NIST / HITRUST / HIPAA Crosswalk

The crosswalk from NIST to HIPAA is from HHS's HIPAA Security Rule Crosswalk to NIST Cybersecurity Framework. (HHS calls it a HIPAA to NIST crosswalk, but the mapping is one NIST subcategory to many HIPAA chapters, though I think it makes more sense to call it NIST-to-HIPAA.)

The crosswalk from NIST to HITRUST is from NIST's HITRUST CSF v9.2 to NIST CSF v1.1 Informative Reference Details.

For crosswalks from NIST to other frameworks (ISO, Cobit, etc.), see NIST's Framework for Improving Critical Infrastructure Cybersecurity (2018).

NIST to HITRUST and HIPAA

NISTDescriptionHITRUSTHIPAA LawHIPAA Details
ID.AM-1
Physical devices and systems within the organization are inventoried07.a, 07.d164.308 (Administrative safeguards), 164.310 (Physical safeguards)164.308(a)(1)(ii)(A), 164.310(a)(2)(ii), 164.310(d)
ID.AM-2
Software platforms and applications within the organization are inventoried01.l, 07.a, 07.d164.308 (Administrative safeguards)164.308(a)(1)(ii)(A), 164.308(a)(7)(ii)(E)
ID.AM-3
Organizational communication and data flows are mapped01.m, 01.o, 05.i, 09.m, 09.n164.308 (Administrative safeguards), 164.310 (Physical safeguards)164.308(a)(1)(ii)(A), 164.308(a)(3)(ii)(A), 164.308(a)(8), 164.310(d)
ID.AM-4
External information systems are catalogued01.i, 09.e, 09.n164.308 (Administrative safeguards), 164.314 (Organizational requirements), 164.316 (Policies and procedures and documentation requirements)164.308(a)(4)(ii)(A), 164.308(b), 164.314(a)(1), 164.314(a)(2)(i)(B), 164.314(a)(2)(ii), 164.316(b)(2)
ID.AM-5
Resources (e.g., hardware, devices, data, and software) are prioritized based on their classification, criticality, and business value01.a, 01.w, 06.c, 07.a, 07.b, 07.d, 12.a, 12.c, 12.d164.308 (Administrative safeguards)164.308(a)(7)(ii)(E)
ID.AM-6
Cybersecurity roles and responsibilities for the entire workforce and third party stakeholders (e.g., suppliers, customers, partners) are established00.a, 01.a, 02.a, 02.b, 02.c, 02.d, 02.e, 05.e, 05.j, 05.k, 07.b, 07.c, 07.d, 09.m, 09.n, 10.k, 10.m, 11.d, 12.a, 12.c, 12.d, 12.e164.308 (Administrative safeguards), 164.314 (Organizational requirements)164.308(a)(2), 164.308(a)(3), 164.308(a)(4), 164.308(b)(1), 164.314
ID.BE-1
The organization’s role in the supply chain is identified and communicated05.d, 09.g, 10.l164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.314 (Organizational requirements), 164.316 (Policies and procedures and documentation requirements)164.308(a)(1)(ii)(A), 164.308(a)(4)(ii), 164.308(a)(7)(ii)(C), 164.308(a)(7)(ii)(E), 164.308(a)(8), 164.310(a)(2)(i), 164.314, 164.316
ID.BE-2
The organization’s place in critical infrastructure and its industry sector is identified and communicated05.a, 12.b164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.314 (Organizational requirements), 164.316 (Policies and procedures and documentation requirements)164.308(a)(1)(ii)(A), 164.308(a)(4)(ii), 164.308(a)(7)(ii)(C), 164.308(a)(7)(ii)(E), 164.308(a)(8), 164.310(a)(2)(i), 164.314, 164.316
ID.BE-3
Priorities for organizational mission, objectives, and activities are established and communicated01.w, 03.a, 05.a, 05.b164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.316 (Policies and procedures and documentation requirements)164.308(a)(7)(ii)(B), 164.308(a)(7)(ii)(C), 164.308(a)(7)(ii)(D), 164.308(a)(7)(ii)(E), 164.310(a)(2)(i), 164.316
ID.BE-4
Dependencies and critical functions for delivery of critical services are established08.h, 12.b, 12.c164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.312 (Technical safeguards), 164.314 (Organizational requirements)164.308(a)(7)(i), 164.308(a)(7)(ii)(E), 164.310(a)(2)(i), 164.312(a)(2)(ii), 164.314(a)(1), 164.314(b)(2)(i)
ID.BE-5
Resilience requirements to support delivery of critical services are established12.a, 12.b, 12.c, 12.d164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.312 (Technical safeguards), 164.314 (Organizational requirements)164.308(a)(1)(ii)(B), 164.308(a)(6)(ii), 164.308(a)(7), 164.308(a)(8), 164.310(a)(2)(i), 164.312(a)(2)(ii), 164.314(b)(2)(i)
ID.GV-1
Organizational information security policy is established00.a, 04.a, 04.b, 05.a, 05.c164.308 (Administrative safeguards), 164.316 (Policies and procedures and documentation requirements)164.308(a)(1)(i), 164.316
ID.GV-2
Information security roles & responsibilities are coordinated and aligned with internal roles and external partners04.a, 05.a, 05.b, 05.c, 05.k164.308 (Administrative safeguards), 164.314 (Organizational requirements)164.308(a)(1)(i), 164.308(a)(2), 164.308(a)(3), 164.308(a)(4), 164.308(b), 164.314
ID.GV-3
Legal and regulatory requirements regarding cybersecurity, including privacy and civil liberties obligations, are understood and managed01.a, 02.a, 02.b, 02.c, 02.e, 04.a, 04.b, 05.b, 05.e, 05.g, 05.i, 05.k, 06.a, 06.b, 06.c, 06.d, 06.e, 06.f, 06.g, 07.b, 08.b, 08.c, 08.h, 09.ab, 09.n, 09.v, 09.x, 09.z, 10.a, 10.f, 11.a, 11.c, 11.e, 12.e164.306 (Security standards: General rules), 164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.312 (Technical safeguards), 164.314 (Organizational requirements), 164.316 (Policies and procedures and documentation requirements)164.306, 164.308, 164.310, 164.312, 164.314, 164.316
ID.GV-4
Governance and risk management processes address cybersecurity risks00.a, 01.a, 01.q, 01.w, 01.x, 01.y, 02.e, 03.a, 03.b, 03.d, 04.a, 04.b, 05.a, 05.d, 05.g, 05.h, 06.a, 06.c, 06.i, 07.b, 07.d164.308 (Administrative safeguards)164.308(a)(1), 164.308(b)
ID.RA-1
Asset vulnerabilities are identified and documented03.b, 03.d, 06.h, 09.ab, 09.z, 10.c, 10.m, 11.b, 12.b164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.312 (Technical safeguards), 164.316 (Policies and procedures and documentation requirements)164.308(a)(1)(ii)(A), 164.308(a)(7)(ii)(E), 164.308(a)(8), 164.310(a)(1), 164.312(a)(1), 164.316(b)(2)(iii)
ID.RA-2
Threat and vulnerability information is received from information sharing forums and sources03.b, 03.d, 05.g, 07.d, 10.m, 12.bNo direct analog to HIPAA Security RuleNo direct analog to HIPAA Security Rule
ID.RA-3
Threats, both internal and external, are identified and documented03.b, 03.d, 07.d, 10.l, 12.b164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.312 (Technical safeguards), 164.314 (Organizational requirements), 164.316 (Policies and procedures and documentation requirements)164.308(a)(1)(ii)(A), 164.308(a)(1)(ii)(D), 164.308(a)(3), 164.308(a)(4), 164.308(a)(5)(ii)(A), 164.310(a)(1), 164.310(a)(2)(iii), 164.312(a)(1), 164.312(c), 164.312(e), 164.314, 164.316
ID.RA-4
Potential business impacts and likelihoods are identified03.b, 03.d, 05.d, 07.d, 09.g, 10.k, 10.m, 12.b164.308 (Administrative safeguards), 164.316 (Policies and procedures and documentation requirements)164.308(a)(1)(i), 164.308(a)(1)(ii)(A), 164.308(a)(1)(ii)(B), 164.308(a)(6), 164.308(a)(7)(ii)(E), 164.308(a)(8), 164.316(a)
ID.RA-5
Threats, vulnerabilities, likelihoods, and impacts are used to determine risk03.b, 03.d, 10.k, 10.m, 12.b164.308 (Administrative safeguards), 164.316 (Policies and procedures and documentation requirements)164.308(a)(1)(ii)(A), 164.308(a)(1)(ii)(B), 164.308(a)(1)(ii)(D), 164.308(a)(7)(ii)(D), 164.308(a)(7)(ii)(E), 164.316(a)
ID.RA-6
Risk responses are identified and prioritized03.c, 06.g, 06.h, 10.m164.308 (Administrative safeguards), 164.314 (Organizational requirements)164.308(a)(1)(ii)(B), 164.314(a)(2)(i)(C), 164.314(b)(2)(iv)
ID.RM-1
Risk management processes are established, managed, and agreed to by organizational stakeholders03.a, 03.b, 05.a, 05.h, 05.i164.308 (Administrative safeguards)164.308(a)(1)(ii)(B)
ID.RM-2
Organizational risk tolerance is determined and clearly expressed03.a, 05.h164.308 (Administrative safeguards)164.308(a)(1)(ii)(B)
ID.RM-3
The organization’s determination of risk tolerance is informed by its role in critical infrastructure and sector specific risk analysis03.a, 05.h, 12.b164.308 (Administrative safeguards), 164.310 (Physical safeguards)164.308(a)(1)(ii)(B), 164.308(a)(6)(ii), 164.308(a)(7)(i), 164.308(a)(7)(ii)(C), 164.308(a)(7)(ii)(E), 164.310(a)(2)(i)
PR.AC-1
Identities and credentials are managed for authorized devices and users01.a, 01.b, 01.c, 01.d, 01.e, 01.f, 01.j, 01.k, 01.p, 01.q, 01.r, 01.v, 02.g, 02.i, 05.j, 06.j, 09.m, 10.i164.308 (Administrative safeguards), 164.312 (Technical safeguards)164.308(a)(3)(ii)(B), 164.308(a)(3)(ii)(C), 164.308(a)(4)(i), 164.308(a)(4)(ii)(B), 164.308(a)(4)(ii)(C), 164.312(a)(2)(i), 164.312(a)(2)(ii), 164.312(a)(2)(iii), 164.312(d)
PR.AC-2
Physical access to assets is managed and protected01.g, 01.k, 01.l, 01.v, 01.x, 01.y, 08.a, 08.b, 08.c, 08.e, 08.f, 08.h, 08.i, 10.i164.308 (Administrative safeguards), 164.310 (Physical safeguards)164.308(a)(1)(ii)(B), 164.308(a)(7)(i), 164.308(a)(7)(ii)(A), 164.310(a)(1), 164.310(a)(2)(i), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(b), 164.310(c), 164.310(d)(1), 164.310(d)(2)(iii)
PR.AC-3
Remote access is managed01.j, 01.n, 01.q, 01.v, 01.y, 05.i, 05.j, 09.e, 09.s, 09.w, 10.i164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.312 (Technical safeguards)164.308(a)(4)(i), 164.308(b)(1), 164.308(b)(3), 164.310(b), 164.312(e)(1), 164.312(e)(2)(ii)
PR.AC-4
Access permissions are managed, incorporating the principles of least privilege and separation of duties01.a, 01.b, 01.c, 01.e, 01.m, 01.p, 01.s, 01.v, 01.x, 02.g, 02.i, 05.i, 06.j, 07.a, 07.d, 08.i, 09.ac, 09.c, 09.j, 09.r, 09.w, 09.y, 09.z, 10.i164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.312 (Technical safeguards)164.308(a)(3), 164.308(a)(4), 164.310(a)(2)(iii), 164.310(b), 164.312(a)(1), 164.312(a)(2)(i), 164.312(a)(2)(ii)
PR.AC-5
Network integrity is protected, incorporating network segregation where appropriate01.m, 01.n, 01.o, 01.w, 09.m, 09.w164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.312 (Technical safeguards)164.308(a)(4)(ii)(B), 164.310(a)(1), 164.310(b), 164.312(a)(1), 164.312(b), 164.312(c), 164.312(e)
PR.AT-1
All users are informed and trained00.a, 01.f, 01.g, 01.p, 01.x, 01.y, 02.d, 02.e, 05.c, 07.c, 09.j, 09.s, 11.b, 11.c, 12.c, 12.d164.308 (Administrative safeguards)164.308(a)(5)
PR.AT-2
Privileged users understand roles & responsibilities00.a, 01.q, 02.d, 02.e, 05.c, 09.z164.308 (Administrative safeguards)164.308(a)(2), 164.308(a)(3)(i), 164.308(a)(5)(i), 164.308(a)(5)(ii)(A), 164.308(a)(5)(ii)(B), 164.308(a)(5)(ii)(C), 164.308(a)(5)(ii)(D)
PR.AT-3
Third-party stakeholders (e.g., suppliers, customers, partners) understand roles & responsibilities00.a, 02.d, 05.i, 05.j, 05.k, 06.a, 09.e, 09.f, 09.g, 09.n, 09.t, 09.x, 10.a, 10.k, 10.l164.308 (Administrative safeguards), 164.314 (Organizational requirements)164.308(b), 164.314(a)(1), 164.314(a)(2)(i), 164.314(a)(2)(ii)
PR.AT-4
Senior executives understand roles & responsibilities00.a, 02.d, 02.e, 05.a164.308 (Administrative safeguards)164.308(a)(2), 164.308(a)(3)(i), 164.308(a)(5)(i), 164.308(a)(5)(ii)(A), 164.308(a)(5)(ii)(B), 164.308(a)(5)(ii)(C), 164.308(a)(5)(ii)(D)
PR.AT-5
Physical and information security personnel understand roles & responsibilities00.a, 02.d, 02.e, 05.c, 11.a164.308 (Administrative safeguards), 164.530 (Administrative requirements)164.308(a)(2), 164.308(a)(3)(i), 164.308(a)(5)(i), 164.308(a)(5)(ii)(A), 164.308(a)(5)(ii)(B), 164.308(a)(5)(ii)(C), 164.308(a)(5)(ii)(D), 164.530(b)(1)
PR.DS-1
Data-at-rest is protected01.d, 01.j, 01.k, 01.v, 01.x, 01.y, 06.d, 08.j, 09.ac, 09.l, 09.o, 09.x, 09.y, 09.z, 10.f, 10.g, 10.i, 12.c164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.312 (Technical safeguards), 164.314 (Organizational requirements)164.308(a)(1)(ii)(D), 164.308(b)(1), 164.310(d), 164.312(a)(1), 164.312(a)(2)(iii), 164.312(a)(2)(iv), 164.312(b), 164.312(c), 164.314(b)(2)(i), 164.312(d)
PR.DS-2
Data-in transit is protected01.d, 01.j, 01.n, 01.r, 01.y, 05.i, 06.d, 08.i, 09.ac, 09.l, 09.m, 09.s, 09.t, 09.u, 09.v, 09.x, 09.y, 09.z, 10.d, 10.f, 10.g164.308 (Administrative safeguards), 164.312 (Technical safeguards), 164.314 (Organizational requirements)164.308(b)(1), 164.308(b)(2), 164.312(e)(1), 164.312(e)(2)(i), 164.312(e)(2)(ii), 164.314(b)(2)(i)
PR.DS-3
Assets are formally managed throughout removal, transfers, and disposition01.y, 06.c, 07.a, 07.b, 07.d, 08.k, 08.l, 08.m, 09.e, 09.p, 09.q164.308 (Administrative safeguards), 164.310 (Physical safeguards)164.308(a)(1)(ii)(A), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(a)(2)(iv), 164.310(d)(1), 164.310(d)(2)
PR.DS-4
Adequate capacity to ensure availability is maintained09.ac, 09.h, 12.c164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.312 (Technical safeguards)164.308(a)(1)(ii)(A), 164.308(a)(1)(ii)(B), 164.308(a)(7), 164.310(a)(2)(i), 164.310(d)(2)(iv), 164.312(a)(2)(ii)
PR.DS-5
Protections against data leaks are implemented01.c, 01.m, 01.n, 01.o, 01.p, 01.r, 01.s, 01.t, 01.u, 01.v, 01.w, 02.b, 02.c, 05.e, 07.c, 07.d, 07.e, 09.i, 09.m, 09.p, 09.q, 09.s, 09.v, 09.w, 09.x, 09.y, 10.b, 10.d, 10.j164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.312 (Technical safeguards)164.308(a)(1)(ii)(D), 164.308(a)(3), 164.308(a)(4), 164.310(b), 164.310(c), 164.312(a), 164.312(e)
PR.DS-6
Integrity checking mechanisms are used to verify software, firmware, and information integrity09.ab, 09.ac, 09.z, 10.b, 10.c, 10.d164.308 (Administrative safeguards), 164.312 (Technical safeguards)164.308(a)(1)(ii)(D), 164.312(b), 164.312(c)(1), 164.312(c)(2), 164.312(e)(2)(i)
PR.DS-7
The development and testing environment(s) are separate from the production environment09.d, 09.k, 10.h164.308 (Administrative safeguards)164.308(a)(4)4
PR.IP-1
A baseline configuration of information technology/industrial control systems is created and maintained01.i, 01.l, 01.m, 01.w, 01.x, 01.y, 06.b, 07.b, 09.m, 09.w, 09.z, 10.h, 10.k164.308 (Administrative safeguards)164.308(a)(8), 164.308(a)(7)(i), 164.308(a)(7)(ii)
PR.IP-2
A System Development Life Cycle to manage systems is implemented09.i, 10.a, 10.k, 10.l164.308 (Administrative safeguards)164.308(a)(1)(i)
PR.IP-3
Configuration change control processes are in place01.l, 01.n, 09.b, 09.d, 10.h, 10.k164.308 (Administrative safeguards)164.308(a)(8)
PR.IP-4
Backups of information are conducted, maintained, and tested periodically09.l, 09.w164.308 (Administrative safeguards), 164.310 (Physical safeguards)164.308(a)(7)(ii)(A), 164.308(a)(7)(ii)(B), 164.308(a)(7)(ii)(D), 164.310(a)(2)(i), 164.310(d)(2)(iv)
PR.IP-5
Policy and regulations regarding the physical operating environment for organizational assets are met01.g, 01.y, 08.d, 08.e, 08.f, 08.g, 08.h, 08.i164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.316 (Policies and procedures and documentation requirements)164.308(a)(7)(i), 164.308(a)(7)(ii)(C), 164.310, 164.316(b)(2)(iii)
PR.IP-6
Data is destroyed according to policy08.l, 08.m, 09.p164.310 (Physical safeguards)164.310(d)(2)(i), 164.310(d)(2)(ii)
PR.IP-7
Protection processes are continuously improved00.a, 03.c, 05.h, 06.a, 11.a, 12.d, 12.e164.306 (Security standards: General rules), 164.308 (Administrative safeguards), 164.316 (Policies and procedures and documentation requirements)164.306(e), 164.308(a)(7)(ii)(D), 164.308(a)(8), 164.316(b)(2)(iii)
PR.IP-8
