NIST - Checklist
NIST - Checklist
IS Audit/Assurance Progam
Cybersecurity: Based on the NIST Cybersecurity Framework - Identify
Process Ref. Control Control Control NIST Ref. to Additional Ref. Ref. Framework/ Ref. Pass/
Control Objectives Controls Testing Step Comments
Sub-Area Risk Type Classification Frequency COBIT 5 COBIT 5 Standards Workpaper Fail
IS Audit/Assurance Progam
Cybersecurity: Based on the NIST Cybersecurity Framework - Identify
Process Ref. Control Control Control NIST Ref. to Additional Ref. Ref. Framework/ Ref. Pass/
Control Objectives Controls Testing Step Comments
Sub-Area Risk Type Classification Frequency COBIT 5 COBIT 5 Standards Workpaper Fail
Priorities for organizational 2. Determine if the organization's mission statement and objectives are
The organization’s mission, APO02.01;
mission, objectives and clearly published in a way employees can easily see or access them.
objectives, stakeholders, APO02.06;
activities are established and 3. Determine if an IT strategic plan is documented, defines goals and is
and activities are APO03.01
communicated. mapped to enterprise goals.
understood and prioritized; 4. Determine if employees are educated on the organization's mission and
this information is used to objectives.
inform cybersecurity roles,
responsibilities, and risk
management decisions.
organization’s regulatory,
legal, risk, environmental,
and operational 1. Obtain a list of all relevant legal and regulatory requirements for the
requirements are organization.
understood and inform the 2. Determine if the cybersecurity program is mapped to legal and regulatory
management of Legal and regulatory requirements.
cybersecurity risk. requirements regarding 3. Review any recent regulatory cybersecurity exams or audits. If any
MEA03.01; ISO/IEC
cybersecurity, including privacy exceptions were noted in audits, determine how the organization responded
MEA03.04 27001:2013 A.18.1
and civil liberties obligations, to exceptions.
are understood and managed. 4. Determine if critical third-party contracts are reviewed by legal counsel
prior to execution.
5. Determine if there is a formalized process in place to monitor and review
changes in cybersecurity laws and regulations.
G
management of
cybersecurity risk.
NIST Cybersecurity Framework - Identify ISACA IS Audit/Assurance Program
IS Audit/Assurance Progam
Cybersecurity: Based on the NIST Cybersecurity Framework - Identify
Process Ref. Control Control Control NIST Ref. to Additional Ref. Ref. Framework/ Ref. Pass/
Control Objectives Controls Testing Step Comments
Sub-Area Risk Type Classification Frequency COBIT 5 COBIT 5 Standards Workpaper Fail
APO12.01;
1. Determine if vulnerability testing is conducted and analyzed on critical ISO/IEC
Asset vulnerabilities are APO12.02;
organizational assets (e.g., assets important to business objectives and the 27001:2013
identified and documented. APO12.03;
organization's risk strategy). A.12.6.1; A.18.2.3
APO12.04
1. Review risk assessments to determine if internal and external threats are APO12.01;
Threats, both internal and
identified and documented. APO12.02;
The organization external, are identified and
2. Determine if the organization has developed processes to actively monitor APO12.03;
Risk Assessment
agreed to by organizational
b. Is the process repeatable and measurable? BAI02.03;
stakeholders.
c. Does the process have an owner? BAI04.02
The organization’s priorities, d. Are stakeholders involved or informed of the process?
constraints, risk tolerances,
and assumptions are Organizational risk tolerance is
established and used to 1. Determine if the organization has defined and approved a cyberrisk APO12.03;
determined and clearly APO12.06
support operational risk appetite statement. EDM03.01
expressed.
decisions.
The organization’s 1. Obtain a copy of the organization's risk management strategy and risk
determination of risk tolerance appetite statement to determine if these align with its role in critical
is informed by its role in critical infrastructure (as defined by national infrastructure protection plan [NIPP] APO04.03
infrastructure and sector- and sector-specific plans).
specific risk analysis.
