.g., suppliers, customers, partners) are established


Login

Business Environment (BE)

The organization’s role in the supply chain is identified and communicated


Login

Business Environment (BE)

The organization’s place in critical infrastructure and its industry sector is identified and communicated


Login

Business Environment (BE)

Priorities for organizational mission, objectives, and activities are established and communicated


Login

Business Environment (BE)

Dependencies and critical functions for delivery of critical services are established


Login

Business Environment (BE)

Resilience requirements to support delivery of critical services are established for all operating states (e.g. under duress/attack, during recovery, normal operations)


Login

Governance (GV)

Organizational cybersecurity policy is established and communicated


Login