Effectiveness of protection technologies is shared with appropriate parties05.b, 05.h164.308 (Administrative safeguards)164.308(a)(6)(ii)
PR.IP-9
Response plans (Incident Response and Business Continuity) and recovery plans (Incident Recovery and Disaster Recovery) are in place and managed11.a, 11.c, 12.a, 12.b, 12.c, 12.d, 12.e164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.312 (Technical safeguards)164.308(a)(6), 164.308(a)(7), 164.310(a)(2)(i), 164.312(a)(2)(ii)
PR.IP-10
Response and recovery plans are tested11.c, 12.e164.308 (Administrative safeguards)164.308(a)(7)(ii)(D)
PR.IP-11
Cybersecurity is included in human resources practices (e.g., deprovisioning, personnel screening)01.a, 01.b, 01.c, 01.d, 02.a, 02.b, 02.c, 02.d, 02.e, 02.f, 02.g, 02.h, 02.i, 05.e, 05.k, 06.e, 07.c, 11.a, 11.e, 12.a164.308 (Administrative safeguards)164.308(a)(1)(ii)(C), 164.308(a)(3)
PR.IP-12
A vulnerability management plan is developed and implemented03.c, 06.h, 10.m164.308 (Administrative safeguards)164.308(a)(1)(i), 164.308(a)(1)(ii)(A), 164.308(a)(1)(ii)(B)
PR.MA-1
Maintenance and repair of organizational assets is performed and logged in a timely manner, with approved and controlled tools01.l, 08.j164.308 (Administrative safeguards), 164.310 (Physical safeguards)164.308(a)(3)(ii)(A), 164.310(a)(2)(iv)
PR.MA-2
Remote maintenance of organizational assets is approved, logged, and performed in a manner that prevents unauthorized access01.j, 01.q, 08.j164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.312 (Technical safeguards)164.308(a)(3)(ii)(A), 164.310(d)(1), 164.310(d)(2)(ii), 164.310(d)(2)(iii), 164.312(a), 164.312(a)(2)(ii), 164.312(a)(2)(iv), 164.312(b), 164.312(d), 164.312(e), 164.308(a)(1)(ii)(D)
PR.PT-1
Audit/log records are determined, documented, implemented, and reviewed in accordance with policy01.c, 06.c, 06.i, 07.b, 08.b, 09.aa, 09.ab, 09.ac, 09.ad, 09.ae, 09.af, 09.h, 09.q, 10.i, 10.m164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.312 (Technical safeguards)164.308(a)(1)(ii)(D), 164.308(a)(5)(ii)(C), 164.310(a)(2)(iv), 164.310(d)(2)(iii), 164.312(b)
PR.PT-2
Removable media is protected and its use restricted according to policy01.c, 01.g, 01.h, 01.v, 07.e, 09.o, 09.q, 09.t, 09.u164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.312 (Technical safeguards)164.308(a)(3)(i), 164.308(a)(3)(ii)(A), 164.310(d)(1), 164.310(d)(2), 164.312(a)(1), 164.312(a)(2)(iv), 164.312(b)
PR.PT-3
Access to systems and assets is controlled, incorporating the principle of least functionality01.h, 01.i, 01.l, 01.s, 01.u, 01.v, 06.j, 10.i, 10.j, 10.k, 10.m164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.312 (Technical safeguards)164.308(a)(3), 164.308(a)(4), 164.310(a)(2)(iii), 164.310(b), 164.310(c), 164.312(a)(1), 164.312(a)(2)(i), 164.312(a)(2)(ii), 164.312(a)(2)(iv)
PR.PT-4
Communications and control networks are protected01.c, 01.j, 01.l, 01.m, 01.n, 01.o, 01.t, 01.u, 09.n164.308 (Administrative safeguards), 164.312 (Technical safeguards)164.308(a)(1)(ii)(D), 164.312(a)(1), 164.312(b), 164.312(e)
DE.AE-1
A baseline of network operations and expected data flows for users and systems is established and managed01.i, 01.l, 01.m, 01.n, 05.i, 09.m, 09.n, 09.w, 11.d164.308 (Administrative safeguards), 164.312 (Technical safeguards)164.308(a)(1)(ii)(D), 164.312(b)
DE.AE-2
Detected events are analyzed to understand attack targets and methods09.ab, 11.d164.308 (Administrative safeguards)164.308(6)(i)
DE.AE-3
Event data are aggregated and correlated from multiple sources and sensors01.j, 09.ab, 11.c, 11.c164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.312 (Technical safeguards), 164.314 (Organizational requirements)164.308(a)(1)(ii)(D), 164.308(a)(5)(ii)(B), 164.308(a)(5)(ii)(C), 164.308(a)(6)(ii), 164.308(a)(8), 164.310(d)(2)(iii), 164.312(b), 164.314(a)(2)(i)(C), 164.314(a)(2)(iii)
DE.AE-4
Impact of events is determined09.e, 09.m, 11.d, 12.a, 12.b164.308 (Administrative safeguards)164.308(a)(6)(ii)
DE.AE-5
Incident alert thresholds are established12.d164.308 (Administrative safeguards)164.308(a)(6)(i)
DE.CM-1
The network is monitored to detect potential cybersecurity events01.j, 01.n, 06.e, 09.aa, 09.ab, 09.ac, 09.m, 10.k, 11.a164.308 (Administrative safeguards), 164.312 (Technical safeguards)164.308(a)(1)(ii)(D), 164.308(a)(5)(ii)(B), 164.308(a)(5)(ii)(C), 164.308(a)(8), 164.312(b), 164.312(e)(2)(i)
DE.CM-2
The physical environment is monitored to detect potential cybersecurity events08.a, 08.b, 08.c, 09.ab164.310 (Physical safeguards)164.310(a)(2)(ii), 164.310(a)(2)(iii)
DE.CM-3
Personnel activity is monitored to detect potential cybersecurity events01.b, 01.c, 06.b, 06.e, 08.c, 09.aa, 09.ab, 09.c164.308 (Administrative safeguards), 164.312 (Technical safeguards)164.308(a)(1)(ii)(D), 164.308(a)(3)(ii)(A), 164.308(a)(5)(ii)(C), 164.312(a)(2)(i), 164.312(b), 164.312(d), 164.312(e)
DE.CM-4
Malicious code is detected08.j, 09.ab, 09.j, 09.k, 10.l164.308 (Administrative safeguards)164.308(a)(1)(ii)(D), 164.308(a)(5)(ii)(B)
DE.CM-5
Unauthorized mobile code is detected09.k164.308 (Administrative safeguards)164.308(a)(1)(ii)(D), 164.308(a)(5)(ii)(B)
DE.CM-6
External service provider activity is monitored to detect potential cybersecurity events05.k, 09.e, 09.f, 09.n, 09.z, 10.l164.308 (Administrative safeguards)164.308(a)(1)(ii)(D)
DE.CM-7
Monitoring for unauthorized personnel, connections, devices, and software is performed01.x, 06.g, 08.a, 08.b, 08.c, 09.ab, 09.n, 10.k164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.312 (Technical safeguards), 164.314 (Organizational requirements)164.308(a)(1)(ii)(D), 164.308(a)(5)(ii)(B), 164.308(a)(5)(ii)(C), 164.310(a)(1), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(b), 164.310(c), 164.310(d)(1), 164.310(d)(2)(iii), 164.312(b), 164.314(b)(2)(i)
DE.CM-8
Vulnerability scans are performed06.h, 09.z, 10.b, 10.c, 10.m164.308 (Administrative safeguards)164.308(a)(1)(i), 164.308(a)(8)
DE.DP-1
Roles and responsibilities for detection are well defined to ensure accountability02.a, 06.g, 06.i, 06.j164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.312 (Technical safeguards)164.308(a)(2), 164.308(a)(3)(ii)(A), 164.308(a)(3)(ii)(B), 164.308(a)(4), 164.310(a)(2)(iii), 164.312(a)(1), 164.312(a)(2)(ii)
DE.DP-2
Detection activities comply with all applicable requirements06.i, 08.a, 08.b, 08.c, 09.ab164.308 (Administrative safeguards)164.308(a)(1)(i), 164.308(a)(8)
DE.DP-3
Detection processes are tested08.b, 09.ab164.306 (Security standards: General rules)164.306(e)
DE.DP-4
Event detection information is communicated to appropriate parties05.b, 05.f, 06.g, 06.i, 09.ab, 09.ae, 11.a164.308 (Administrative safeguards), 164.314 (Organizational requirements)164.308(a)(6)(ii), 164.314(a)(2)(i)(C), 164.314(a)(2)(iii)
DE.DP-5
Detection processes are continuously improved09.ab, 10.b164.306 (Security standards: General rules), 164.308 (Administrative safeguards)164.306(e), 164.308(a)(8)
RS.RP-1
Response plan is executed during or after an event11.a, 11.c, 11.d164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.312 (Technical safeguards)164.308(a)(6)(ii), 164.308(a)(7)(i), 164.308(a)(7)(ii)(A), 164.308(a)(7)(ii)(B), 164.308(a)(7)(ii)(C), 164.310(a)(2)(i), 164.312(a)(2)(ii)
RS.CO-1
Personnel know their roles and order of operations when a response is needed02.e, 11.a, 11.c, 12.c, 12.d, 12.e164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.312 (Technical safeguards)164.308(a)(2), 164.308(a)(7)(ii)(A), 164.308(a)(7)(ii)(B), 164.308(a)(7)(ii)(C), 164.310(a)(2)(i), 164.308(a)(6)(i), 164.312(a)(2)(ii)
RS.CO-2
Events are reported consistent with established criteria05.f, 09.ab, 10.c, 11.a, 11.b, 11.c164.308 (Administrative safeguards), 164.314 (Organizational requirements)164.308(a)(5)(ii)(B), 164.308(a)(5)(ii)(C), 164.308(a)(6)(ii), 164.314(a)(2)(i)(C), 164.314(a)(2)(iii)
RS.CO-3
Information is shared consistent with response plans05.f, 05.g, 08.b, 09.ab, 10.m, 11.a, 11.c, 11.d164.308 (Administrative safeguards), 164.314 (Organizational requirements)164.308(a)(5)(ii)(B), 164.308(a)(5)(ii)(C), 164.308(a)(6)(ii), 164.314(a)(2)(i)(C)
RS.CO-4
Coordination with stakeholders occurs consistent with response plans09.f, 11.c, 11.d, 12.c164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.312 (Technical safeguards)164.308(a)(6), 164.308(a)(7), 164.310(a)(2)(i), 164.312(a)(2)(ii)
RS.CO-5
Voluntary information sharing occurs with external stakeholders to achieve broader cybersecurity situational awareness03.b, 05.g, 06.a, 11.a, 11.c164.308 (Administrative safeguards)164.308(a)(6)
RS.AN-1
Notifications from detection systems are investigated08.b, 09.ab, 09.ac, 11.d164.308 (Administrative safeguards), 164.312 (Technical safeguards)164.308(a)(1)(i), 164.308(a)(1)(ii)(D), 164.308(a)(5)(ii)(B), 164.308(a)(5)(ii)(C), 164.308(a)(6)(ii), 164.312(b)
RS.AN-2
The impact of the incident is understood11.d164.308 (Administrative safeguards)164.308(a)(6)(ii), 164.308(a)(7)(ii)(B), 164.308(a)(7)(ii)(C), 164.308(a)(7)(ii)(E)
RS.AN-3
Forensics are performed11.c, 11.d, 11.e164.308 (Administrative safeguards)164.308(a)(6)
RS.AN-4
Incidents are categorized consistent with response plans11.c164.308 (Administrative safeguards)164.308(a)(6)(ii)
RS.MI-1
Incidents are contained01.b, 11.c, 11.d164.308 (Administrative safeguards)164.308(a)(6)(ii)
RS.MI-2
Incidents are mitigated01.b, 09.f, 10.a, 11.c, 11.d164.308 (Administrative safeguards)164.308(a)(6)(ii)
RS.MI-3
Newly identified vulnerabilities are mitigated or documented as accepted risks03.a, 03.c, 06.h, 10.c, 10.m164.308 (Administrative safeguards)164.308(a)(1)(ii)(A), 164.308(a)(1)(ii)(B), 164.308(a)(6)(ii)
RS.IM-1
Response plans incorporate lessons learned11.c, 11.d164.308 (Administrative safeguards), 164.316 (Policies and procedures and documentation requirements)164.308(a)(7)(ii)(D), 164.308(a)(8), 164.316(b)(2)(iii))
RS.IM-2
Response strategies are updated11.c, 11.d164.308 (Administrative safeguards)164.308(a)(7)(ii)(D), 164.308(a)(8)
RC.RP-1
Recoveryplan is executed during or after an event11.d, 12.c164.308 (Administrative safeguards), 164.310 (Physical safeguards)164.308(a)(7), 164.310(a)(2)(i)
RC.IM-1
Recovery plans incorporate lessons learned11.d, 12.e164.308 (Administrative safeguards), 164.316 (Policies and procedures and documentation requirements)164.308(a)(7)(ii)(D), 164.308(a)(8), 164.316(b)(2)(iii)
RC.IM-2
Recovery strategies are updated11.d, 12.e164.308 (Administrative safeguards)164.308(a)(7)(ii)(D), 164.308(a)(8)
RC.CO-1
Public relations are managed11.c, 11.d164.308 (Administrative safeguards)164.308(a)(6)(i)5
RC.CO-2
Reputation after an event is repaired11.c164.308 (Administrative safeguards)164.308(a)(6)(i)5
RC.CO-3
Recovery activities are communicated to internal stakeholders and executive and management teams11.d, 12.c164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.314 (Organizational requirements)164.308(a)(6)(ii), 164.308(a)(7)(ii)(B), 164.308(a)(7)(ii)(C), 164.310(a)(2)(i), 164.314(a)(2)(i)(C)

HIPAA to NIST and HITRUST

HIPAANISTHITRUST
164.308(a)(1)(ii)(A)
ID.AM-1, ID.AM-2, ID.AM-3, ID.BE-1, ID.BE-2, ID.RA-1, ID.RA-3, ID.RA-4, ID.RA-5, PR.DS-3, PR.DS-4, PR.IP-12, RS.MI-307.a, 07.d, 01.l, 01.m, 01.o, 05.i, 09.m, 09.n, 05.d, 09.g, 10.l, 05.a, 12.b, 03.b, 03.d, 06.h, 09.ab, 09.z, 10.c, 10.m, 11.b, 10.k, 01.y, 06.c, 07.b, 08.k, 08.l, 08.m, 09.e, 09.p, 09.q, 09.ac, 09.h, 12.c, 03.c, 03.a
164.310(a)(2)(ii)
ID.AM-1, PR.AC-2, PR.DS-3, DE.CM-2, DE.CM-707.a, 07.d, 01.g, 01.k, 01.l, 01.v, 01.x, 01.y, 08.a, 08.b, 08.c, 08.e, 08.f, 08.h, 08.i, 10.i, 06.c, 07.b, 08.k, 08.l, 08.m, 09.e, 09.p, 09.q, 09.ab, 06.g, 09.n, 10.k
164.310(d)
ID.AM-1, ID.AM-3, PR.DS-107.a, 07.d, 01.m, 01.o, 05.i, 09.m, 09.n, 01.d, 01.j, 01.k, 01.v, 01.x, 01.y, 06.d, 08.j, 09.ac, 09.l, 09.o, 09.x, 09.y, 09.z, 10.f, 10.g, 10.i, 12.c
164.308(a)(7)(ii)(E)
ID.AM-2, ID.AM-5, ID.BE-1, ID.BE-2, ID.BE-3, ID.RA-1, ID.RA-4, ID.RA-5, ID.RM-3, RS.AN-201.l, 07.a, 07.d, 01.a, 01.w, 06.c, 07.b, 12.a, 12.c, 12.d, 05.d, 09.g, 10.l, 05.a, 12.b, 03.a, 05.b, 03.b, 03.d, 06.h, 09.ab, 09.z, 10.c, 10.m, 11.b, 10.k, 05.h, 11.d
164.308(a)(3)(ii)(A)
ID.AM-3, PR.MA-1, PR.MA-2, PR.PT-2, DE.CM-3, DE.DP-101.m, 01.o, 05.i, 09.m, 09.n, 01.l, 08.j, 01.j, 01.q, 01.c, 01.g, 01.h, 01.v, 07.e, 09.o, 09.q, 09.t, 09.u, 01.b, 06.b, 06.e, 08.c, 09.aa, 09.ab, 09.c, 02.a, 06.g, 06.i, 06.j
164.308(a)(8)
ID.AM-3, ID.BE-1, ID.BE-2, ID.BE-5, ID.RA-1, ID.RA-4, PR.IP-1, PR.IP-3, PR.IP-7, DE.AE-3, DE.CM-1, DE.CM-8, DE.DP-2, DE.DP-5, RS.IM-1, RS.IM-2, RC.IM-1, RC.IM-201.m, 01.o, 05.i, 09.m, 09.n, 05.d, 09.g, 10.l, 05.a, 12.b, 12.a, 12.c, 12.d, 03.b, 03.d, 06.h, 09.ab, 09.z, 10.c, 10.m, 11.b, 07.d, 10.k, 01.i, 01.l, 01.w, 01.x, 01.y, 06.b, 07.b, 09.w, 10.h, 01.n, 09.b, 09.d, 00.a, 03.c, 05.h, 06.a, 11.a, 12.e, 01.j, 11.c, 06.e, 09.aa, 09.ac, 10.b, 06.i, 08.a, 08.b, 08.c, 11.d
164.308(a)(4)(ii)(A)
ID.AM-401.i, 09.e, 09.n
164.308(b)
ID.AM-4, ID.GV-2, ID.GV-4, PR.AT-301.i, 09.e, 09.n, 04.a, 05.a, 05.b, 05.c, 05.k, 00.a, 01.a, 01.q, 01.w, 01.x, 01.y, 02.e, 03.a, 03.b, 03.d, 04.b, 05.d, 05.g, 05.h, 06.a, 06.c, 06.i, 07.b, 07.d, 02.d, 05.i, 05.j, 09.f, 09.g, 09.t, 09.x, 10.a, 10.k, 10.l
164.314(a)(1)
ID.AM-4, ID.BE-4, PR.AT-301.i, 09.e, 09.n, 08.h, 12.b, 12.c, 00.a, 02.d, 05.i, 05.j, 05.k, 06.a, 09.f, 09.g, 09.t, 09.x, 10.a, 10.k, 10.l
164.314(a)(2)(i)(B)
ID.AM-401.i, 09.e, 09.n
164.314(a)(2)(ii)
ID.AM-4, PR.AT-301.i, 09.e, 09.n, 00.a, 02.d, 05.i, 05.j, 05.k, 06.a, 09.f, 09.g, 09.t, 09.x, 10.a, 10.k, 10.l
164.316(b)(2)
ID.AM-401.i, 09.e, 09.n
164.308(a)(2)
ID.AM-6, ID.GV-2, PR.AT-2, PR.AT-4, PR.AT-5, DE.DP-1, RS.CO-100.a, 01.a, 02.a, 02.b, 02.c, 02.d, 02.e, 05.e, 05.j, 05.k, 07.b, 07.c, 07.d, 09.m, 09.n, 10.k, 10.m, 11.d, 12.a, 12.c, 12.d, 12.e, 04.a, 05.a, 05.b, 05.c, 01.q, 09.z, 11.a, 06.g, 06.i, 06.j, 11.c
164.308(a)(3)
ID.AM-6, ID.GV-2, ID.RA-3, PR.AC-4, PR.DS-5, PR.IP-11, PR.PT-300.a, 01.a, 02.a, 02.b, 02.c, 02.d, 02.e, 05.e, 05.j, 05.k, 07.b, 07.c, 07.d, 09.m, 09.n, 10.k, 10.m, 11.d, 12.a, 12.c, 12.d, 12.e, 04.a, 05.a, 05.b, 05.c, 03.b, 03.d, 10.l, 12.b, 01.b, 01.c, 01.e, 01.m, 01.p, 01.s, 01.v, 01.x, 02.g, 02.i, 05.i, 06.j, 07.a, 08.i, 09.ac, 09.c, 09.j, 09.r, 09.w, 09.y, 09.z, 10.i, 01.n, 01.o, 01.r, 01.t, 01.u, 01.w, 07.e, 09.i, 09.p, 09.q, 09.s, 09.v, 09.x, 10.b, 10.d, 10.j, 01.d, 02.f, 02.h, 06.e, 11.a, 11.e, 01.h, 01.i, 01.l
164.308(a)(4)
ID.AM-6, ID.GV-2, ID.RA-3, PR.AC-4, PR.DS-5, PR.PT-3, DE.DP-100.a, 01.a, 02.a, 02.b, 02.c, 02.d, 02.e, 05.e, 05.j, 05.k, 07.b, 07.c, 07.d, 09.m, 09.n, 10.k, 10.m, 11.d, 12.a, 12.c, 12.d, 12.e, 04.a, 05.a, 05.b, 05.c, 03.b, 03.d, 10.l, 12.b, 01.b, 01.c, 01.e, 01.m, 01.p, 01.s, 01.v, 01.x, 02.g, 02.i, 05.i, 06.j, 07.a, 08.i, 09.ac, 09.c, 09.j, 09.r, 09.w, 09.y, 09.z, 10.i, 01.n, 01.o, 01.r, 01.t, 01.u, 01.w, 07.e, 09.i, 09.p, 09.q, 09.s, 09.v, 09.x, 10.b, 10.d, 10.j, 01.h, 01.i, 01.l, 06.g, 06.i
164.308(b)(1)
ID.AM-6, PR.AC-3, PR.DS-1, PR.DS-200.a, 01.a, 02.a, 02.b, 02.c, 02.d, 02.e, 05.e, 05.j, 05.k, 07.b, 07.c, 07.d, 09.m, 09.n, 10.k, 10.m, 11.d, 12.a, 12.c, 12.d, 12.e, 01.j, 01.n, 01.q, 01.v, 01.y, 05.i, 09.e, 09.s, 09.w, 10.i, 01.d, 01.k, 01.x, 06.d, 08.j, 09.ac, 09.l, 09.o, 09.x, 09.y, 09.z, 10.f, 10.g, 01.r, 08.i, 09.t, 09.u, 09.v, 10.d
164.314