IS Audit/Assurance Progam
Cybersecurity: Based on the NIST Cybersecurity Framework - Protect
Process Ref. Control Control Control NIST Ref. to Additional Ref. Ref. Framework/ Ref. Pass/
Control Objectives Controls Testing Step Comments
Sub-Area Risk Type Classification Frequency COBIT 5 COBIT 5 Standards Workpaper Fail
1. Review access rights and permissions for the network and any critical
applications.
2. Determine if user access profiles are consistent with their job functions
(based on least privilege). Compare a sample of users' access authority with
their assigned duties and responsibilities.
3. Determine if access is granted for mission critical functions and
ISO/IEC
Access permissions are information system support functions in order to reduce the risk of
27001:2013
managed, incorporating the malevolent activity without collusion (e.g., critical processes require two DSS05.04;
A.6.1.2; A.9.1.2;
principles of least privilege and people to perform the function). DSS06.03
A.9.2.3; A.9.4.1;
separation of duties. 4. Determine if users with local administrative privilege on workstations
A.9.4.4
require this level of access.
5. Review how the organization restricts and/or monitors access to sensitive
data by users with elevated network privilege.
6. Determine if role-based access controls are implemented (e.g., roles vs.
users are assigned access rights).
7. Determine if there are regular reviews of access.
IS Audit/Assurance Progam
Cybersecurity: Based on the NIST Cybersecurity Framework - Protect
Process Ref. Control Control Control NIST Ref. to Additional Ref. Ref. Framework/ Ref. Pass/
Control Objectives Controls Testing Step Comments
Sub-Area Risk Type Classification Frequency COBIT 5 COBIT 5 Standards Workpaper Fail
IS Audit/Assurance Progam
Cybersecurity: Based on the NIST Cybersecurity Framework - Protect
Process Ref. Control Control Control NIST Ref. to Additional Ref. Ref. Framework/ Ref. Pass/
Control Objectives Controls Testing Step Comments
Sub-Area Risk Type Classification Frequency COBIT 5 COBIT 5 Standards Workpaper Fail
1. Review asset inventory policies and procedures. Consider the following: ISO/IEC
Assets are formally managed a. Formalized processes in place 27001:2013
throughout removal, transfers b. Accuracy of asset tracking BAI09.03 DSS05.06 A.8.2.3; A.8.3.1;
and disposition. c. Secure removal or destruction of confidential information from A.8.3.2; A.8.3.3;
decommissioned assets A.11.2.7
BAI02.01;
1. Review sample of capacity management monitoring reports used to
BAI03.05;
Data Security
Information and records (data) are monitor critical resources such as network bandwidth, CPU, disk utilization,
BAI04.01; ISO/IEC
managed consistent with the Adequate capacity to ensure etc.
APO13.01 BAI04.02; 27001:2013
organization’s risk strategy to protect the availability is maintained. 2. Determine if resources have adequate capacity (e.g., disk space, CPU).
BAI04.03; A.12.3.1
confidentiality, integrity, and availability 3. Determine if the risk of distributed denial-of-service (DDoS) has been
BAI04.04;
of information. addressed and is in line with the organization's risk appetite.
BAI04.05
ISO/IEC
27001:2013
A.6.1.2; A.7.1.1;
1. Review risk assessments, information security meeting minutes and
A.7.1.2; A.7.3.1;
information security strategies to determine if the risk of data loss prevention
A.8.2.2; A.8.2.3;
Protections against data leaks or exfiltration of confidential data is being considered.
APO01.06 DSS05.06 A.9.1.1; A.9.1.2;
are implemented. 2. Ensure controls or tools (e.g., data loss prevention) are in place to detect or
A.9.2.3; A.9.4.1;
block potential unauthorized or unintentional transmission or removal of
A.9.4.4; A.9.4.5;
confidential data (e.g., email, FTP, USB devices, Telnet)
A.13.1.3; A.13.2.1;
A.13.2.3; A.13.2.4;
A.14.1.2; A.14.1.3
The development and testing 1. If the organization maintains a software development or testing
ISO/IEC
environment(s) are separate environment, review network diagrams, database connections and applicable
BAI07.04 27001:2013
from the production firewall/router configurations to determine sufficiency of separation between
A.12.1.4
environment. these environments and the production network.