ID.AM-6, ID.BE-1, ID.BE-2, ID.GV-2, ID.GV-3, ID.RA-300.a, 01.a, 02.a, 02.b, 02.c, 02.d, 02.e, 05.e, 05.j, 05.k, 07.b, 07.c, 07.d, 09.m, 09.n, 10.k, 10.m, 11.d, 12.a, 12.c, 12.d, 12.e, 05.d, 09.g, 10.l, 05.a, 12.b, 04.a, 05.b, 05.c, 04.b, 05.g, 05.i, 06.a, 06.b, 06.c, 06.d, 06.e, 06.f, 06.g, 08.b, 08.c, 08.h, 09.ab, 09.v, 09.x, 09.z, 10.a, 10.f, 11.a, 11.c, 11.e, 03.b, 03.d
164.308(a)(4)(ii)
ID.BE-1, ID.BE-205.d, 09.g, 10.l, 05.a, 12.b
164.308(a)(7)(ii)(C)
ID.BE-1, ID.BE-2, ID.BE-3, ID.RM-3, PR.IP-5, RS.RP-1, RS.CO-1, RS.AN-2, RC.CO-305.d, 09.g, 10.l, 05.a, 12.b, 01.w, 03.a, 05.b, 05.h, 01.g, 01.y, 08.d, 08.e, 08.f, 08.g, 08.h, 08.i, 11.a, 11.c, 11.d, 02.e, 12.c, 12.d, 12.e
164.310(a)(2)(i)
ID.BE-1, ID.BE-2, ID.BE-3, ID.BE-4, ID.BE-5, ID.RM-3, PR.AC-2, PR.DS-4, PR.IP-4, PR.IP-9, RS.RP-1, RS.CO-1, RS.CO-4, RC.RP-1, RC.CO-305.d, 09.g, 10.l, 05.a, 12.b, 01.w, 03.a, 05.b, 08.h, 12.c, 12.a, 12.d, 05.h, 01.g, 01.k, 01.l, 01.v, 01.x, 01.y, 08.a, 08.b, 08.c, 08.e, 08.f, 08.i, 10.i, 09.ac, 09.h, 09.l, 09.w, 11.a, 11.c, 12.e, 11.d, 02.e, 09.f
164.316
ID.BE-1, ID.BE-2, ID.BE-3, ID.GV-1, ID.GV-3, ID.RA-305.d, 09.g, 10.l, 05.a, 12.b, 01.w, 03.a, 05.b, 00.a, 04.a, 04.b, 05.c, 01.a, 02.a, 02.b, 02.c, 02.e, 05.e, 05.g, 05.i, 05.k, 06.a, 06.b, 06.c, 06.d, 06.e, 06.f, 06.g, 07.b, 08.b, 08.c, 08.h, 09.ab, 09.n, 09.v, 09.x, 09.z, 10.a, 10.f, 11.a, 11.c, 11.e, 12.e, 03.b, 03.d, 07.d
164.308(a)(7)(ii)(B)
ID.BE-3, PR.IP-4, RS.RP-1, RS.CO-1, RS.AN-2, RC.CO-301.w, 03.a, 05.a, 05.b, 09.l, 09.w, 11.a, 11.c, 11.d, 02.e, 12.c, 12.d, 12.e
164.308(a)(7)(ii)(D)
ID.BE-3, ID.RA-5, PR.IP-4, PR.IP-7, PR.IP-10, RS.IM-1, RS.IM-2, RC.IM-1, RC.IM-201.w, 03.a, 05.a, 05.b, 03.b, 03.d, 10.k, 10.m, 12.b, 09.l, 09.w, 00.a, 03.c, 05.h, 06.a, 11.a, 12.d, 12.e, 11.c, 11.d
164.308(a)(7)(i)
ID.BE-4, ID.RM-3, PR.AC-2, PR.IP-1, PR.IP-5, RS.RP-108.h, 12.b, 12.c, 03.a, 05.h, 01.g, 01.k, 01.l, 01.v, 01.x, 01.y, 08.a, 08.b, 08.c, 08.e, 08.f, 08.i, 10.i, 01.i, 01.m, 01.w, 06.b, 07.b, 09.m, 09.w, 09.z, 10.h, 10.k, 08.d, 08.g, 11.a, 11.c, 11.d
164.308.(a)(7)(ii)(E)
ID.BE-408.h, 12.b, 12.c
164.312(a)(2)(ii)
ID.BE-4, ID.BE-5, PR.AC-1, PR.AC-4, PR.DS-4, PR.IP-9, PR.MA-2, PR.PT-3, DE.DP-1, RS.RP-1, RS.CO-1, RS.CO-408.h, 12.b, 12.c, 12.a, 12.d, 01.a, 01.b, 01.c, 01.d, 01.e, 01.f, 01.j, 01.k, 01.p, 01.q, 01.r, 01.v, 02.g, 02.i, 05.j, 06.j, 09.m, 10.i, 01.m, 01.s, 01.x, 05.i, 07.a, 07.d, 08.i, 09.ac, 09.c, 09.j, 09.r, 09.w, 09.y, 09.z, 09.h, 11.a, 11.c, 12.e, 08.j, 01.h, 01.i, 01.l, 01.u, 10.j, 10.k, 10.m, 02.a, 06.g, 06.i, 11.d, 02.e, 09.f
164.314(b)(2)(i)
ID.BE-4, ID.BE-5, PR.DS-1, PR.DS-2, DE.CM-708.h, 12.b, 12.c, 12.a, 12.d, 01.d, 01.j, 01.k, 01.v, 01.x, 01.y, 06.d, 08.j, 09.ac, 09.l, 09.o, 09.x, 09.y, 09.z, 10.f, 10.g, 10.i, 01.n, 01.r, 05.i, 08.i, 09.m, 09.s, 09.t, 09.u, 09.v, 10.d, 06.g, 08.a, 08.b, 08.c, 09.ab, 09.n, 10.k
164.308(a)(1)(ii)(B)
ID.BE-5, ID.RA-4, ID.RA-5, ID.RA-6, ID.RM-1, ID.RM-2, ID.RM-3, PR.AC-2, PR.DS-4, PR.IP-12, RS.MI-312.a, 12.b, 12.c, 12.d, 03.b, 03.d, 05.d, 07.d, 09.g, 10.k, 10.m, 03.c, 06.g, 06.h, 03.a, 05.a, 05.h, 05.i, 01.g, 01.k, 01.l, 01.v, 01.x, 01.y, 08.a, 08.b, 08.c, 08.e, 08.f, 08.h, 08.i, 10.i, 09.ac, 09.h, 10.c
164.308(a)(6)(ii)
ID.BE-5, ID.RM-3, PR.IP-8, DE.AE-3, DE.AE-4, DE.DP-4, RS.RP-1, RS.CO-2, RS.CO-3, RS.AN-1, RS.AN-2, RS.AN-4, RS.MI-1, RS.MI-2, RS.MI-3, RC.CO-312.a, 12.b, 12.c, 12.d, 03.a, 05.h, 05.b, 01.j, 09.ab, 11.c, 09.e, 09.m, 11.d, 05.f, 06.g, 06.i, 09.ae, 11.a, 10.c, 11.b, 05.g, 08.b, 10.m, 09.ac, 01.b, 09.f, 10.a, 03.c, 06.h
164.308(a)(7)
ID.BE-5, PR.DS-4, PR.IP-9, RS.CO-4, RC.RP-112.a, 12.b, 12.c, 12.d, 09.ac, 09.h, 11.a, 11.c, 12.e, 09.f, 11.d
164.308(a)(1)(i)
ID.GV-1, ID.GV-2, ID.RA-4, PR.IP-2, PR.IP-12, DE.CM-8, DE.DP-2, RS.AN-100.a, 04.a, 04.b, 05.a, 05.c, 05.b, 05.k, 03.b, 03.d, 05.d, 07.d, 09.g, 10.k, 10.m, 12.b, 09.i, 10.a, 10.l, 03.c, 06.h, 09.z, 10.b, 10.c, 06.i, 08.a, 08.b, 08.c, 09.ab, 09.ac, 11.d
164.306
ID.GV-301.a, 02.a, 02.b, 02.c, 02.e, 04.a, 04.b, 05.b, 05.e, 05.g, 05.i, 05.k, 06.a, 06.b, 06.c, 06.d, 06.e, 06.f, 06.g, 07.b, 08.b, 08.c, 08.h, 09.ab, 09.n, 09.v, 09.x, 09.z, 10.a, 10.f, 11.a, 11.c, 11.e, 12.e
164.308
ID.GV-301.a, 02.a, 02.b, 02.c, 02.e, 04.a, 04.b, 05.b, 05.e, 05.g, 05.i, 05.k, 06.a, 06.b, 06.c, 06.d, 06.e, 06.f, 06.g, 07.b, 08.b, 08.c, 08.h, 09.ab, 09.n, 09.v, 09.x, 09.z, 10.a, 10.f, 11.a, 11.c, 11.e, 12.e
164.310
ID.GV-3, PR.IP-501.a, 02.a, 02.b, 02.c, 02.e, 04.a, 04.b, 05.b, 05.e, 05.g, 05.i, 05.k, 06.a, 06.b, 06.c, 06.d, 06.e, 06.f, 06.g, 07.b, 08.b, 08.c, 08.h, 09.ab, 09.n, 09.v, 09.x, 09.z, 10.a, 10.f, 11.a, 11.c, 11.e, 12.e, 01.g, 01.y, 08.d, 08.e, 08.f, 08.g, 08.i
164.312
ID.GV-301.a, 02.a, 02.b, 02.c, 02.e, 04.a, 04.b, 05.b, 05.e, 05.g, 05.i, 05.k, 06.a, 06.b, 06.c, 06.d, 06.e, 06.f, 06.g, 07.b, 08.b, 08.c, 08.h, 09.ab, 09.n, 09.v, 09.x, 09.z, 10.a, 10.f, 11.a, 11.c, 11.e, 12.e
164.308(a)(1)
ID.GV-400.a, 01.a, 01.q, 01.w, 01.x, 01.y, 02.e, 03.a, 03.b, 03.d, 04.a, 04.b, 05.a, 05.d, 05.g, 05.h, 06.a, 06.c, 06.i, 07.b, 07.d
164.310(a)(1)
ID.RA-1, ID.RA-3, PR.AC-2, PR.AC-5, DE.CM-703.b, 03.d, 06.h, 09.ab, 09.z, 10.c, 10.m, 11.b, 12.b, 07.d, 10.l, 01.g, 01.k, 01.l, 01.v, 01.x, 01.y, 08.a, 08.b, 08.c, 08.e, 08.f, 08.h, 08.i, 10.i, 01.m, 01.n, 01.o, 01.w, 09.m, 09.w, 06.g, 09.n, 10.k
164.312(a)(1)
ID.RA-1, ID.RA-3, PR.AC-4, PR.AC-5, PR.DS-1, PR.PT-2, PR.PT-3, PR.PT-4, DE.DP-103.b, 03.d, 06.h, 09.ab, 09.z, 10.c, 10.m, 11.b, 12.b, 07.d, 10.l, 01.a, 01.b, 01.c, 01.e, 01.m, 01.p, 01.s, 01.v, 01.x, 02.g, 02.i, 05.i, 06.j, 07.a, 08.i, 09.ac, 09.c, 09.j, 09.r, 09.w, 09.y, 10.i, 01.n, 01.o, 01.w, 09.m, 01.d, 01.j, 01.k, 01.y, 06.d, 08.j, 09.l, 09.o, 09.x, 10.f, 10.g, 12.c, 01.g, 01.h, 07.e, 09.q, 09.t, 09.u, 01.i, 01.l, 01.u, 10.j, 10.k, 01.t, 09.n, 02.a, 06.g, 06.i
164.316(b)(2)(iii)
ID.RA-1, PR.IP-5, PR.IP-7, RC.IM-103.b, 03.d, 06.h, 09.ab, 09.z, 10.c, 10.m, 11.b, 12.b, 01.g, 01.y, 08.d, 08.e, 08.f, 08.g, 08.h, 08.i, 00.a, 03.c, 05.h, 06.a, 11.a, 12.d, 12.e, 11.d
No direct analog to HIPAA Security Rule
ID.RA-203.b, 03.d, 05.g, 07.d, 10.m, 12.b
164.308(a)(1)(ii)(D)
ID.RA-3, ID.RA-5, PR.DS-1, PR.DS-5, PR.DS-6, PR.MA-2, PR.PT-1, PR.PT-4, DE.AE-1, DE.AE-3, DE.CM-1, DE.CM-3, DE.CM-4, DE.CM-5, DE.CM-6, DE.CM-7, RS.AN-103.b, 03.d, 07.d, 10.l, 12.b, 10.k, 10.m, 01.d, 01.j, 01.k, 01.v, 01.x, 01.y, 06.d, 08.j, 09.ac, 09.l, 09.o, 09.x, 09.y, 09.z, 10.f, 10.g, 10.i, 12.c, 01.c, 01.m, 01.n, 01.o, 01.p, 01.r, 01.s, 01.t, 01.u, 01.w, 02.b, 02.c, 05.e, 07.c, 07.e, 09.i, 09.m, 09.p, 09.q, 09.s, 09.v, 09.w, 10.b, 10.d, 10.j, 09.ab, 10.c, 01.q, 06.c, 06.i, 07.b, 08.b, 09.aa, 09.ad, 09.ae, 09.af, 09.h, 01.l, 09.n, 01.i, 05.i, 11.d, 11.c, 06.e, 11.a, 01.b, 06.b, 08.c, 09.c, 09.j, 09.k, 05.k, 09.e, 09.f, 06.g, 08.a
164.308(a)(5)(ii)(A)
ID.RA-3, PR.AT-2, PR.AT-4, PR.AT-503.b, 03.d, 07.d, 10.l, 12.b, 00.a, 01.q, 02.d, 02.e, 05.c, 09.z, 05.a, 11.a
164.310(a)(2)(iii)
ID.RA-3, PR.AC-2, PR.AC-4, PR.DS-3, PR.PT-3, DE.CM-2, DE.CM-7, DE.DP-103.b, 03.d, 07.d, 10.l, 12.b, 01.g, 01.k, 01.l, 01.v, 01.x, 01.y, 08.a, 08.b, 08.c, 08.e, 08.f, 08.h, 08.i, 10.i, 01.a, 01.b, 01.c, 01.e, 01.m, 01.p, 01.s, 02.g, 02.i, 05.i, 06.j, 07.a, 09.ac, 09.c, 09.j, 09.r, 09.w, 09.y, 09.z, 06.c, 07.b, 08.k, 08.l, 08.m, 09.e, 09.p, 09.q, 01.h, 01.i, 01.u, 10.j, 10.k, 10.m, 09.ab, 06.g, 09.n, 02.a, 06.i
164.312(c)
ID.RA-3, PR.AC-5, PR.DS-103.b, 03.d, 07.d, 10.l, 12.b, 01.m, 01.n, 01.o, 01.w, 09.m, 09.w, 01.d, 01.j, 01.k, 01.v, 01.x, 01.y, 06.d, 08.j, 09.ac, 09.l, 09.o, 09.x, 09.y, 09.z, 10.f, 10.g, 10.i, 12.c
164.312(e)
ID.RA-3, PR.AC-5, PR.DS-5, PR.MA-2, PR.PT-4, DE.CM-303.b, 03.d, 07.d, 10.l, 12.b, 01.m, 01.n, 01.o, 01.w, 09.m, 09.w, 01.c, 01.p, 01.r, 01.s, 01.t, 01.u, 01.v, 02.b, 02.c, 05.e, 07.c, 07.e, 09.i, 09.p, 09.q, 09.s, 09.v, 09.x, 09.y, 10.b, 10.d, 10.j, 01.j, 01.q, 08.j, 01.l, 09.n, 01.b, 06.b, 06.e, 08.c, 09.aa, 09.ab, 09.c
164.308(a)(6)
ID.RA-4, PR.IP-9, RS.CO-4, RS.CO-5, RS.AN-303.b, 03.d, 05.d, 07.d, 09.g, 10.k, 10.m, 12.b, 11.a, 11.c, 12.a, 12.c, 12.d, 12.e, 09.f, 11.d, 05.g, 06.a, 11.e
164.316(a)
ID.RA-4, ID.RA-503.b, 03.d, 05.d, 07.d, 09.g, 10.k, 10.m, 12.b
164.314(a)(2)(i)(C)
ID.RA-6, DE.AE-3, DE.DP-4, RS.CO-2, RS.CO-3, RC.CO-303.c, 06.g, 06.h, 10.m, 01.j, 09.ab, 11.c, 05.b, 05.f, 06.i, 09.ae, 11.a, 10.c, 11.b, 05.g, 08.b, 11.d, 12.c
164.314(b)(2)(iv)
ID.RA-603.c, 06.g, 06.h, 10.m
164.308(a)(3)(ii)(B)
PR.AC-1, DE.DP-101.a, 01.b, 01.c, 01.d, 01.e, 01.f, 01.j, 01.k, 01.p, 01.q, 01.r, 01.v, 02.g, 02.i, 05.j, 06.j, 09.m, 10.i, 02.a, 06.g, 06.i
164.308(a)(3)(ii)(C)
PR.AC-101.a, 01.b, 01.c, 01.d, 01.e, 01.f, 01.j, 01.k, 01.p, 01.q, 01.r, 01.v, 02.g, 02.i, 05.j, 06.j, 09.m, 10.i
164.308(a)(4)(i)
PR.AC-1, PR.AC-301.a, 01.b, 01.c, 01.d, 01.e, 01.f, 01.j, 01.k, 01.p, 01.q, 01.r, 01.v, 02.g, 02.i, 05.j, 06.j, 09.m, 10.i, 01.n, 01.y, 05.i, 09.e, 09.s, 09.w
164.308(a)(4)(ii)(B)
PR.AC-1, PR.AC-501.a, 01.b, 01.c, 01.d, 01.e, 01.f, 01.j, 01.k, 01.p, 01.q, 01.r, 01.v, 02.g, 02.i, 05.j, 06.j, 09.m, 10.i, 01.m, 01.n, 01.o, 01.w, 09.w
164.308(a)(4)(ii)(C)
PR.AC-101.a, 01.b, 01.c, 01.d, 01.e, 01.f, 01.j, 01.k, 01.p, 01.q, 01.r, 01.v, 02.g, 02.i, 05.j, 06.j, 09.m, 10.i
164.312(a)(2)(i)
PR.AC-1, PR.AC-4, PR.PT-3, DE.CM-301.a, 01.b, 01.c, 01.d, 01.e, 01.f, 01.j, 01.k, 01.p, 01.q, 01.r, 01.v, 02.g, 02.i, 05.j, 06.j, 09.m, 10.i, 01.m, 01.s, 01.x, 05.i, 07.a, 07.d, 08.i, 09.ac, 09.c, 09.j, 09.r, 09.w, 09.y, 09.z, 01.h, 01.i, 01.l, 01.u, 10.j, 10.k, 10.m, 06.b, 06.e, 08.c, 09.aa, 09.ab
164.312(a)(2)(iii)
PR.AC-1, PR.DS-101.a, 01.b, 01.c, 01.d, 01.e, 01.f, 01.j, 01.k, 01.p, 01.q, 01.r, 01.v, 02.g, 02.i, 05.j, 06.j, 09.m, 10.i, 01.x, 01.y, 06.d, 08.j, 09.ac, 09.l, 09.o, 09.x, 09.y, 09.z, 10.f, 10.g, 12.c
164.312(d)
PR.AC-1, PR.DS-1, PR.MA-2, DE.CM-301.a, 01.b, 01.c, 01.d, 01.e, 01.f, 01.j, 01.k, 01.p, 01.q, 01.r, 01.v, 02.g, 02.i, 05.j, 06.j, 09.m, 10.i, 01.x, 01.y, 06.d, 08.j, 09.ac, 09.l, 09.o, 09.x, 09.y, 09.z, 10.f, 10.g, 12.c, 06.b, 06.e, 08.c, 09.aa, 09.ab, 09.c
164.308(a)(7)(ii)(A)
PR.AC-2, PR.IP-4, RS.RP-1, RS.CO-101.g, 01.k, 01.l, 01.v, 01.x, 01.y, 08.a, 08.b, 08.c, 08.e, 08.f, 08.h, 08.i, 10.i, 09.l, 09.w, 11.a, 11.c, 11.d, 02.e, 12.c, 12.d, 12.e
164.310(b)
PR.AC-2, PR.AC-3, PR.AC-4, PR.AC-5, PR.DS-5, PR.PT-3, DE.CM-701.g, 01.k, 01.l, 01.v, 01.x, 01.y, 08.a, 08.b, 08.c, 08.e, 08.f, 08.h, 08.i, 10.i, 01.j, 01.n, 01.q, 05.i, 05.j, 09.e, 09.s, 09.w, 01.a, 01.b, 01.c, 01.e, 01.m, 01.p, 01.s, 02.g, 02.i, 06.j, 07.a, 07.d, 09.ac, 09.c, 09.j, 09.r, 09.y, 09.z, 01.o, 01.w, 09.m, 01.r, 01.t, 01.u, 02.b, 02.c, 05.e, 07.c, 07.e, 09.i, 09.p, 09.q, 09.v, 09.x, 10.b, 10.d, 10.j, 01.h, 01.i, 10.k, 10.m, 06.g, 09.ab, 09.n
164.310(c)
PR.AC-2, PR.DS-5, PR.PT-3, DE.CM-701.g, 01.k, 01.l, 01.v, 01.x, 01.y, 08.a, 08.b, 08.c, 08.e, 08.f, 08.h, 08.i, 10.i, 01.c, 01.m, 01.n, 01.o, 01.p, 01.r, 01.s, 01.t, 01.u, 01.w, 02.b, 02.c, 05.e, 07.c, 07.d, 07.e, 09.i, 09.m, 09.p, 09.q, 09.s, 09.v, 09.w, 09.x, 09.y, 10.b, 10.d, 10.j, 01.h, 01.i, 06.j, 10.k, 10.m, 06.g, 09.ab, 09.n
164.310(d)(1)
PR.AC-2, PR.DS-3, PR.MA-2, PR.PT-2, DE.CM-701.g, 01.k, 01.l, 01.v, 01.x, 01.y, 08.a, 08.b, 08.c, 08.e, 08.f, 08.h, 08.i, 10.i, 06.c, 07.a, 07.b, 07.d, 08.k, 08.l, 08.m, 09.e, 09.p, 09.q, 01.j, 01.q, 08.j, 01.c, 01.h, 07.e, 09.o, 09.t, 09.u, 06.g, 09.ab, 09.n, 10.k
164.310(d)(2)(iii)
PR.AC-2, PR.MA-2, PR.PT-1, DE.AE-3, DE.CM-701.g, 01.k, 01.l, 01.v, 01.x, 01.y, 08.a, 08.b, 08.c, 08.e, 08.f, 08.h, 08.i, 10.i, 01.j, 01.q, 08.j, 01.c, 06.c, 06.i, 07.b, 09.aa, 09.ab, 09.ac, 09.ad, 09.ae, 09.af, 09.h, 09.q, 10.m, 11.c, 06.g, 09.n, 10.k
164.308(b)(3)
PR.AC-301.j, 01.n, 01.q, 01.v, 01.y, 05.i, 05.j, 09.e, 09.s, 09.w, 10.i
164.312(e)(1)
PR.AC-3, PR.DS-201.j, 01.n, 01.q, 01.v, 01.y, 05.i, 05.j, 09.e, 09.s, 09.w, 10.i, 01.d, 01.r, 06.d, 08.i, 09.ac, 09.l, 09.m, 09.t, 09.u, 09.v, 09.x, 09.y, 09.z, 10.d, 10.f, 10.g
164.312(e)(2)(ii)
PR.AC-3, PR.DS-201.j, 01.n, 01.q, 01.v, 01.y, 05.i, 05.j, 09.e, 09.s, 09.w, 10.i, 01.d, 01.r, 06.d, 08.i, 09.ac, 09.l, 09.m, 09.t, 09.u, 09.v, 09.x, 09.y, 09.z, 10.d, 10.f, 10.g
164.312(b)
PR.AC-5, PR.DS-1, PR.DS-6, PR.MA-2, PR.PT-1, PR.PT-2, PR.PT-4, DE.AE-1, DE.AE-3, DE.CM-1, DE.CM-3, DE.CM-7, RS.AN-101.m, 01.n, 01.o, 01.w, 09.m, 09.w, 01.d, 01.j, 01.k, 01.v, 01.x, 01.y, 06.d, 08.j, 09.ac, 09.l, 09.o, 09.x, 09.y, 09.z, 10.f, 10.g, 10.i, 12.c, 09.ab, 10.b, 10.c, 10.d, 01.q, 01.c, 06.c, 06.i, 07.b, 08.b, 09.aa, 09.ad, 09.ae, 09.af, 09.h, 09.q, 10.m, 01.g, 01.h, 07.e, 09.t, 09.u, 01.l, 01.t, 01.u, 09.n, 01.i, 05.i, 11.d, 11.c, 06.e, 10.k, 11.a, 01.b, 06.b, 08.c, 09.c, 06.g, 08.a
164.308(a)(5)
PR.AT-100.a, 01.f, 01.g, 01.p, 01.x, 01.y, 02.d, 02.e, 05.c, 07.c, 09.j, 09.s, 11.b, 11.c, 12.c, 12.d
164.308(a)(3)(i)
PR.AT-2, PR.AT-4, PR.AT-5, PR.PT-200.a, 01.q, 02.d, 02.e, 05.c, 09.z, 05.a, 11.a, 01.c, 01.g, 01.h, 01.v, 07.e, 09.o, 09.q, 09.t, 09.u
164.308(a)(5)(i)
PR.AT-2, PR.AT-4, PR.AT-500.a, 01.q, 02.d, 02.e, 05.c, 09.z, 05.a, 11.a
164.308(a)(5)(ii)(B)
PR.AT-2, PR.AT-4, PR.AT-5, DE.AE-3, DE.CM-1, DE.CM-4, DE.CM-5, DE.CM-7, RS.CO-2, RS.CO-3, RS.AN-100.a, 01.q, 02.d, 02.e, 05.c, 09.z, 05.a, 11.a, 01.j, 09.ab, 11.c, 01.n, 06.e, 09.aa, 09.ac, 09.m, 10.k, 08.j, 09.j, 09.k, 10.l, 01.x, 06.g, 08.a, 08.b, 08.c, 09.n, 05.f, 10.c, 11.b, 05.g, 10.m, 11.d
164.308(a)(5)(ii)(C)
PR.AT-2, PR.AT-4, PR.AT-5, PR.PT-1, DE.AE-3, DE.CM-1, DE.CM-3, DE.CM-7, RS.CO-2, RS.CO-3, RS.AN-100.a, 01.q, 02.d, 02.e, 05.c, 09.z, 05.a, 11.a, 01.c, 06.c, 06.i, 07.b, 08.b, 09.aa, 09.ab, 09.ac, 09.ad, 09.ae, 09.af, 09.h, 09.q, 10.i, 10.m, 01.j, 11.c, 01.n, 06.e, 09.m, 10.k, 01.b, 06.b, 08.c, 09.c, 01.x, 06.g, 08.a, 09.n, 05.f, 10.c, 11.b, 05.g, 11.d
164.308(a)(5)(ii)(D)
PR.AT-2, PR.AT-4, PR.AT-500.a, 01.q, 02.d, 02.e, 05.c, 09.z, 05.a, 11.a
164.314(a)(2)(i)
PR.AT-300.a, 02.d, 05.i, 05.j, 05.k, 06.a, 09.e, 09.f, 09.g, 09.n, 09.t, 09.x, 10.a, 10.k, 10.l
164.530(b)(1)
PR.AT-500.a, 02.d, 02.e, 05.c, 11.a
164.312(a)(2)(iv)
PR.DS-1, PR.MA-2, PR.PT-2, PR.PT-301.d, 01.j, 01.k, 01.v, 01.x, 01.y, 06.d, 08.j, 09.ac, 09.l, 09.o, 09.x, 09.y, 09.z, 10.f, 10.g, 10.i, 12.c, 01.q, 01.c, 01.g, 01.h, 07.e, 09.q, 09.t, 09.u, 01.i, 01.l, 01.s, 01.u, 06.j, 10.j, 10.k, 10.m
164.308(b)(2)
PR.DS-201.d, 01.j, 01.n, 01.r, 01.y, 05.i, 06.d, 08.i, 09.ac, 09.l, 09.m, 09.s, 09.t, 09.u, 09.v, 09.x, 09.y, 09.z, 10.d, 10.f, 10.g
164.312(e)(2)(i)
PR.DS-2, PR.DS-6, DE.CM-101.d, 01.j, 01.n, 01.r, 01.y, 05.i, 06.d, 08.i, 09.ac, 09.l, 09.m, 09.s, 09.t, 09.u, 09.v, 09.x, 09.y, 09.z, 10.d, 10.f, 10.g, 09.ab, 10.b, 10.c, 06.e, 09.aa, 10.k, 11.a
164.310(a)(2)(iv)
PR.DS-3, PR.MA-1, PR.PT-101.y, 06.c, 07.a, 07.b, 07.d, 08.k, 08.l, 08.m, 09.e, 09.p, 09.q, 01.l, 08.j, 01.c, 06.i, 08.b, 09.aa, 09.ab, 09.ac, 09.ad, 09.ae, 09.af, 09.h, 10.i, 10.m
164.310(d)(2)
PR.DS-3, PR.PT-201.y, 06.c, 07.a, 07.b, 07.d, 08.k, 08.l, 08.m, 09.e, 09.p, 09.q, 01.c, 01.g, 01.h, 01.v, 07.e, 09.o, 09.t, 09.u
164.310(d)(2)(iv)
PR.DS-4, PR.IP-409.ac, 09.h, 12.c, 09.l, 09.w
164.312(a)
PR.DS-5, PR.MA-201.c, 01.m, 01.n, 01.o, 01.p, 01.r, 01.s, 01.t, 01.u, 01.v, 01.w, 02.b, 02.c, 05.e, 07.c, 07.d, 07.e, 09.i, 09.m, 09.p, 09.q, 09.s, 09.v, 09.w, 09.x, 09.y, 10.b, 10.d, 10.j, 01.j, 01.q, 08.j
164.312(c)(1)
PR.DS-609.ab, 09.ac, 09.z, 10.b, 10.c, 10.d
164.312(c)(2)
PR.DS-609.ab, 09.ac, 09.z, 10.b, 10.c, 10.d
164.308(a)(4)4
PR.DS-709.d, 09.k, 10.h
164.308(a)(7)(ii)
PR.IP-101.i, 01.l, 01.m, 01.w, 01.x, 01.y, 06.b, 07.b, 09.m, 09.w, 09.z, 10.h, 10.k
164.310(d)(2)(i)
PR.IP-608.l, 08.m, 09.p
164.310(d)(2)(ii)
PR.IP-6, PR.MA-208.l, 08.m, 09.p, 01.j, 01.q, 08.j
164.306(e)
PR.IP-7, DE.DP-3, DE.DP-500.a, 03.c, 05.h, 06.a, 11.a, 12.d, 12.e, 08.b, 09.ab, 10.b
164.308(a)(1)(ii)(C)