1. Obtain and review a copy of the organization's system development life ISO/IEC
A system development life cycle
cycle. BAI07.04; 27001:2013
(SDLC) to manage systems is APO13.01
2. Obtain samples of rollout documentation and rollout schedule to ensure BAI07.06 A.6.1.5; A.14.1.1;
implemented.
compliance with policy. A.14.2.1; A.14.2.5
ISO/IEC
Backups of information are 1. Determine if a formal backup and recovery plan exists.
27001:2013
conducted, maintained and 2. Review backup procedures. Ensure periodic backup testing is performed to APO13.01 DSS04.07
A.12.3.1; A.17.1.2;
tested periodically. verify data are accessible and readable.
A.17.1.3; A.18.1.3
IS Audit/Assurance Progam
Cybersecurity: Based on the NIST Cybersecurity Framework - Protect
Process Ref. Control Control Control NIST Ref. to Additional Ref. Ref. Framework/ Ref. Pass/
Control Objectives Controls Testing Step Comments
Sub-Area Risk Type Classification Frequency COBIT 5 COBIT 5 Standards Workpaper Fail
ISO/IEC
Response and recovery plans 1. Determine whether business continuity and incident response tests are
DSS04.04 27001:2013
are tested. performed according to policy and any applicable guidance.
A.17.1.3
IS Audit/Assurance Progam
Cybersecurity: Based on the NIST Cybersecurity Framework - Protect
Process Ref. Control Control Control NIST Ref. to Additional Ref. Ref. Framework/ Ref. Pass/
Control Objectives Controls Testing Step Comments
Sub-Area Risk Type Classification Frequency COBIT 5 COBIT 5 Standards Workpaper Fail
IS Audit/Assurance Progam
Cybersecurity: Based on the NIST Cybersecurity Framework - Detect
Process Ref. Control Control Control NIST Ref. to Additional Ref. Ref. Framework/ Ref. Pass/
Control Objectives Controls Testing Step Comments
Sub-Area Risk Type Classification Frequency COBIT 5 COBIT 5 Standards Workpaper Fail
Anomalous activity is 1. Obtain a listing of event aggregation and monitoring systems in use at the
detected in a timely manner organization (e.g., SIEMs, event log correlation systems).
and the potential impact of Event data are aggregated and 2. Obtain a list of sources that provide data to each event aggregation and
events is understood. correlated from multiple monitoring system (e.g., firewalls, routers, servers). APO12.01
sources and sensors. 3. Compare the sources to identified control points between domains of
different risk and control levels and determine if they provide adequate
monitoring coverage of the organization's environment.
IS Audit/Assurance Progam
Cybersecurity: Based on the NIST Cybersecurity Framework - Detect
Process Ref. Control Control Control NIST Ref. to Additional Ref. Ref. Framework/ Ref. Pass/
Control Objectives Controls Testing Step Comments
Sub-Area Risk Type Classification Frequency COBIT 5 COBIT 5 Standards Workpaper Fail
IS Audit/Assurance Progam
Cybersecurity: Based on the NIST Cybersecurity Framework - Detect
Process Ref. Control Control Control NIST Ref. to Additional Ref. Ref. Framework/ Ref. Pass/
Control Objectives Controls Testing Step Comments
Sub-Area Risk Type Classification Frequency COBIT 5 COBIT 5 Standards Workpaper Fail
1. Obtain a copy of laws and regulations (e.g., federal, state, local), industry
standards, internal security requirements and risk appetite applicable to the ISO/IEC
Detection activities comply with
organization. MEA03.03 27001:2013
all applicable requirements.
2. Determine if the organization is performing audits/testing to ensure their A.18.1.4
detection activities comply with these requirements.