PR.IP-1101.a, 01.b, 01.c, 01.d, 02.a, 02.b, 02.c, 02.d, 02.e, 02.f, 02.g, 02.h, 02.i, 05.e, 05.k, 06.e, 07.c, 11.a, 11.e, 12.a
164.308(6)(i)
DE.AE-209.ab, 11.d
164.314(a)(2)(iii)
DE.AE-3, DE.DP-4, RS.CO-201.j, 09.ab, 11.c, 05.b, 05.f, 06.g, 06.i, 09.ae, 11.a, 10.c, 11.b
164.308(a)(6)(i)
DE.AE-5, RS.CO-112.d, 02.e, 11.a, 11.c, 12.c, 12.e
164.316(b)(2)(iii))
RS.IM-111.c, 11.d
164.308(a)(6)(i)5
RC.CO-1, RC.CO-211.c, 11.d

HITRUST to NIST and HIPAA

HITRUSTDescriptionNISTHIPAA LawHIPAA Detail
00.a
An Information Security Management Program (ISMP) shall be defined in terms of the characteristics of the business and established and managed including monitoring, maintenance and improvement.ID.AM-6, ID.GV-1, ID.GV-4, PR.AT-1, PR.AT-2, PR.AT-3, PR.AT-4, PR.AT-5, PR.IP-7164.306 (Security standards: General rules), 164.308 (Administrative safeguards), 164.314 (Organizational requirements), 164.316 (Policies and procedures and documentation requirements), 164.530 (Administrative requirements)164.306(e), 164.308(a)(1), 164.308(a)(1)(i), 164.308(a)(2), 164.308(a)(3), 164.308(a)(3)(i), 164.308(a)(4), 164.308(a)(5), 164.308(a)(5)(i), 164.308(a)(5)(ii)(A), 164.308(a)(5)(ii)(B), 164.308(a)(5)(ii)(C), 164.308(a)(5)(ii)(D), 164.308(a)(7)(ii)(D), 164.308(a)(8), 164.308(b), 164.308(b)(1), 164.314, 164.314(a)(1), 164.314(a)(2)(i), 164.314(a)(2)(ii), 164.316, 164.316(b)(2)(iii), 164.530(b)(1)
01.a
An access control policy shall be established, documented, and reviewed based on business and security requirements for accessID.AM-5, ID.AM-6, ID.GV-3, ID.GV-4, PR.AC-1, PR.AC-4, PR.AC-7, PR.IP-11164.306 (Security standards: General rules), 164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.312 (Technical safeguards), 164.314 (Organizational requirements), 164.316 (Policies and procedures and documentation requirements)164.306, 164.308, 164.308(a)(1), 164.308(a)(1)(ii)(C), 164.308(a)(2), 164.308(a)(3), 164.308(a)(3)(ii)(B), 164.308(a)(3)(ii)(C), 164.308(a)(4), 164.308(a)(4)(i), 164.308(a)(4)(ii)(B), 164.308(a)(4)(ii)(C), 164.308(a)(7)(ii)(E), 164.308(b), 164.308(b)(1), 164.310, 164.310(a)(2)(iii), 164.310(b), 164.312, 164.312(a)(1), 164.312(a)(2)(i), 164.312(a)(2)(ii), 164.312(a)(2)(iii), 164.312(d), 164.314, 164.316
01.b
There shall be a formal documented and implemented user registration and deregistration procedure for granting and revoking access.PR.AC-1, PR.AC-4, PR.AC-6, PR.AC-7, PR.IP-11, DE.CM-3, RS.MI-1, RS.MI-2164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.312 (Technical safeguards)164.308(a)(1)(ii)(C), 164.308(a)(1)(ii)(D), 164.308(a)(3), 164.308(a)(3)(ii)(A), 164.308(a)(3)(ii)(B), 164.308(a)(3)(ii)(C), 164.308(a)(4), 164.308(a)(4)(i), 164.308(a)(4)(ii)(B), 164.308(a)(4)(ii)(C), 164.308(a)(5)(ii)(C), 164.308(a)(6)(ii), 164.310(a)(2)(iii), 164.310(b), 164.312(a)(1), 164.312(a)(2)(i), 164.312(a)(2)(ii), 164.312(a)(2)(iii), 164.312(b), 164.312(d), 164.312(e)
01.c
The allocation and use of privileges to information systems and services shall be restricted and controlled. Special attention shall be given to the allocation of privileged access rights, which allow users to override system controlsPR.AC-1, PR.AC-4, PR.DS-5, PR.IP-11, PR.PT-1, PR.PT-2, PR.PT-4, DE.CM-3164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.312 (Technical safeguards)164.308(a)(1)(ii)(C), 164.308(a)(1)(ii)(D), 164.308(a)(3), 164.308(a)(3)(i), 164.308(a)(3)(ii)(A), 164.308(a)(3)(ii)(B), 164.308(a)(3)(ii)(C), 164.308(a)(4), 164.308(a)(4)(i), 164.308(a)(4)(ii)(B), 164.308(a)(4)(ii)(C), 164.308(a)(5)(ii)(C), 164.310(a)(2)(iii), 164.310(a)(2)(iv), 164.310(b), 164.310(c), 164.310(d)(1), 164.310(d)(2), 164.310(d)(2)(iii), 164.312(a), 164.312(a)(1), 164.312(a)(2)(i), 164.312(a)(2)(ii), 164.312(a)(2)(iii), 164.312(a)(2)(iv), 164.312(b), 164.312(d), 164.312(e)
01.d
Passwords shall be controlled through a formal management processPR.AC-1, PR.AC-7, PR.DS-1, PR.DS-2, PR.IP-11164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.312 (Technical safeguards), 164.314 (Organizational requirements)164.308(a)(1)(ii)(C), 164.308(a)(1)(ii)(D), 164.308(a)(3), 164.308(a)(3)(ii)(B), 164.308(a)(3)(ii)(C), 164.308(a)(4)(i), 164.308(a)(4)(ii)(B), 164.308(a)(4)(ii)(C), 164.308(b)(1), 164.308(b)(2), 164.310(d), 164.312(a)(1), 164.312(a)(2)(i), 164.312(a)(2)(ii), 164.312(a)(2)(iii), 164.312(a)(2)(iv), 164.312(b), 164.312(c), 164.312(d), 164.312(e)(1), 164.312(e)(2)(i), 164.312(e)(2)(ii), 164.314(b)(2)(i)
01.e
All access rights shall be regularly reviewed by management via a formal documented processPR.AC-1, PR.AC-4164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.312 (Technical safeguards)164.308(a)(3), 164.308(a)(3)(ii)(B), 164.308(a)(3)(ii)(C), 164.308(a)(4), 164.308(a)(4)(i), 164.308(a)(4)(ii)(B), 164.308(a)(4)(ii)(C), 164.310(a)(2)(iii), 164.310(b), 164.312(a)(1), 164.312(a)(2)(i), 164.312(a)(2)(ii), 164.312(a)(2)(iii), 164.312(d)
01.f
Users shall be made aware of their responsibilities for maintaining effective access controls and shall be required to follow good security practices in the selection and use of passwords and security of equipmentPR.AC-1, PR.AC-7, PR.AT-1164.308 (Administrative safeguards), 164.312 (Technical safeguards)164.308(a)(3)(ii)(B), 164.308(a)(3)(ii)(C), 164.308(a)(4)(i), 164.308(a)(4)(ii)(B), 164.308(a)(4)(ii)(C), 164.308(a)(5), 164.312(a)(2)(i), 164.312(a)(2)(ii), 164.312(a)(2)(iii), 164.312(d)
01.g
Users shall ensure that unattended equipment has appropriate protectionPR.AC-2, PR.AT-1, PR.IP-5, PR.PT-2164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.312 (Technical safeguards), 164.316 (Policies and procedures and documentation requirements)164.308(a)(1)(ii)(B), 164.308(a)(3)(i), 164.308(a)(3)(ii)(A), 164.308(a)(5), 164.308(a)(7)(i), 164.308(a)(7)(ii)(A), 164.308(a)(7)(ii)(C), 164.310, 164.310(a)(1), 164.310(a)(2)(i), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(b), 164.310(c), 164.310(d)(1), 164.310(d)(2), 164.310(d)(2)(iii), 164.312(a)(1), 164.312(a)(2)(iv), 164.312(b), 164.316(b)(2)(iii)
01.h
A clear desk policy for papers and removable storage media and a clear screen policy for information assets shall be adoptedPR.PT-2, PR.PT-3164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.312 (Technical safeguards)164.308(a)(3), 164.308(a)(3)(i), 164.308(a)(3)(ii)(A), 164.308(a)(4), 164.310(a)(2)(iii), 164.310(b), 164.310(c), 164.310(d)(1), 164.310(d)(2), 164.312(a)(1), 164.312(a)(2)(i), 164.312(a)(2)(ii), 164.312(a)(2)(iv), 164.312(b)
01.i
Users shall only be provided with access to internal and external network services that they have been specifically authorized to use. Authentication and authorization mechanisms shall be applied for users and equipmentID.AM-4, PR.IP-1, PR.PT-3, DE.AE-1164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.312 (Technical safeguards), 164.314 (Organizational requirements), 164.316 (Policies and procedures and documentation requirements)164.308(a)(1)(ii)(D), 164.308(a)(3), 164.308(a)(4), 164.308(a)(4)(ii)(A), 164.308(a)(7)(i), 164.308(a)(7)(ii), 164.308(a)(8), 164.308(b), 164.310(a)(2)(iii), 164.310(b), 164.310(c), 164.312(a)(1), 164.312(a)(2)(i), 164.312(a)(2)(ii), 164.312(a)(2)(iv), 164.312(b), 164.314(a)(1), 164.314(a)(2)(i)(B), 164.314(a)(2)(ii), 164.316(b)(2)
01.j
Appropriate authentication methods shall be used to control access by remote usersPR.AC-1, PR.AC-3, PR.AC-7, PR.DS-1, PR.DS-2, PR.MA-2, PR.PT-4, DE.AE-3, DE.CM-1164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.312 (Technical safeguards), 164.314 (Organizational requirements)164.308(a)(1)(ii)(D), 164.308(a)(3)(ii)(A), 164.308(a)(3)(ii)(B), 164.308(a)(3)(ii)(C), 164.308(a)(4)(i), 164.308(a)(4)(ii)(B), 164.308(a)(4)(ii)(C), 164.308(a)(5)(ii)(B), 164.308(a)(5)(ii)(C), 164.308(a)(6)(ii), 164.308(a)(8), 164.308(b)(1), 164.308(b)(2), 164.308(b)(3), 164.310(b), 164.310(d), 164.310(d)(1), 164.310(d)(2)(ii), 164.310(d)(2)(iii), 164.312(a), 164.312(a)(1), 164.312(a)(2)(i), 164.312(a)(2)(ii), 164.312(a)(2)(iii), 164.312(a)(2)(iv), 164.312(b), 164.312(c), 164.312(d), 164.312(e), 164.312(e)(1), 164.312(e)(2)(i), 164.312(e)(2)(ii), 164.314(a)(2)(i)(C), 164.314(a)(2)(iii), 164.314(b)(2)(i)
01.k
Automatic equipment identification shall be used as a means to authenticate connections from specific locations and equipmentPR.AC-1, PR.AC-2, PR.AC-7, PR.DS-1, PR.DS-8164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.312 (Technical safeguards), 164.314 (Organizational requirements)164.308(a)(1)(ii)(B), 164.308(a)(1)(ii)(D), 164.308(a)(3)(ii)(B), 164.308(a)(3)(ii)(C), 164.308(a)(4)(i), 164.308(a)(4)(ii)(B), 164.308(a)(4)(ii)(C), 164.308(a)(7)(i), 164.308(a)(7)(ii)(A), 164.308(b)(1), 164.310(a)(1), 164.310(a)(2)(i), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(b), 164.310(c), 164.310(d), 164.310(d)(1), 164.310(d)(2)(iii), 164.312(a)(1), 164.312(a)(2)(i), 164.312(a)(2)(ii), 164.312(a)(2)(iii), 164.312(a)(2)(iv), 164.312(b), 164.312(c), 164.312(d), 164.314(b)(2)(i)
01.l
Physical and logical access to diagnostic and configuration ports shall be controlledID.AM-2, PR.AC-2, PR.IP-1, PR.IP-3, PR.MA-1, PR.PT-3, PR.PT-4, DE.AE-1164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.312 (Technical safeguards)164.308(a)(1)(ii)(A), 164.308(a)(1)(ii)(B), 164.308(a)(1)(ii)(D), 164.308(a)(3), 164.308(a)(3)(ii)(A), 164.308(a)(4), 164.308(a)(7)(i), 164.308(a)(7)(ii), 164.308(a)(7)(ii)(A), 164.308(a)(7)(ii)(E), 164.308(a)(8), 164.310(a)(1), 164.310(a)(2)(i), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(a)(2)(iv), 164.310(b), 164.310(c), 164.310(d)(1), 164.310(d)(2)(iii), 164.312(a)(1), 164.312(a)(2)(i), 164.312(a)(2)(ii), 164.312(a)(2)(iv), 164.312(b), 164.312(e)
01.m
Groups of information services, users, and information systems should be segregated on networksID.AM-3, PR.AC-4, PR.AC-5, PR.DS-5, PR.IP-1, PR.PT-4, DE.AE-1164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.312 (Technical safeguards)164.308(a)(1)(ii)(A), 164.308(a)(1)(ii)(D), 164.308(a)(3), 164.308(a)(3)(ii)(A), 164.308(a)(4), 164.308(a)(4)(ii)(B), 164.308(a)(7)(i), 164.308(a)(7)(ii), 164.308(a)(8), 164.310(a)(1), 164.310(a)(2)(iii), 164.310(b), 164.310(c), 164.310(d), 164.312(a), 164.312(a)(1), 164.312(a)(2)(i), 164.312(a)(2)(ii), 164.312(b), 164.312(c), 164.312(e)
01.n
For shared networks, especially those extending across the organization's boundaries, the capability of users to connect to the network shall be restricted, in line with the access control policy and requirements of the business applicationsPR.AC-3, PR.AC-5, PR.DS-2, PR.DS-5, PR.IP-3, PR.PT-4, DE.AE-1, DE.CM-1164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.312 (Technical safeguards), 164.314 (Organizational requirements)164.308(a)(1)(ii)(D), 164.308(a)(3), 164.308(a)(4), 164.308(a)(4)(i), 164.308(a)(4)(ii)(B), 164.308(a)(5)(ii)(B), 164.308(a)(5)(ii)(C), 164.308(a)(8), 164.308(b)(1), 164.308(b)(2), 164.308(b)(3), 164.310(a)(1), 164.310(b), 164.310(c), 164.312(a), 164.312(a)(1), 164.312(b), 164.312(c), 164.312(e), 164.312(e)(1), 164.312(e)(2)(i), 164.312(e)(2)(ii), 164.314(b)(2)(i)
01.o
Routing controls shall be implemented for networks to ensure that computer connections and information flows do not breach the access control policy of the business applicationsID.AM-3, PR.AC-5, PR.DS-5, PR.PT-4164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.312 (Technical safeguards)164.308(a)(1)(ii)(A), 164.308(a)(1)(ii)(D), 164.308(a)(3), 164.308(a)(3)(ii)(A), 164.308(a)(4), 164.308(a)(4)(ii)(B), 164.308(a)(8), 164.310(a)(1), 164.310(b), 164.310(c), 164.310(d), 164.312(a), 164.312(a)(1), 164.312(b), 164.312(c), 164.312(e)
01.p
Access to operating systems shall be controlled by a secure log-on procedurePR.AC-1, PR.AC-4, PR.AC-7, PR.AT-1, PR.DS-5164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.312 (Technical safeguards)164.308(a)(1)(ii)(D), 164.308(a)(3), 164.308(a)(3)(ii)(B), 164.308(a)(3)(ii)(C), 164.308(a)(4), 164.308(a)(4)(i), 164.308(a)(4)(ii)(B), 164.308(a)(4)(ii)(C), 164.308(a)(5), 164.310(a)(2)(iii), 164.310(b), 164.310(c), 164.312(a), 164.312(a)(1), 164.312(a)(2)(i), 164.312(a)(2)(ii), 164.312(a)(2)(iii), 164.312(d), 164.312(e)
01.q
All users shall have a unique identifier (user ID) for their personal use only, and an authentication technique shall be implemented to substantiate the claimed identity of a userID.GV-4, PR.AC-1, PR.AC-3, PR.AC-7, PR.AT-2, PR.MA-2164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.312 (Technical safeguards)164.308(a)(1), 164.308(a)(1)(ii)(D), 164.308(a)(2), 164.308(a)(3)(i), 164.308(a)(3)(ii)(A), 164.308(a)(3)(ii)(B), 164.308(a)(3)(ii)(C), 164.308(a)(4)(i), 164.308(a)(4)(ii)(B), 164.308(a)(4)(ii)(C), 164.308(a)(5)(i), 164.308(a)(5)(ii)(A), 164.308(a)(5)(ii)(B), 164.308(a)(5)(ii)(C), 164.308(a)(5)(ii)(D), 164.308(b), 164.308(b)(1), 164.308(b)(3), 164.310(b), 164.310(d)(1), 164.310(d)(2)(ii), 164.310(d)(2)(iii), 164.312(a), 164.312(a)(2)(i), 164.312(a)(2)(ii), 164.312(a)(2)(iii), 164.312(a)(2)(iv), 164.312(b), 164.312(d), 164.312(e), 164.312(e)(1), 164.312(e)(2)(ii)
01.r
Systems for managing passwords shall be interactive and shall ensure quality passwordsPR.AC-1, PR.AC-7, PR.DS-2, PR.DS-5164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.312 (Technical safeguards), 164.314 (Organizational requirements)164.308(a)(1)(ii)(D), 164.308(a)(3), 164.308(a)(3)(ii)(B), 164.308(a)(3)(ii)(C), 164.308(a)(4), 164.308(a)(4)(i), 164.308(a)(4)(ii)(B), 164.308(a)(4)(ii)(C), 164.308(b)(1), 164.308(b)(2), 164.310(b), 164.310(c), 164.312(a), 164.312(a)(2)(i), 164.312(a)(2)(ii), 164.312(a)(2)(iii), 164.312(d), 164.312(e), 164.312(e)(1), 164.312(e)(2)(i), 164.312(e)(2)(ii), 164.314(b)(2)(i)
01.s
The use of utility programs that might be capable of overriding system and application controls shall be restricted and tightly controlledPR.AC-4, PR.DS-5, PR.PT-3164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.312 (Technical safeguards)164.308(a)(1)(ii)(D), 164.308(a)(3), 164.308(a)(4), 164.310(a)(2)(iii), 164.310(b), 164.310(c), 164.312(a), 164.312(a)(1), 164.312(a)(2)(i), 164.312(a)(2)(ii), 164.312(a)(2)(iv), 164.312(e)
01.t
Inactive sessions shall shut down after a defined period of inactivityPR.AC-7, PR.DS-5, PR.PT-4164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.312 (Technical safeguards)164.308(a)(1)(ii)(D), 164.308(a)(3), 164.308(a)(4), 164.310(b), 164.310(c), 164.312(a), 164.312(a)(1), 164.312(b), 164.312(e)
01.u
Restrictions on connection times shall be used to provide additional security for high-risk applicationsPR.AC-7, PR.DS-5, PR.PT-3, PR.PT-4164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.312 (Technical safeguards)164.308(a)(1)(ii)(D), 164.308(a)(3), 164.308(a)(4), 164.310(a)(2)(iii), 164.310(b), 164.310(c), 164.312(a), 164.312(a)(1), 164.312(a)(2)(i), 164.312(a)(2)(ii), 164.312(a)(2)(iv), 164.312(b), 164.312(e)
01.v
Logical and physical access to information and application systems and functions by users and support personnel shall be restricted in accordance with the defined access control policyPR.AC-1, PR.AC-2, PR.AC-3, PR.AC-4, PR.DS-1, PR.DS-5, PR.PT-2, PR.PT-3164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.312 (Technical safeguards), 164.314 (Organizational requirements)164.308(a)(1)(ii)(B), 164.308(a)(1)(ii)(D), 164.308(a)(3), 164.308(a)(3)(i), 164.308(a)(3)(ii)(A), 164.308(a)(3)(ii)(B), 164.308(a)(3)(ii)(C), 164.308(a)(4), 164.308(a)(4)(i), 164.308(a)(4)(ii)(B), 164.308(a)(4)(ii)(C), 164.308(a)(7)(i), 164.308(a)(7)(ii)(A), 164.308(b)(1), 164.308(b)(3), 164.310(a)(1), 164.310(a)(2)(i), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(b), 164.310(c), 164.310(d), 164.310(d)(1), 164.310(d)(2), 164.310(d)(2)(iii), 164.312(a), 164.312(a)(1), 164.312(a)(2)(i), 164.312(a)(2)(ii), 164.312(a)(2)(iii), 164.312(a)(2)(iv), 164.312(b), 164.312(c), 164.312(d), 164.312(e), 164.312(e)(1), 164.312(e)(2)(ii), 164.314(b)(2)(i)
01.w
Sensitive systems shall have a dedicated and isolated computing environmentID.AM-5, ID.BE-3, ID.GV-4, PR.AC-5, PR.DS-5, PR.IP-1164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.312 (Technical safeguards), 164.316 (Policies and procedures and documentation requirements)164.308(a)(1), 164.308(a)(1)(ii)(D), 164.308(a)(3), 164.308(a)(4), 164.308(a)(4)(ii)(B), 164.308(a)(7)(i), 164.308(a)(7)(ii), 164.308(a)(7)(ii)(B), 164.308(a)(7)(ii)(C), 164.308(a)(7)(ii)(D), 164.308(a)(7)(ii)(E), 164.308(a)(8), 164.308(b), 164.310(a)(1), 164.310(a)(2)(i), 164.310(b), 164.310(c), 164.312(a), 164.312(a)(1), 164.312(b), 164.312(c), 164.312(e), 164.316
01.x
A formal policy shall be in place, and appropriate security measures shall be adopted to protect against the risks of using mobile computing and communication devicesID.GV-4, PR.AC-2, PR.AC-4, PR.AT-1, PR.DS-1, PR.IP-1, DE.CM-7164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.312 (Technical safeguards), 164.314 (Organizational requirements)164.308(a)(1), 164.308(a)(1)(ii)(B), 164.308(a)(1)(ii)(D), 164.308(a)(3), 164.308(a)(4), 164.308(a)(5), 164.308(a)(5)(ii)(B), 164.308(a)(5)(ii)(C), 164.308(a)(7)(i), 164.308(a)(7)(ii), 164.308(a)(7)(ii)(A), 164.308(a)(8), 164.308(b), 164.308(b)(1), 164.310(a)(1), 164.310(a)(2)(i), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(b), 164.310(c), 164.310(d), 164.310(d)(1), 164.310(d)(2)(iii), 164.312(a)(1), 164.312(a)(2)(i), 164.312(a)(2)(ii), 164.312(a)(2)(iii), 164.312(a)(2)(iv), 164.312(b), 164.312(c), 164.312(d), 164.314(b)(2)(i)
01.y
A policy, operational plans and procedures shall be developed and implemented for teleworking activitiesID.GV-4, PR.AC-2, PR.AC-3, PR.AT-1, PR.DS-1, PR.DS-2, PR.DS-3, PR.IP-1, PR.IP-5164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.312 (Technical safeguards), 164.314 (Organizational requirements), 164.316 (Policies and procedures and documentation requirements)164.308(a)(1), 164.308(a)(1)(ii)(A), 164.308(a)(1)(ii)(B), 164.308(a)(1)(ii)(D), 164.308(a)(4)(i), 164.308(a)(5), 164.308(a)(7)(i), 164.308(a)(7)(ii), 164.308(a)(7)(ii)(A), 164.308(a)(7)(ii)(C), 164.308(a)(8), 164.308(b), 164.308(b)(1), 164.308(b)(2), 164.308(b)(3), 164.310, 164.310(a)(1), 164.310(a)(2)(i), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(a)(2)(iv), 164.310(b), 164.310(c), 164.310(d), 164.310(d)(1), 164.310(d)(2), 164.310(d)(2)(iii), 164.312(a)(1), 164.312(a)(2)(iii), 164.312(a)(2)(iv), 164.312(b), 164.312(c), 164.312(d), 164.312(e)(1), 164.312(e)(2)(i), 164.312(e)(2)(ii), 164.314(b)(2)(i), 164.316(b)(2)(iii)
02.a
Security roles and responsibilities of employees, contractors and third-party users shall be defined and documented in accordance with the organization's information security policyID.AM-6, ID.GV-3, PR.IP-11, DE.DP-1164.306 (Security standards: General rules), 164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.312 (Technical safeguards), 164.314 (Organizational requirements), 164.316 (Policies and procedures and documentation requirements)164.306, 164.308, 164.308(a)(1)(ii)(C), 164.308(a)(2), 164.308(a)(3), 164.308(a)(3)(ii)(A), 164.308(a)(3)(ii)(B), 164.308(a)(4), 164.308(b)(1), 164.310, 164.310(a)(2)(iii), 164.312, 164.312(a)(1), 164.312(a)(2)(ii), 164.314, 164.316
02.b
Background verification checks on all candidates for employment, contractors, and third-party users shall be carried out in accordance with relevant laws, regulations and ethics, and proportional to the business requirements, the classification of the information to be accessed, and the perceived risksID.AM-6, ID.GV-3, PR.AC-6, PR.DS-5, PR.IP-11164.306 (Security standards: General rules), 164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.312 (Technical safeguards), 164.314 (Organizational requirements), 164.316 (Policies and procedures and documentation requirements)164.306, 164.308, 164.308(a)(1)(ii)(C), 164.308(a)(1)(ii)(D), 164.308(a)(2), 164.308(a)(3), 164.308(a)(4), 164.308(b)(1), 164.310, 164.310(b), 164.310(c), 164.312, 164.312(a), 164.312(e), 164.314, 164.316
02.c
As part of their contractual obligation, employees, contractors and third-party users shall agree and sign the terms and conditions of their employment contract, which shall include their responsibilities for information securityID.AM-6, ID.GV-3, PR.DS-5, PR.IP-11164.306 (Security standards: General rules), 164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.312 (Technical safeguards), 164.314 (Organizational requirements), 164.316 (Policies and procedures and documentation requirements)164.306, 164.308, 164.308(a)(1)(ii)(C), 164.308(a)(1)(ii)(D), 164.308(a)(2), 164.308(a)(3), 164.308(a)(4), 164.308(b)(1), 164.310, 164.310(b), 164.310(c), 164.312, 164.312(a), 164.312(e), 164.314, 164.316
02.d
Management shall require employees, and where applicable contractors and third-party users, to apply security in accordance with established policies and procedures of the organizationID.AM-6, PR.AT-1, PR.AT-2, PR.AT-3, PR.AT-4, PR.AT-5, PR.IP-11164.308 (Administrative safeguards), 164.314 (Organizational requirements), 164.530 (Administrative requirements)164.308(a)(1)(ii)(C), 164.308(a)(2), 164.308(a)(3), 164.308(a)(3)(i), 164.308(a)(4), 164.308(a)(5), 164.308(a)(5)(i), 164.308(a)(5)(ii)(A), 164.308(a)(5)(ii)(B), 164.308(a)(5)(ii)(C), 164.308(a)(5)(ii)(D), 164.308(b), 164.308(b)(1), 164.314, 164.314(a)(1), 164.314(a)(2)(i), 164.314(a)(2)(ii), 164.530(b)(1)
02.e
All employees of the organization and contractors and third-party users shall receive appropriate awareness training and regular updates in organizational policies and procedures, as relevant for their job functionID.AM-6, ID.GV-3, ID.GV-4, PR.AT-1, PR.AT-2, PR.AT-4, PR.AT-5, PR.IP-11, RS.CO-1164.306 (Security standards: General rules), 164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.312 (Technical safeguards), 164.314 (Organizational requirements), 164.316 (Policies and procedures and documentation requirements), 164.530 (Administrative requirements)164.306, 164.308, 164.308(a)(1), 164.308(a)(1)(ii)(C), 164.308(a)(2), 164.308(a)(3), 164.308(a)(3)(i), 164.308(a)(4), 164.308(a)(5), 164.308(a)(5)(i), 164.308(a)(5)(ii)(A), 164.308(a)(5)(ii)(B), 164.308(a)(5)(ii)(C), 164.308(a)(5)(ii)(D), 164.308(a)(6)(i), 164.308(a)(7)(ii)(A), 164.308(a)(7)(ii)(B), 164.308(a)(7)(ii)(C), 164.308(b), 164.308(b)(1), 164.310, 164.310(a)(2)(i), 164.312, 164.312(a)(2)(ii), 164.314, 164.316, 164.530(b)(1)
02.f
There shall be a formal disciplinary process for employees who have violated security policies and procedures.PR.IP-11164.308 (Administrative safeguards)164.308(a)(1)(ii)(C), 164.308(a)(3)
02.g
Responsibilities for performing employment termination or change of employment shall be clearly defined and assignedPR.AC-1, PR.AC-4, PR.IP-11164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.312 (Technical safeguards)164.308(a)(1)(ii)(C), 164.308(a)(3), 164.308(a)(3)(ii)(B), 164.308(a)(3)(ii)(C), 164.308(a)(4), 164.308(a)(4)(i), 164.308(a)(4)(ii)(B), 164.308(a)(4)(ii)(C), 164.310(a)(2)(iii), 164.310(b), 164.312(a)(1), 164.312(a)(2)(i), 164.312(a)(2)(ii), 164.312(a)(2)(iii), 164.312(d)
02.h
All employees, contractors and third-party users shall return all of the organization's assets in their possession upon termination of their employment, contract or agreement.PR.IP-11164.308 (Administrative safeguards)164.308(a)(1)(ii)(C), 164.308(a)(3)
02.i
The access rights of all employees, contractors and third-party users to information and information assets shall be removed upon termination of their employment, contract or agreement, or adjusted upon a change of employment (i.e. upon transfer within the organization)PR.AC-1, PR.AC-4, PR.IP-11164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.312 (Technical safeguards)164.308(a)(1)(ii)(C), 164.308(a)(3), 164.308(a)(3)(ii)(B), 164.308(a)(3)(ii)(C), 164.308(a)(4), 164.308(a)(4)(i), 164.308(a)(4)(ii)(B), 164.308(a)(4)(ii)(C), 164.310(a)(2)(iii), 164.310(b), 164.312(a)(1), 164.312(a)(2)(i), 164.312(a)(2)(ii), 164.312(a)(2)(iii), 164.312(d)
03.a
Organizations shall develop and maintain a risk management program to manage risk to an acceptable levelID.BE-3, ID.GV-4, ID.RM-1, ID.RM-2, ID.RM-3, RS.MI-3164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.316 (Policies and procedures and documentation requirements)164.308(a)(1), 164.308(a)(1)(ii)(A), 164.308(a)(1)(ii)(B), 164.308(a)(6)(ii), 164.308(a)(7)(i), 164.308(a)(7)(ii)(B), 164.308(a)(7)(ii)(C), 164.308(a)(7)(ii)(D), 164.308(a)(7)(ii)(E), 164.308(b), 164.310(a)(2)(i), 164.316
03.b
Risk Assessments shall be performed to identify and quantify risksID.GV-4, ID.RA-1, ID.RA-2, ID.RA-3, ID.RA-4, ID.RA-5, ID.RM-1, RS.CO-5164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.312 (Technical safeguards), 164.314 (Organizational requirements), 164.316 (Policies and procedures and documentation requirements)164.308(a)(1), 164.308(a)(1)(i), 164.308(a)(1)(ii)(A), 164.308(a)(1)(ii)(B), 164.308(a)(1)(ii)(D), 164.308(a)(3), 164.308(a)(4), 164.308(a)(5)(ii)(A), 164.308(a)(6), 164.308(a)(7)(ii)(D), 164.308(a)(7)(ii)(E), 164.308(a)(8), 164.308(b), 164.310(a)(1), 164.310(a)(2)(iii), 164.312(a)(1), 164.312(c), 164.312(e), 164.314, 164.316, 164.316(a), 164.316(b)(2)(iii)
03.c
Risks shall be mitigated to an acceptable levelID.RA-6, PR.IP-7, PR.IP-12, RS.MI-3164.306 (Security standards: General rules), 164.308 (Administrative safeguards), 164.314 (Organizational requirements), 164.316 (Policies and procedures and documentation requirements)164.306(e), 164.308(a)(1)(i), 164.308(a)(1)(ii)(A), 164.308(a)(1)(ii)(B), 164.308(a)(6)(ii), 164.308(a)(7)(ii)(D), 164.308(a)(8), 164.314(a)(2)(i)(C), 164.314(b)(2)(iv), 164.316(b)(2)(iii)
03.d
Risks shall be continually evaluated and assessedID.GV-4, ID.RA-1, ID.RA-2, ID.RA-3, ID.RA-4, ID.RA-5164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.312 (Technical safeguards), 164.314 (Organizational requirements), 164.316 (Policies and procedures and documentation requirements)164.308(a)(1), 164.308(a)(1)(i), 164.308(a)(1)(ii)(A), 164.308(a)(1)(ii)(B), 164.308(a)(1)(ii)(D), 164.308(a)(3), 164.308(a)(4), 164.308(a)(5)(ii)(A), 164.308(a)(6), 164.308(a)(7)(ii)(D), 164.308(a)(7)(ii)(E), 164.308(a)(8), 164.308(b), 164.310(a)(1), 164.310(a)(2)(iii), 164.312(a)(1), 164.312(c), 164.312(e), 164.314, 164.316, 164.316(a), 164.316(b)(2)(iii)
04.a
Information Security Policy documents shall be approved by management, and published and communicated to all employees and relevant external parties. Information Security Policy documents shall establish the direction of the organization and align to best practices, regulatory, federal/state and international laws where applicable. The Information Security policy documents shall be supported by a strategic plan and a security program with well-defined roles and responsibilities for leadership and officer rolesID.GV-1, ID.GV-2, ID.GV-3, ID.GV-4164.306 (Security standards: General rules), 164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.312 (Technical safeguards), 164.314 (Organizational requirements), 164.316 (Policies and procedures and documentation requirements)164.306, 164.308, 164.308(a)(1), 164.308(a)(1)(i), 164.308(a)(2), 164.308(a)(3), 164.308(a)(4), 164.308(b), 164.310, 164.312, 164.314, 164.316
04.b
The information security policy documents shall be reviewed at planned intervals or if significant changes occur to ensure its continuing adequacy and effectivenessID.GV-1, ID.GV-3, ID.GV-4164.306 (Security standards: General rules), 164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.312 (Technical safeguards), 164.314 (Organizational requirements), 164.316 (Policies and procedures and documentation requirements)164.306, 164.308, 164.308(a)(1), 164.308(a)(1)(i), 164.308(b), 164.310, 164.312, 164.314, 164.316
05.a
Management shall actively support security within the organization through clear direction, demonstrated commitment, explicit assignment, and acknowledgment of information security responsibilitiesID.BE-2, ID.BE-3, ID.GV-1, ID.GV-2, ID.GV-4, ID.RM-1, PR.AT-4164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.314 (Organizational requirements), 164.316 (Policies and procedures and documentation requirements)164.308(a)(1), 164.308(a)(1)(i), 164.308(a)(1)(ii)(A), 164.308(a)(1)(ii)(B), 164.308(a)(2), 164.308(a)(3), 164.308(a)(3)(i), 164.308(a)(4), 164.308(a)(4)(ii), 164.308(a)(5)(i), 164.308(a)(5)(ii)(A), 164.308(a)(5)(ii)(B), 164.308(a)(5)(ii)(C), 164.308(a)(5)(ii)(D), 164.308(a)(7)(ii)(B), 164.308(a)(7)(ii)(C), 164.308(a)(7)(ii)(D), 164.308(a)(7)(ii)(E), 164.308(a)(8), 164.308(b), 164.310(a)(2)(i), 164.314, 164.316
05.b
Information security activities shall be coordinated by representatives from different parts of the organization with relevant roles and job functionsID.BE-3, ID.GV-2, ID.GV-3, PR.IP-8, DE.DP-4164.306 (Security standards: General rules), 164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.312 (Technical safeguards), 164.314 (Organizational requirements), 164.316 (Policies and procedures and documentation requirements)164.306, 164.308, 164.308(a)(1)(i), 164.308(a)(2), 164.308(a)(3), 164.308(a)(4), 164.308(a)(6)(ii), 164.308(a)(7)(ii)(B), 164.308(a)(7)(ii)(C), 164.308(a)(7)(ii)(D), 164.308(a)(7)(ii)(E), 164.308(b), 164.310, 164.310(a)(2)(i), 164.312, 164.314, 164.314(a)(2)(i)(C), 164.314(a)(2)(iii), 164.316
05.c
All information security responsibilities shall be clearly definedID.GV-1, ID.GV-2, PR.AT-1, PR.AT-2, PR.AT-5164.308 (Administrative safeguards), 164.314 (Organizational requirements), 164.316 (Policies and procedures and documentation requirements), 164.530 (Administrative requirements)164.308(a)(1)(i), 164.308(a)(2), 164.308(a)(3), 164.308(a)(3)(i), 164.308(a)(4), 164.308(a)(5), 164.308(a)(5)(i), 164.308(a)(5)(ii)(A), 164.308(a)(5)(ii)(B), 164.308(a)(5)(ii)(C), 164.308(a)(5)(ii)(D), 164.308(b), 164.314, 164.316, 164.530(b)(1)
05.d
A management authorization process for new information assets (e.g. systems and applications) (see Other Information), and facilities (e.g. data centers or offices where covered information is to be processed) shall be defined and implementedID.BE-1, ID.GV-4, ID.RA-4164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.314 (Organizational requirements), 164.316 (Policies and procedures and documentation requirements)164.308(a)(1), 164.308(a)(1)(i), 164.308(a)(1)(ii)(A), 164.308(a)(1)(ii)(B), 164.308(a)(4)(ii), 164.308(a)(6), 164.308(a)(7)(ii)(C), 164.308(a)(7)(ii)(E), 164.308(a)(8), 164.308(b), 164.310(a)(2)(i), 164.314, 164.316, 164.316(a)
05.e