IS Audit/Assurance Progam
Cybersecurity: Based on the NIST Cybersecurity Framework - Respond
Process Ref. Control Control Control NIST Ref. to Additional Ref. Ref. Framework/ Ref. Pass/
Control Objectives Controls Testing Step Comments
Sub-Area Risk Type Classification Frequency COBIT 5 COBIT 5 Standards Workpaper Fail
1. Determine if the organization has approved incident response and business DSS02.04;
Planning
Response activities are 1. Review the incident response plan to determine if information sharing is
coordinated with internal clearly defined as it relates to the following (if applicable):
and external stakeholders, a. Customers
as appropriate, to include b. Law enforcement ISO/IEC
external support from law Information is shared consistent c. Regulators DSS02.05 27001:2013
enforcement agencies. with response plans.
d. Media A.16.1.2
e. Information sharing organizations
2. Obtain copies of reports from recent incidents to validate sharing is
consistent and follows the plan.
ensure adequate response responsible for determining incident impact to determine if they have the A.16.1.6
and support recovery knowledge and experience to adequately understand potential impact.
activities.
1. Review the incident response plan as it relates to forensics. Consider the
following:
a. There is a process in place to ensure forensics will be performed when
ISO/IEC
needed.
Forensics are performed. DSS02.04 27001:2013
b. Determine if security investigations and forensic analysis are performed by
A.16.1.7
qualified staff or third parties.
c. Review forensics procedures to ensure they include controls, such as chain
of custody, to support potential legal action.
Analy
and support recovery
activities.
NIST Cybersecurity Framework - Respond ISACA IS Audit/Assurance Program
IS Audit/Assurance Progam
Cybersecurity: Based on the NIST Cybersecurity Framework - Respond
Process Ref. Control Control Control NIST Ref. to Additional Ref. Ref. Framework/ Ref. Pass/
Control Objectives Controls Testing Step Comments
Sub-Area Risk Type Classification Frequency COBIT 5 COBIT 5 Standards Workpaper Fail
Activities are performed to c. Strategies to mitigate impact different types of incidents (e.g., distributed
prevent expansion of an A.12.2.1; A.16.1.5
denial-of-service [DDoS], malware, etc.)
event, mitigate its effects 2. Review any documented incidents to determine whether mitigation efforts
and eradicate the incident. were implemented and effective.
Organizational response
activities are improved by been used to update incident response procedures, training and testing.
incorporating lessons
learned from current and
previous detection/response 1. Review the organization's incident response and business continuity
activities. strategies and plans. Consider the following:
Response strategies are a. There is a mechanism in place to regularly review, improve, approve and
DSS02.07
updated. communicate the plans.
b. The organization's response capability is informed by actual incidents, tests
and current threats.
IS Audit/Assurance Progam
Cybersecurity: Based on the NIST Cybersecurity Framework - Recover
Process Ref. Control Objectives Controls Control Control Control Testing Step NIST Ref. to Additional Ref. Framework/ Ref. Pass/ Comments
Sub-Area Risk Type Classification Frequency COBIT 5 Ref. COBIT 5 Standards Workpaper Fail
Recovery processes and cybersecurity incident plan) and the documented results of recent
procedures are executed cybersecurity events or event tests.
and maintained to ensure Recovery plan is executed 2. Evaluate documentation for the following: DSS02.05; ISO/IEC
timely restoration of during or after an event. a. Frequency of testing DSS03.04 27001:2013
systems or assets affected b. Coverage of critical pieces of the organization's recovery plans and A.16.1.5
by cybersecurity events. procedures
c. Documentation of incidents (e.g. power outages, communication failures,
system outages, attempted and successful malicious or careless unauthorized
access or disruption).
Communications
coordinated with internal
and external parties, such as
coordinating centers, IS Audit/Assurance Progam
Internet Service Providers, Cybersecurity: Based on the NIST Cybersecurity Framework - Recover
owners of attacking systems,
Process Ref. victims, other CSIRTs and
Control Objectives Controls Control Control Control Testing Step NIST Ref. to Additional Ref. Framework/ Ref. Pass/ Comments
Sub-Area Risk vendors. Type Classification Frequency COBIT 5 Ref. COBIT 5 Standards Workpaper Fail