Requirements for confidentiality or non-disclosure agreements reflecting the organization's needs for the protection of information shall be identified and regularly reviewedID.AM-6, ID.GV-3, PR.DS-5, PR.IP-11164.306 (Security standards: General rules), 164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.312 (Technical safeguards), 164.314 (Organizational requirements), 164.316 (Policies and procedures and documentation requirements)164.306, 164.308, 164.308(a)(1)(ii)(C), 164.308(a)(1)(ii)(D), 164.308(a)(2), 164.308(a)(3), 164.308(a)(4), 164.308(b)(1), 164.310, 164.310(b), 164.310(c), 164.312, 164.312(a), 164.312(e), 164.314, 164.316
05.f
Appropriate contacts with relevant authorities shall be maintainedDE.DP-4, RS.CO-2, RS.CO-3164.308 (Administrative safeguards), 164.314 (Organizational requirements)164.308(a)(5)(ii)(B), 164.308(a)(5)(ii)(C), 164.308(a)(6)(ii), 164.314(a)(2)(i)(C), 164.314(a)(2)(iii)
05.g
Appropriate contacts with special interest groups or other specialist security forums and professional associations shall be maintainedID.GV-3, ID.GV-4, ID.RA-2, RS.CO-3, RS.CO-5164.306 (Security standards: General rules), 164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.312 (Technical safeguards), 164.314 (Organizational requirements), 164.316 (Policies and procedures and documentation requirements)164.306, 164.308, 164.308(a)(1), 164.308(a)(5)(ii)(B), 164.308(a)(5)(ii)(C), 164.308(a)(6), 164.308(a)(6)(ii), 164.308(b), 164.310, 164.312, 164.314, 164.314(a)(2)(i)(C), 164.316
05.h
The organization's approach to managing information security and its implementation (control objectives, controls, policies, processes, and procedures for information security) shall be reviewed independently at planned intervals, at a minimum annually, or when significant changes to the security implementation occurID.GV-4, ID.RM-1, ID.RM-2, ID.RM-3, PR.IP-7, PR.IP-8164.306 (Security standards: General rules), 164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.316 (Policies and procedures and documentation requirements)164.306(e), 164.308(a)(1), 164.308(a)(1)(ii)(B), 164.308(a)(6)(ii), 164.308(a)(7)(i), 164.308(a)(7)(ii)(C), 164.308(a)(7)(ii)(D), 164.308(a)(7)(ii)(E), 164.308(a)(8), 164.308(b), 164.310(a)(2)(i), 164.316(b)(2)(iii)
05.i
The risks to the organization's information and information assets from business processes involving external parties shall be identified, and appropriate controls implemented before granting accessID.AM-3, ID.GV-3, ID.RM-1, ID.SC-1, ID.SC-2, ID.SC-3, PR.AC-3, PR.AC-4, PR.AT-3, PR.DS-2, DE.AE-1164.306 (Security standards: General rules), 164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.312 (Technical safeguards), 164.314 (Organizational requirements), 164.316 (Policies and procedures and documentation requirements)164.306, 164.308, 164.308(a)(1)(ii)(A), 164.308(a)(1)(ii)(B), 164.308(a)(1)(ii)(D), 164.308(a)(3), 164.308(a)(3)(ii)(A), 164.308(a)(4), 164.308(a)(4)(i), 164.308(a)(8), 164.308(b), 164.308(b)(1), 164.308(b)(2), 164.308(b)(3), 164.310, 164.310(a)(2)(iii), 164.310(b), 164.310(d), 164.312, 164.312(a)(1), 164.312(a)(2)(i), 164.312(a)(2)(ii), 164.312(b), 164.312(e)(1), 164.312(e)(2)(i), 164.312(e)(2)(ii), 164.314, 164.314(a)(1), 164.314(a)(2)(i), 164.314(a)(2)(ii), 164.314(b)(2)(i), 164.316
05.j
All identified security requirements shall be addressed before giving customers access to the organization's information or assetsID.AM-6, PR.AC-1, PR.AC-3, PR.AT-3164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.312 (Technical safeguards), 164.314 (Organizational requirements)164.308(a)(2), 164.308(a)(3), 164.308(a)(3)(ii)(B), 164.308(a)(3)(ii)(C), 164.308(a)(4), 164.308(a)(4)(i), 164.308(a)(4)(ii)(B), 164.308(a)(4)(ii)(C), 164.308(b), 164.308(b)(1), 164.308(b)(3), 164.310(b), 164.312(a)(2)(i), 164.312(a)(2)(ii), 164.312(a)(2)(iii), 164.312(d), 164.312(e)(1), 164.312(e)(2)(ii), 164.314, 164.314(a)(1), 164.314(a)(2)(i), 164.314(a)(2)(ii)
05.k
Agreements with third parties involving accessing, processing, communicating or managing the organization's information or information assets, or adding products or services to information assets shall cover all relevant security requirements.ID.AM-6, ID.GV-2, ID.GV-3, ID.SC-1, ID.SC-3, ID.SC-4, PR.AC-6, PR.AT-3, PR.DS-8, PR.IP-11, DE.CM-6164.306 (Security standards: General rules), 164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.312 (Technical safeguards), 164.314 (Organizational requirements), 164.316 (Policies and procedures and documentation requirements)164.306, 164.308, 164.308(a)(1)(i), 164.308(a)(1)(ii)(C), 164.308(a)(1)(ii)(D), 164.308(a)(2), 164.308(a)(3), 164.308(a)(4), 164.308(b), 164.308(b)(1), 164.310, 164.312, 164.314, 164.314(a)(1), 164.314(a)(2)(i), 164.314(a)(2)(ii), 164.316
06.a
All relevant statutory, regulatory, and contractual requirements and theID.GV-3, ID.GV-4, PR.AT-3, PR.IP-7, RS.CO-5164.306 (Security standards: General rules), 164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.312 (Technical safeguards), 164.314 (Organizational requirements), 164.316 (Policies and procedures and documentation requirements)164.306, 164.306(e), 164.308, 164.308(a)(1), 164.308(a)(6), 164.308(a)(7)(ii)(D), 164.308(a)(8), 164.308(b), 164.310, 164.312, 164.314, 164.314(a)(1), 164.314(a)(2)(i), 164.314(a)(2)(ii), 164.316, 164.316(b)(2)(iii)
organization's approach to meet these requirements shall be explicitly defined, documented, and kept up to date for each information system and the organization
06.b
Detailed procedures shall be implemented to ensure compliance with legislative, regulatory, and contractual requirements on the use of material in respect of which there may be intellectual property rights, and on the use of proprietary software productsID.GV-3, PR.IP-1, DE.CM-3164.306 (Security standards: General rules), 164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.312 (Technical safeguards), 164.314 (Organizational requirements), 164.316 (Policies and procedures and documentation requirements)164.306, 164.308, 164.308(a)(1)(ii)(D), 164.308(a)(3)(ii)(A), 164.308(a)(5)(ii)(C), 164.308(a)(7)(i), 164.308(a)(7)(ii), 164.308(a)(8), 164.310, 164.312, 164.312(a)(2)(i), 164.312(b), 164.312(d), 164.312(e), 164.314, 164.316
06.c
Important records shall be protected from loss, destruction, and falsification, in accordance with statutory, regulatory, contractual, and business requirementsID.AM-5, ID.GV-3, ID.GV-4, PR.DS-3, PR.PT-1164.306 (Security standards: General rules), 164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.312 (Technical safeguards), 164.314 (Organizational requirements), 164.316 (Policies and procedures and documentation requirements)164.306, 164.308, 164.308(a)(1), 164.308(a)(1)(ii)(A), 164.308(a)(1)(ii)(D), 164.308(a)(5)(ii)(C), 164.308(a)(7)(ii)(E), 164.308(b), 164.310, 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(a)(2)(iv), 164.310(d)(1), 164.310(d)(2), 164.310(d)(2)(iii), 164.312, 164.312(b), 164.314, 164.316
06.d
Data protection and privacy shall be ensured as required in relevant legislation, regulations, and contractual clausesID.GV-3, PR.AC-7, PR.DS-1, PR.DS-2164.306 (Security standards: General rules), 164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.312 (Technical safeguards), 164.314 (Organizational requirements), 164.316 (Policies and procedures and documentation requirements)164.306, 164.308, 164.308(a)(1)(ii)(D), 164.308(b)(1), 164.308(b)(2), 164.310, 164.310(d), 164.312, 164.312(a)(1), 164.312(a)(2)(iii), 164.312(a)(2)(iv), 164.312(b), 164.312(c), 164.312(d), 164.312(e)(1), 164.312(e)(2)(i), 164.312(e)(2)(ii), 164.314, 164.314(b)(2)(i), 164.316
06.e
Users shall be deterred from using information assets for unauthorized purposesID.GV-3, PR.IP-11, DE.CM-1, DE.CM-3164.306 (Security standards: General rules), 164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.312 (Technical safeguards), 164.314 (Organizational requirements), 164.316 (Policies and procedures and documentation requirements)164.306, 164.308, 164.308(a)(1)(ii)(C), 164.308(a)(1)(ii)(D), 164.308(a)(3), 164.308(a)(3)(ii)(A), 164.308(a)(5)(ii)(B), 164.308(a)(5)(ii)(C), 164.308(a)(8), 164.310, 164.312, 164.312(a)(2)(i), 164.312(b), 164.312(d), 164.312(e), 164.312(e)(2)(i), 164.314, 164.316
06.f
Cryptographic controls shall be used in compliance with all relevant agreements, laws, and regulationsID.GV-3164.306 (Security standards: General rules), 164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.312 (Technical safeguards), 164.314 (Organizational requirements), 164.316 (Policies and procedures and documentation requirements)164.306, 164.308, 164.310, 164.312, 164.314, 164.316
06.g
Managers shall ensure that all security procedures within their area ofID.GV-3, ID.RA-6, DE.CM-7, DE.DP-1, DE.DP-4164.306 (Security standards: General rules), 164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.312 (Technical safeguards), 164.314 (Organizational requirements), 164.316 (Policies and procedures and documentation requirements)164.306, 164.308, 164.308(a)(1)(ii)(B), 164.308(a)(1)(ii)(D), 164.308(a)(2), 164.308(a)(3)(ii)(A), 164.308(a)(3)(ii)(B), 164.308(a)(4), 164.308(a)(5)(ii)(B), 164.308(a)(5)(ii)(C), 164.308(a)(6)(ii), 164.310, 164.310(a)(1), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(b), 164.310(c), 164.310(d)(1), 164.310(d)(2)(iii), 164.312, 164.312(a)(1), 164.312(a)(2)(ii), 164.312(b), 164.314, 164.314(a)(2)(i)(C), 164.314(a)(2)(iii), 164.314(b)(2)(i), 164.314(b)(2)(iv), 164.316
responsibility are carried out correctly to achieve compliance with security policies and standards
06.h
Information systems shall be regularly checked for compliance with security implementation standardsID.RA-1, ID.RA-6, PR.IP-12, DE.CM-8, RS.MI-3164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.312 (Technical safeguards), 164.314 (Organizational requirements), 164.316 (Policies and procedures and documentation requirements)164.308(a)(1)(i), 164.308(a)(1)(ii)(A), 164.308(a)(1)(ii)(B), 164.308(a)(6)(ii), 164.308(a)(7)(ii)(E), 164.308(a)(8), 164.310(a)(1), 164.312(a)(1), 164.314(a)(2)(i)(C), 164.314(b)(2)(iv), 164.316(b)(2)(iii)
06.i
Audit requirements and activities involving checks on operational systems shall be carefully planned and agreed to, to minimize the risk of disruptions to business processesID.GV-4, PR.PT-1, DE.DP-1, DE.DP-2, DE.DP-4164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.312 (Technical safeguards), 164.314 (Organizational requirements)164.308(a)(1), 164.308(a)(1)(i), 164.308(a)(1)(ii)(D), 164.308(a)(2), 164.308(a)(3)(ii)(A), 164.308(a)(3)(ii)(B), 164.308(a)(4), 164.308(a)(5)(ii)(C), 164.308(a)(6)(ii), 164.308(a)(8), 164.308(b), 164.310(a)(2)(iii), 164.310(a)(2)(iv), 164.310(d)(2)(iii), 164.312(a)(1), 164.312(a)(2)(ii), 164.312(b), 164.314(a)(2)(i)(C), 164.314(a)(2)(iii)
06.j
Access to information systems audit tools shall be protected to prevent any possible misuse or compromisePR.AC-1, PR.AC-4, PR.PT-3, DE.DP-1164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.312 (Technical safeguards)164.308(a)(2), 164.308(a)(3), 164.308(a)(3)(ii)(A), 164.308(a)(3)(ii)(B), 164.308(a)(3)(ii)(C), 164.308(a)(4), 164.308(a)(4)(i), 164.308(a)(4)(ii)(B), 164.308(a)(4)(ii)(C), 164.310(a)(2)(iii), 164.310(b), 164.310(c), 164.312(a)(1), 164.312(a)(2)(i), 164.312(a)(2)(ii), 164.312(a)(2)(iii), 164.312(a)(2)(iv), 164.312(d)
07.a
All assets including information shall be clearly identified and an inventory of all assets drawn up and maintainedID.AM-1, ID.AM-2, ID.AM-5, PR.AC-4, PR.DS-3164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.312 (Technical safeguards)164.308(a)(1)(ii)(A), 164.308(a)(3), 164.308(a)(4), 164.308(a)(7)(ii)(E), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(a)(2)(iv), 164.310(b), 164.310(d), 164.310(d)(1), 164.310(d)(2), 164.312(a)(1), 164.312(a)(2)(i), 164.312(a)(2)(ii)
07.b
All information and assets associated with information processing systems shall be owned by a designated part of the organizationID.AM-5, ID.AM-6, ID.GV-3, ID.GV-4, PR.DS-3, PR.IP-1, PR.PT-1164.306 (Security standards: General rules), 164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.312 (Technical safeguards), 164.314 (Organizational requirements), 164.316 (Policies and procedures and documentation requirements)164.306, 164.308, 164.308(a)(1), 164.308(a)(1)(ii)(A), 164.308(a)(1)(ii)(D), 164.308(a)(2), 164.308(a)(3), 164.308(a)(4), 164.308(a)(5)(ii)(C), 164.308(a)(7)(i), 164.308(a)(7)(ii), 164.308(a)(7)(ii)(E), 164.308(a)(8), 164.308(b), 164.308(b)(1), 164.310, 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(a)(2)(iv), 164.310(d)(1), 164.310(d)(2), 164.310(d)(2)(iii), 164.312, 164.312(b), 164.314, 164.316
07.c
Rules for the acceptable use of information and assets associated with information processing systems shall be identified, documented, and implementedID.AM-6, PR.AT-1, PR.DS-5, PR.IP-11164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.312 (Technical safeguards), 164.314 (Organizational requirements)164.308(a)(1)(ii)(C), 164.308(a)(1)(ii)(D), 164.308(a)(2), 164.308(a)(3), 164.308(a)(4), 164.308(a)(5), 164.308(b)(1), 164.310(b), 164.310(c), 164.312(a), 164.312(e), 164.314
07.d
Information shall be classified in terms of its value, legal requirements, sensitivity, and criticality to the organizationID.AM-1, ID.AM-2, ID.AM-5, ID.AM-6, ID.GV-4, ID.RA-2, ID.RA-3, ID.RA-4, PR.AC-4, PR.DS-3, PR.DS-5164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.312 (Technical safeguards), 164.314 (Organizational requirements), 164.316 (Policies and procedures and documentation requirements)164.308(a)(1), 164.308(a)(1)(i), 164.308(a)(1)(ii)(A), 164.308(a)(1)(ii)(B), 164.308(a)(1)(ii)(D), 164.308(a)(2), 164.308(a)(3), 164.308(a)(4), 164.308(a)(5)(ii)(A), 164.308(a)(6), 164.308(a)(7)(ii)(E), 164.308(a)(8), 164.308(b), 164.308(b)(1), 164.310(a)(1), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(a)(2)(iv), 164.310(b), 164.310(c), 164.310(d), 164.310(d)(1), 164.310(d)(2), 164.312(a), 164.312(a)(1), 164.312(a)(2)(i), 164.312(a)(2)(ii), 164.312(c), 164.312(e), 164.314, 164.316, 164.316(a)
07.e
An appropriate set of procedures for information labeling and handling shall be developed and implemented in accordance with the classification scheme adopted by the organizationPR.DS-5, PR.PT-2164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.312 (Technical safeguards)164.308(a)(1)(ii)(D), 164.308(a)(3), 164.308(a)(3)(i), 164.308(a)(3)(ii)(A), 164.308(a)(4), 164.310(b), 164.310(c), 164.310(d)(1), 164.310(d)(2), 164.312(a), 164.312(a)(1), 164.312(a)(2)(iv), 164.312(b), 164.312(e)
08.a
Security perimeters (barriers such as walls, card-controlled entry gates or manned reception desks) shall be used to protect areas that contain information and information assetsPR.AC-2, DE.CM-2, DE.CM-7, DE.DP-2164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.312 (Technical safeguards), 164.314 (Organizational requirements)164.308(a)(1)(i), 164.308(a)(1)(ii)(B), 164.308(a)(1)(ii)(D), 164.308(a)(5)(ii)(B), 164.308(a)(5)(ii)(C), 164.308(a)(7)(i), 164.308(a)(7)(ii)(A), 164.308(a)(8), 164.310(a)(1), 164.310(a)(2)(i), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(b), 164.310(c), 164.310(d)(1), 164.310(d)(2)(iii), 164.312(b), 164.314(b)(2)(i)
08.b
Secure areas shall be protected by appropriate entry controls to ensure that only authorized personnel are allowed accessID.GV-3, PR.AC-2, PR.PT-1, DE.CM-2, DE.CM-7, DE.DP-2, DE.DP-3, RS.AN-1, RS.CO-3164.306 (Security standards: General rules), 164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.312 (Technical safeguards), 164.314 (Organizational requirements), 164.316 (Policies and procedures and documentation requirements)164.306, 164.306(e), 164.308, 164.308(a)(1)(i), 164.308(a)(1)(ii)(B), 164.308(a)(1)(ii)(D), 164.308(a)(5)(ii)(B), 164.308(a)(5)(ii)(C), 164.308(a)(6)(ii), 164.308(a)(7)(i), 164.308(a)(7)(ii)(A), 164.308(a)(8), 164.310, 164.310(a)(1), 164.310(a)(2)(i), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(a)(2)(iv), 164.310(b), 164.310(c), 164.310(d)(1), 164.310(d)(2)(iii), 164.312, 164.312(b), 164.314, 164.314(a)(2)(i)(C), 164.314(b)(2)(i), 164.316
08.c
Physical security for offices, rooms, and facilities shall be designed and appliedID.GV-3, PR.AC-2, DE.CM-2, DE.CM-3, DE.CM-7, DE.DP-2164.306 (Security standards: General rules), 164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.312 (Technical safeguards), 164.314 (Organizational requirements), 164.316 (Policies and procedures and documentation requirements)164.306, 164.308, 164.308(a)(1)(i), 164.308(a)(1)(ii)(B), 164.308(a)(1)(ii)(D), 164.308(a)(3)(ii)(A), 164.308(a)(5)(ii)(B), 164.308(a)(5)(ii)(C), 164.308(a)(7)(i), 164.308(a)(7)(ii)(A), 164.308(a)(8), 164.310, 164.310(a)(1), 164.310(a)(2)(i), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(b), 164.310(c), 164.310(d)(1), 164.310(d)(2)(iii), 164.312, 164.312(a)(2)(i), 164.312(b), 164.312(d), 164.312(e), 164.314, 164.314(b)(2)(i), 164.316
08.d
Physical protection against damage from fire, flood, earthquake, explosion, civil unrest, and other forms of natural or man-made disaster shall be designed and appliedPR.IP-5164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.316 (Policies and procedures and documentation requirements)164.308(a)(7)(i), 164.308(a)(7)(ii)(C), 164.310, 164.316(b)(2)(iii)
08.e
Physical protection and guidelines for working in secure areas shall be designed and appliedPR.AC-2, PR.IP-5164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.316 (Policies and procedures and documentation requirements)164.308(a)(1)(ii)(B), 164.308(a)(7)(i), 164.308(a)(7)(ii)(A), 164.308(a)(7)(ii)(C), 164.310, 164.310(a)(1), 164.310(a)(2)(i), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(b), 164.310(c), 164.310(d)(1), 164.310(d)(2)(iii), 164.316(b)(2)(iii)
08.f
Access points such as delivery and loading areas and other points where unauthorized persons may enter the premises shall be controlled and, if possible, isolated from information processing facilities to avoid unauthorized access.PR.AC-2, PR.IP-5164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.316 (Policies and procedures and documentation requirements)164.308(a)(1)(ii)(B), 164.308(a)(7)(i), 164.308(a)(7)(ii)(A), 164.308(a)(7)(ii)(C), 164.310, 164.310(a)(1), 164.310(a)(2)(i), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(b), 164.310(c), 164.310(d)(1), 164.310(d)(2)(iii), 164.316(b)(2)(iii)
08.g
Equipment shall be sited or protected to reduce the risks from environmental threats and hazards, and opportunities for unauthorized accessPR.IP-5164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.316 (Policies and procedures and documentation requirements)164.308(a)(7)(i), 164.308(a)(7)(ii)(C), 164.310, 164.316(b)(2)(iii)
08.h
Equipment shall be protected from power failures and other disruptions caused by failures in supporting utilitiesID.BE-4, ID.GV-3, PR.AC-2, PR.DS-8, PR.IP-5164.306 (Security standards: General rules), 164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.312 (Technical safeguards), 164.314 (Organizational requirements), 164.316 (Policies and procedures and documentation requirements)164.306, 164.308, 164.308(a)(1)(ii)(B), 164.308(a)(7)(i), 164.308(a)(7)(ii)(A), 164.308(a)(7)(ii)(C), 164.308(a)(7)(ii)(E), 164.310, 164.310(a)(1), 164.310(a)(2)(i), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(b), 164.310(c), 164.310(d)(1), 164.310(d)(2)(iii), 164.312, 164.312(a)(2)(ii), 164.314, 164.314(a)(1), 164.314(b)(2)(i), 164.316, 164.316(b)(2)(iii)
08.i
Power and telecommunications cabling carrying data or supporting information services shall be protected from interception or damagePR.AC-2, PR.AC-4, PR.DS-2, PR.IP-5164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.312 (Technical safeguards), 164.314 (Organizational requirements), 164.316 (Policies and procedures and documentation requirements)164.308(a)(1)(ii)(B), 164.308(a)(3), 164.308(a)(4), 164.308(a)(7)(i), 164.308(a)(7)(ii)(A), 164.308(a)(7)(ii)(C), 164.308(b)(1), 164.308(b)(2), 164.310, 164.310(a)(1), 164.310(a)(2)(i), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(b), 164.310(c), 164.310(d)(1), 164.310(d)(2)(iii), 164.312(a)(1), 164.312(a)(2)(i), 164.312(a)(2)(ii), 164.312(e)(1), 164.312(e)(2)(i), 164.312(e)(2)(ii), 164.314(b)(2)(i), 164.316(b)(2)(iii)
08.j
Equipment shall be correctly maintained to ensure its continued availability and integrityPR.DS-1, PR.DS-8, PR.MA-1, PR.MA-2, DE.CM-4164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.312 (Technical safeguards), 164.314 (Organizational requirements)164.308(a)(1)(ii)(D), 164.308(a)(3)(ii)(A), 164.308(a)(5)(ii)(B), 164.308(b)(1), 164.310(a)(2)(iv), 164.310(d), 164.310(d)(1), 164.310(d)(2)(ii), 164.310(d)(2)(iii), 164.312(a), 164.312(a)(1), 164.312(a)(2)(ii), 164.312(a)(2)(iii), 164.312(a)(2)(iv), 164.312(b), 164.312(c), 164.312(d), 164.312(e), 164.314(b)(2)(i)
08.k
Security shall be applied to off-site equipment taking into account the different risks of working outside the organization's premisesPR.DS-3164.308 (Administrative safeguards), 164.310 (Physical safeguards)164.308(a)(1)(ii)(A), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(a)(2)(iv), 164.310(d)(1), 164.310(d)(2)
08.l
All items of equipment containing storage media shall be checked to ensure that any covered information and licensed software has been removed or securely overwritten prior to disposalPR.DS-3, PR.IP-6164.308 (Administrative safeguards), 164.310 (Physical safeguards)164.308(a)(1)(ii)(A), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(a)(2)(iv), 164.310(d)(1), 164.310(d)(2), 164.310(d)(2)(i), 164.310(d)(2)(ii)
08.m
Equipment, information or software shall not be taken off site without prior authorizationPR.DS-3, PR.IP-6164.308 (Administrative safeguards), 164.310 (Physical safeguards)164.308(a)(1)(ii)(A), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(a)(2)(iv), 164.310(d)(1), 164.310(d)(2), 164.310(d)(2)(i), 164.310(d)(2)(ii)
09.a
Operating procedures shall be documented, maintained, and made available to all users who need themNo mappingNo mapping
09.b
Changes to information assets and systems shall be controlled and archivedPR.IP-3164.308 (Administrative safeguards)164.308(a)(8)
09.c
Separation of duties shall be enforced to reduce opportunities for unauthorized or unintentional modification or misuse of the organization's assetsPR.AC-4, DE.CM-3164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.312 (Technical safeguards)164.308(a)(1)(ii)(D), 164.308(a)(3), 164.308(a)(3)(ii)(A), 164.308(a)(4), 164.308(a)(5)(ii)(C), 164.310(a)(2)(iii), 164.310(b), 164.312(a)(1), 164.312(a)(2)(i), 164.312(a)(2)(ii), 164.312(b), 164.312(d), 164.312(e)
09.d
Development, test, and operational environments shall be separated and controlled to reduce the risks of unauthorized access or changes to the operational systemPR.DS-7, PR.IP-3164.308 (Administrative safeguards)164.308(a)(4)4, 164.308(a)(8)
09.e
It shall be ensured that the security controls, service definitions and delivery levels included in the third-party service delivery agreement are implemented, operated and maintained by the third partyID.AM-4, ID.SC-1, ID.SC-2, ID.SC-3, ID.SC-4, PR.AC-3, PR.AT-3, PR.DS-3, DE.AE-4, DE.CM-6164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.312 (Technical safeguards), 164.314 (Organizational requirements), 164.316 (Policies and procedures and documentation requirements)164.308(a)(1)(ii)(A), 164.308(a)(1)(ii)(D), 164.308(a)(4)(i), 164.308(a)(4)(ii)(A), 164.308(a)(6)(ii), 164.308(b), 164.308(b)(1), 164.308(b)(3), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(a)(2)(iv), 164.310(b), 164.310(d)(1), 164.310(d)(2), 164.312(e)(1), 164.312(e)(2)(ii), 164.314(a)(1), 164.314(a)(2)(i), 164.314(a)(2)(i)(B), 164.314(a)(2)(ii), 164.316(b)(2)
09.f
The services, reports and records provided by the third party shall be regularly monitored and reviewed, and audits shall be carried out regularly to govern and maintain compliance with the service delivery agreementsID.SC-1, ID.SC-2, ID.SC-4, PR.AT-3, DE.CM-6, RS.CO-4, RS.MI-2164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.312 (Technical safeguards), 164.314 (Organizational requirements)164.308(a)(1)(ii)(D), 164.308(a)(6), 164.308(a)(6)(ii), 164.308(a)(7), 164.308(b), 164.310(a)(2)(i), 164.312(a)(2)(ii), 164.314(a)(1), 164.314(a)(2)(i), 164.314(a)(2)(ii)
09.g
Changes to the provision of services, including maintaining and improving existing information security policies, procedures and controls, shall be managed, taking account of the criticality of business systems and processes involved and re-assessment of risksID.BE-1, ID.RA-4, ID.SC-1, PR.AT-3164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.314 (Organizational requirements), 164.316 (Policies and procedures and documentation requirements)164.308(a)(1)(i), 164.308(a)(1)(ii)(A), 164.308(a)(1)(ii)(B), 164.308(a)(4)(ii), 164.308(a)(6), 164.308(a)(7)(ii)(C), 164.308(a)(7)(ii)(E), 164.308(a)(8), 164.308(b), 164.310(a)(2)(i), 164.314, 164.314(a)(1), 164.314(a)(2)(i), 164.314(a)(2)(ii), 164.316, 164.316(a)
09.h
The availability of adequate capacity and resources shall be planned, prepared, and managed to deliver the required system performance. Projections of future capacity requirements shall be made to mitigate the risk of system overloadPR.DS-4, PR.PT-1164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.312 (Technical safeguards)164.308(a)(1)(ii)(A), 164.308(a)(1)(ii)(B), 164.308(a)(1)(ii)(D), 164.308(a)(5)(ii)(C), 164.308(a)(7), 164.310(a)(2)(i), 164.310(a)(2)(iv), 164.310(d)(2)(iii), 164.310(d)(2)(iv), 164.312(a)(2)(ii), 164.312(b)
09.i
Acceptance criteria for new information systems, upgrades, and new versions shall be established and suitable tests of the system(s) carried out during development and prior to acceptance to maintain security.PR.DS-5, PR.IP-2164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.312 (Technical safeguards)164.308(a)(1)(i), 164.308(a)(1)(ii)(D), 164.308(a)(3), 164.308(a)(4), 164.310(b), 164.310(c), 164.312(a), 164.312(e)
09.j
Detection, prevention, and recovery controls shall be implemented to protect against malicious code, and appropriate user awareness procedures on malicious code shall be providedPR.AC-4, PR.AT-1, DE.CM-4164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.312 (Technical safeguards)164.308(a)(1)(ii)(D), 164.308(a)(3), 164.308(a)(4), 164.308(a)(5), 164.308(a)(5)(ii)(B), 164.310(a)(2)(iii), 164.310(b), 164.312(a)(1), 164.312(a)(2)(i), 164.312(a)(2)(ii)
09.k
Mobile code shall be authorized before its installation and use, and the configuration shall ensure that the authorized mobile code operates according to a clearly defined security policy. All unauthorized mobile code shall be prevented from executingPR.DS-7, DE.CM-4, DE.CM-5164.308 (Administrative safeguards)164.308(a)(1)(ii)(D), 164.308(a)(4)4, 164.308(a)(5)(ii)(B)
09.l
Back-up copies of information and software shall be taken and tested regularlyPR.DS-1, PR.DS-2, PR.IP-4164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.312 (Technical safeguards), 164.314 (Organizational requirements)164.308(a)(1)(ii)(D), 164.308(a)(7)(ii)(A), 164.308(a)(7)(ii)(B), 164.308(a)(7)(ii)(D), 164.308(b)(1), 164.308(b)(2), 164.310(a)(2)(i), 164.310(d), 164.310(d)(2)(iv), 164.312(a)(1), 164.312(a)(2)(iii), 164.312(a)(2)(iv), 164.312(b), 164.312(c), 164.312(d), 164.312(e)(1), 164.312(e)(2)(i), 164.312(e)(2)(ii), 164.314(b)(2)(i)
09.m
Networks shall be managed and controlled in order to protect the organization from threats and to maintain security for the systems and applications using the network, including information in transitID.AM-3, ID.AM-6, PR.AC-1, PR.AC-5, PR.DS-2, PR.DS-5, PR.IP-1, DE.AE-1, DE.AE-4, DE.CM-1164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.312 (Technical safeguards), 164.314 (Organizational requirements)164.308(a)(1)(ii)(A), 164.308(a)(1)(ii)(D), 164.308(a)(2), 164.308(a)(3), 164.308(a)(3)(ii)(A), 164.308(a)(3)(ii)(B), 164.308(a)(3)(ii)(C), 164.308(a)(4), 164.308(a)(4)(i), 164.308(a)(4)(ii)(B), 164.308(a)(4)(ii)(C), 164.308(a)(5)(ii)(B), 164.308(a)(5)(ii)(C), 164.308(a)(6)(ii), 164.308(a)(7)(i), 164.308(a)(7)(ii), 164.308(a)(8), 164.308(b)(1), 164.308(b)(2), 164.310(a)(1), 164.310(b), 164.310(c), 164.310(d), 164.312(a), 164.312(a)(1), 164.312(a)(2)(i), 164.312(a)(2)(ii), 164.312(a)(2)(iii), 164.312(b), 164.312(c), 164.312(d), 164.312(e), 164.312(e)(1), 164.312(e)(2)(i), 164.312(e)(2)(ii), 164.314, 164.314(b)(2)(i)
09.n
Security features, service levels, and management requirements of all network services shall be identified and included in any network services agreement, whether these services are provided in-house or outsourcedID.AM-3, ID.AM-4, ID.AM-6, ID.GV-3, PR.AT-3, PR.PT-4, DE.AE-1, DE.CM-6, DE.CM-7164.306 (Security standards: General rules), 164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.312 (Technical safeguards), 164.314 (Organizational requirements), 164.316 (Policies and procedures and documentation requirements)164.306, 164.308, 164.308(a)(1)(ii)(A), 164.308(a)(1)(ii)(D), 164.308(a)(2), 164.308(a)(3), 164.308(a)(3)(ii)(A), 164.308(a)(4), 164.308(a)(4)(ii)(A), 164.308(a)(5)(ii)(B), 164.308(a)(5)(ii)(C), 164.308(a)(8), 164.308(b), 164.308(b)(1), 164.310, 164.310(a)(1), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(b), 164.310(c), 164.310(d), 164.310(d)(1), 164.310(d)(2)(iii), 164.312, 164.312(a)(1), 164.312(b), 164.312(e), 164.314, 164.314(a)(1), 164.314(a)(2)(i), 164.314(a)(2)(i)(B), 164.314(a)(2)(ii), 164.314(b)(2)(i), 164.316, 164.316(b)(2)
09.o
Formal procedures shall be documented and implemented for the management of removable mediaPR.DS-1, PR.PT-2164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.312 (Technical safeguards), 164.314 (Organizational requirements)164.308(a)(1)(ii)(D), 164.308(a)(3)(i), 164.308(a)(3)(ii)(A), 164.308(b)(1), 164.310(d), 164.310(d)(1), 164.310(d)(2), 164.312(a)(1), 164.312(a)(2)(iii), 164.312(a)(2)(iv), 164.312(b), 164.312(c), 164.312(d), 164.314(b)(2)(i)
09.p
Media shall be disposed of securely and safely when no longer required, using formal procedures that are documentedPR.DS-3, PR.DS-5, PR.IP-6164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.312 (Technical safeguards)164.308(a)(1)(ii)(A), 164.308(a)(1)(ii)(D), 164.308(a)(3), 164.308(a)(4), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(a)(2)(iv), 164.310(b), 164.310(c), 164.310(d)(1), 164.310(d)(2), 164.310(d)(2)(i), 164.310(d)(2)(ii), 164.312(a), 164.312(e)
09.q
Procedures for the handling and storage of information shall be established to protect this information from unauthorized disclosure or misusePR.DS-3, PR.DS-5, PR.PT-1, PR.PT-2164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.312 (Technical safeguards)164.308(a)(1)(ii)(A), 164.308(a)(1)(ii)(D), 164.308(a)(3), 164.308(a)(3)(i), 164.308(a)(3)(ii)(A), 164.308(a)(4), 164.308(a)(5)(ii)(C), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(a)(2)(iv), 164.310(b), 164.310(c), 164.310(d)(1), 164.310(d)(2), 164.310(d)(2)(iii), 164.312(a), 164.312(a)(1), 164.312(a)(2)(iv), 164.312(b), 164.312(e)
09.r
System documentation shall be protected against unauthorized accessPR.AC-4164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.312 (Technical safeguards)164.308(a)(3), 164.308(a)(4), 164.310(a)(2)(iii), 164.310(b), 164.312(a)(1), 164.312(a)(2)(i), 164.312(a)(2)(ii)
09.s
Formal exchange policies, procedures, and controls shall be in place to protect the exchange of information through the use of all types of communication mediumsPR.AC-3, PR.AT-1, PR.DS-2, PR.DS-5164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.312 (Technical safeguards), 164.314 (Organizational requirements)164.308(a)(1)(ii)(D), 164.308(a)(3), 164.308(a)(4), 164.308(a)(4)(i), 164.308(a)(5), 164.308(b)(1), 164.308(b)(2), 164.308(b)(3), 164.310(b), 164.310(c), 164.312(a), 164.312(e), 164.312(e)(1), 164.312(e)(2)(i), 164.312(e)(2)(ii), 164.314(b)(2)(i)
09.t
Agreements shall be established and implemented for the exchange of information and software between the organization and external partiesPR.AT-3, PR.DS-2, PR.PT-2164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.312 (Technical safeguards), 164.314 (Organizational requirements)164.308(a)(3)(i), 164.308(a)(3)(ii)(A), 164.308(b), 164.308(b)(1), 164.308(b)(2), 164.310(d)(1), 164.310(d)(2), 164.312(a)(1), 164.312(a)(2)(iv), 164.312(b), 164.312(e)(1), 164.312(e)(2)(i), 164.312(e)(2)(ii), 164.314(a)(1), 164.314(a)(2)(i), 164.314(a)(2)(ii), 164.314(b)(2)(i)
09.u
Media containing information shall be protected against unauthorized access, misuse or corruption during transportation beyond the organization's physical boundariesPR.DS-2, PR.PT-2164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.312 (Technical safeguards), 164.314 (Organizational requirements)164.308(a)(3)(i), 164.308(a)(3)(ii)(A), 164.308(b)(1), 164.308(b)(2), 164.310(d)(1), 164.310(d)(2), 164.312(a)(1), 164.312(a)(2)(iv), 164.312(b), 164.312(e)(1), 164.312(e)(2)(i), 164.312(e)(2)(ii), 164.314(b)(2)(i)
09.v
Information involved in electronic messaging shall be appropriately protectedID.GV-3, PR.DS-2, PR.DS-5164.306 (Security standards: General rules), 164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.312 (Technical safeguards), 164.314 (Organizational requirements), 164.316 (Policies and procedures and documentation requirements)164.306, 164.308, 164.308(a)(1)(ii)(D), 164.308(a)(3), 164.308(a)(4), 164.308(b)(1), 164.308(b)(2), 164.310, 164.310(b), 164.310(c), 164.312, 164.312(a), 164.312(e), 164.312(e)(1), 164.312(e)(2)(i), 164.312(e)(2)(ii), 164.314, 164.314(b)(2)(i), 164.316
09.w
Policies and procedures shall be developed and implemented to protect information associated with the interconnection of business information systemsPR.AC-3, PR.AC-4, PR.AC-5, PR.DS-5, PR.IP-1, PR.IP-4, DE.AE-1164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.312 (Technical safeguards)164.308(a)(1)(ii)(D), 164.308(a)(3), 164.308(a)(4), 164.308(a)(4)(i), 164.308(a)(4)(ii)(B), 164.308(a)(7)(i), 164.308(a)(7)(ii), 164.308(a)(7)(ii)(A), 164.308(a)(7)(ii)(B), 164.308(a)(7)(ii)(D), 164.308(a)(8), 164.308(b)(1), 164.308(b)(3), 164.310(a)(1), 164.310(a)(2)(i), 164.310(a)(2)(iii), 164.310(b), 164.310(c), 164.310(d)(2)(iv), 164.312(a), 164.312(a)(1), 164.312(a)(2)(i), 164.312(a)(2)(ii), 164.312(b), 164.312(c), 164.312(e), 164.312(e)(1), 164.312(e)(2)(ii)
09.x
Information involved in electronic commerce passing over public networks shall be protected from fraudulent activity, contract dispute, and unauthorized disclosure or modificationID.GV-3, PR.AT-3, PR.DS-1, PR.DS-2, PR.DS-5164.306 (Security standards: General rules), 164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.312 (Technical safeguards), 164.314 (Organizational requirements), 164.316 (Policies and procedures and documentation requirements)164.306, 164.308, 164.308(a)(1)(ii)(D), 164.308(a)(3), 164.308(a)(4), 164.308(b), 164.308(b)(1), 164.308(b)(2), 164.310, 164.310(b), 164.310(c), 164.310(d), 164.312, 164.312(a), 164.312(a)(1), 164.312(a)(2)(iii), 164.312(a)(2)(iv), 164.312(b), 164.312(c), 164.312(d), 164.312(e), 164.312(e)(1), 164.312(e)(2)(i), 164.312(e)(2)(ii), 164.314, 164.314(a)(1), 164.314(a)(2)(i), 164.314(a)(2)(ii), 164.314(b)(2)(i), 164.316
09.y
Information involved in online transactions shall be protected to prevent incomplete transmission, misrouting, unauthorized message alteration, unauthorized disclosure, unauthorized message duplication or replayPR.AC-4, PR.DS-1, PR.DS-2, PR.DS-5164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.312 (Technical safeguards), 164.314 (Organizational requirements)164.308(a)(1)(ii)(D), 164.308(a)(3), 164.308(a)(4), 164.308(b)(1), 164.308(b)(2), 164.310(a)(2)(iii), 164.310(b), 164.310(c), 164.310(d), 164.312(a), 164.312(a)(1), 164.312(a)(2)(i), 164.312(a)(2)(ii), 164.312(a)(2)(iii), 164.312(a)(2)(iv), 164.312(b), 164.312(c), 164.312(d), 164.312(e), 164.312(e)(1), 164.312(e)(2)(i), 164.312(e)(2)(ii), 164.314(b)(2)(i)
09.z
The integrity of information being made available on a publicly available system shall be protected to prevent unauthorized modificationID.GV-3, ID.RA-1, PR.AC-4, PR.AT-2, PR.DS-1, PR.DS-2, PR.DS-6, PR.IP-1, DE.CM-6, DE.CM-8164.306 (Security standards: General rules), 164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.312 (Technical safeguards), 164.314 (Organizational requirements), 164.316 (Policies and procedures and documentation requirements)164.306, 164.308, 164.308(a)(1)(i), 164.308(a)(1)(ii)(A), 164.308(a)(1)(ii)(D), 164.308(a)(2), 164.308(a)(3), 164.308(a)(3)(i), 164.308(a)(4), 164.308(a)(5)(i), 164.308(a)(5)(ii)(A), 164.308(a)(5)(ii)(B), 164.308(a)(5)(ii)(C), 164.308(a)(5)(ii)(D), 164.308(a)(7)(i), 164.308(a)(7)(ii), 164.308(a)(7)(ii)(E), 164.308(a)(8), 164.308(b)(1), 164.308(b)(2), 164.310, 164.310(a)(1), 164.310(a)(2)(iii), 164.310(b), 164.310(d), 164.312, 164.312(a)(1), 164.312(a)(2)(i), 164.312(a)(2)(ii), 164.312(a)(2)(iii), 164.312(a)(2)(iv), 164.312(b), 164.312(c), 164.312(c)(1), 164.312(c)(2), 164.312(d), 164.312(e)(1), 164.312(e)(2)(i), 164.312(e)(2)(ii), 164.314, 164.314(b)(2)(i), 164.316, 164.316(b)(2)(iii)
09.aa
Audit logs recording user activities, exceptions, and information security events shall be produced and kept for an agreed period to assist in future investigations and access control monitoringPR.PT-1, DE.CM-1, DE.CM-3164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.312 (Technical safeguards)164.308(a)(1)(ii)(D), 164.308(a)(3)(ii)(A), 164.308(a)(5)(ii)(B), 164.308(a)(5)(ii)(C), 164.308(a)(8), 164.310(a)(2)(iv), 164.310(d)(2)(iii), 164.312(a)(2)(i), 164.312(b), 164.312(d), 164.312(e), 164.312(e)(2)(i)
09.ab
Procedures for monitoring use of information processing systems and facilities shall be established to check for use and effectiveness of implemented controls. The results of the monitoring activities shall be reviewed regularlyID.GV-3, ID.RA-1, PR.DS-6, PR.PT-1, DE.AE-2, DE.AE-3, DE.CM-1, DE.CM-2, DE.CM-3, DE.CM-4, DE.CM-7, DE.DP-2, DE.DP-3, DE.DP-4, DE.DP-5, RS.AN-1, RS.CO-2, RS.CO-3164.306 (Security standards: General rules), 164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.312 (Technical safeguards), 164.314 (Organizational requirements), 164.316 (Policies and procedures and documentation requirements)164.306, 164.306(e), 164.308, 164.308(6)(i), 164.308(a)(1)(i), 164.308(a)(1)(ii)(A), 164.308(a)(1)(ii)(D), 164.308(a)(3)(ii)(A), 164.308(a)(5)(ii)(B), 164.308(a)(5)(ii)(C), 164.308(a)(6)(ii), 164.308(a)(7)(ii)(E), 164.308(a)(8), 164.310, 164.310(a)(1), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(a)(2)(iv), 164.310(b), 164.310(c), 164.310(d)(1), 164.310(d)(2)(iii), 164.312, 164.312(a)(1), 164.312(a)(2)(i), 164.312(b), 164.312(c)(1), 164.312(c)(2), 164.312(d), 164.312(e), 164.312(e)(2)(i), 164.314, 164.314(a)(2)(i)(C), 164.314(a)(2)(iii), 164.314(b)(2)(i), 164.316, 164.316(b)(2)(iii)
09.ac
Logging systems and log information shall be protected against tampering and unauthorized accessPR.AC-4, PR.DS-1, PR.DS-2, PR.DS-4, PR.DS-6, PR.PT-1, DE.CM-1, RS.AN-1164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.312 (Technical safeguards), 164.314 (Organizational requirements)164.308(a)(1)(i), 164.308(a)(1)(ii)(A), 164.308(a)(1)(ii)(B), 164.308(a)(1)(ii)(D), 164.308(a)(3), 164.308(a)(4), 164.308(a)(5)(ii)(B), 164.308(a)(5)(ii)(C), 164.308(a)(6)(ii), 164.308(a)(7), 164.308(a)(8), 164.308(b)(1), 164.308(b)(2), 164.310(a)(2)(i), 164.310(a)(2)(iii), 164.310(a)(2)(iv), 164.310(b), 164.310(d), 164.310(d)(2)(iii), 164.310(d)(2)(iv), 164.312(a)(1), 164.312(a)(2)(i), 164.312(a)(2)(ii), 164.312(a)(2)(iii), 164.312(a)(2)(iv), 164.312(b), 164.312(c), 164.312(c)(1), 164.312(c)(2), 164.312(d), 164.312(e)(1), 164.312(e)(2)(i), 164.312(e)(2)(ii), 164.314(b)(2)(i)
09.ad
System administrator and system operator activities shall be logged and regularly reviewedPR.PT-1164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.312 (Technical safeguards)164.308(a)(1)(ii)(D), 164.308(a)(5)(ii)(C), 164.310(a)(2)(iv), 164.310(d)(2)(iii), 164.312(b)
09.ae
Faults shall be logged, analyzed, and appropriate remediation action takenPR.PT-1, DE.DP-4164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.312 (Technical safeguards), 164.314 (Organizational requirements)164.308(a)(1)(ii)(D), 164.308(a)(5)(ii)(C), 164.308(a)(6)(ii), 164.310(a)(2)(iv), 164.310(d)(2)(iii), 164.312(b), 164.314(a)(2)(i)(C), 164.314(a)(2)(iii)
09.af
The clocks of all relevant information processing systems within the organization or security domain shall be synchronized with an agreed accurate time source to support tracing and reconstitution of activity timelinesPR.PT-1164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.312 (Technical safeguards)164.308(a)(1)(ii)(D), 164.308(a)(5)(ii)(C), 164.310(a)(2)(iv), 164.310(d)(2)(iii), 164.312(b)
10.a
Statements of business requirements for new information systems (developed or purchased), or enhancements to existing information systems shall specify the requirements for security controlsID.GV-3, PR.AT-3, PR.IP-2, PR.PT-5, RS.MI-2164.306 (Security standards: General rules), 164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.312 (Technical safeguards), 164.314 (Organizational requirements), 164.316 (Policies and procedures and documentation requirements)164.306, 164.308, 164.308(a)(1)(i), 164.308(a)(6)(ii), 164.308(b), 164.310, 164.312, 164.314, 164.314(a)(1), 164.314(a)(2)(i), 164.314(a)(2)(ii), 164.316
10.b
Data input to applications and databases shall be validated to ensure that this data is correct and appropriatePR.DS-5, PR.DS-6, DE.CM-8, DE.DP-5164.306 (Security standards: General rules), 164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.312 (Technical safeguards)164.306(e), 164.308(a)(1)(i), 164.308(a)(1)(ii)(D), 164.308(a)(3), 164.308(a)(4), 164.308(a)(8), 164.310(b), 164.310(c), 164.312(a), 164.312(b), 164.312(c)(1), 164.312(c)(2), 164.312(e), 164.312(e)(2)(i)
10.c
Validation checks shall be incorporated into applications to detect any corruption of information through processing errors or deliberate actsID.RA-1, PR.DS-6, DE.CM-8, RS.CO-2, RS.MI-3164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.312 (Technical safeguards), 164.314 (Organizational requirements), 164.316 (Policies and procedures and documentation requirements)164.308(a)(1)(i), 164.308(a)(1)(ii)(A), 164.308(a)(1)(ii)(B), 164.308(a)(1)(ii)(D), 164.308(a)(5)(ii)(B), 164.308(a)(5)(ii)(C), 164.308(a)(6)(ii), 164.308(a)(7)(ii)(E), 164.308(a)(8), 164.310(a)(1), 164.312(a)(1), 164.312(b), 164.312(c)(1), 164.312(c)(2), 164.312(e)(2)(i), 164.314(a)(2)(i)(C), 164.314(a)(2)(iii), 164.316(b)(2)(iii)
10.d
Requirements for ensuring authenticity and protecting message integrity in applications shall be identified and controls implementedPR.DS-2, PR.DS-5, PR.DS-6164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.312 (Technical safeguards), 164.314 (Organizational requirements)164.308(a)(1)(ii)(D), 164.308(a)(3), 164.308(a)(4), 164.308(b)(1), 164.308(b)(2), 164.310(b), 164.310(c), 164.312(a), 164.312(b), 164.312(c)(1), 164.312(c)(2), 164.312(e), 164.312(e)(1), 164.312(e)(2)(i), 164.312(e)(2)(ii), 164.314(b)(2)(i)
10.e
Data output from an application shall be validated to ensure that the processing of stored information is correct and appropriate to the circumstancesNo mappingNo mapping
10.f
A policy on the use of cryptographic controls for protection of information shall be developed and implemented, and supported by formal proceduresID.GV-3, PR.DS-1, PR.DS-2164.306 (Security standards: General rules), 164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.312 (Technical safeguards), 164.314 (Organizational requirements), 164.316 (Policies and procedures and documentation requirements)164.306, 164.308, 164.308(a)(1)(ii)(D), 164.308(b)(1), 164.308(b)(2), 164.310, 164.310(d), 164.312, 164.312(a)(1), 164.312(a)(2)(iii), 164.312(a)(2)(iv), 164.312(b), 164.312(c), 164.312(d), 164.312(e)(1), 164.312(e)(2)(i), 164.312(e)(2)(ii), 164.314, 164.314(b)(2)(i), 164.316
10.g
Key management shall be in place to support the organization's use of cryptographic techniquesPR.DS-1, PR.DS-2164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.312 (Technical safeguards), 164.314 (Organizational requirements)164.308(a)(1)(ii)(D), 164.308(b)(1), 164.308(b)(2), 164.310(d), 164.312(a)(1), 164.312(a)(2)(iii), 164.312(a)(2)(iv), 164.312(b), 164.312(c), 164.312(d), 164.312(e)(1), 164.312(e)(2)(i), 164.312(e)(2)(ii), 164.314(b)(2)(i)
10.h
There shall be procedures in place to control the installation of software on operational systemsPR.DS-7, PR.IP-1, PR.IP-3164.308 (Administrative safeguards)164.308(a)(4)4, 164.308(a)(7)(i), 164.308(a)(7)(ii), 164.308(a)(8)
10.i
Test data shall be selected carefully, and protected and controlled in nonproduction environmentsPR.AC-1, PR.AC-2, PR.AC-3, PR.AC-4, PR.DS-1, PR.PT-1, PR.PT-3164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.312 (Technical safeguards), 164.314 (Organizational requirements)164.308(a)(1)(ii)(B), 164.308(a)(1)(ii)(D), 164.308(a)(3), 164.308(a)(3)(ii)(B), 164.308(a)(3)(ii)(C), 164.308(a)(4), 164.308(a)(4)(i), 164.308(a)(4)(ii)(B), 164.308(a)(4)(ii)(C), 164.308(a)(5)(ii)(C), 164.308(a)(7)(i), 164.308(a)(7)(ii)(A), 164.308(b)(1), 164.308(b)(3), 164.310(a)(1), 164.310(a)(2)(i), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(a)(2)(iv), 164.310(b), 164.310(c), 164.310(d), 164.310(d)(1), 164.310(d)(2)(iii), 164.312(a)(1), 164.312(a)(2)(i), 164.312(a)(2)(ii), 164.312(a)(2)(iii), 164.312(a)(2)(iv), 164.312(b), 164.312(c), 164.312(d), 164.312(e)(1), 164.312(e)(2)(ii), 164.314(b)(2)(i)
10.j
Access to program source code shall be restrictedPR.DS-5, PR.PT-3164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.312 (Technical safeguards)164.308(a)(1)(ii)(D), 164.308(a)(3), 164.308(a)(4), 164.310(a)(2)(iii), 164.310(b), 164.310(c), 164.312(a), 164.312(a)(1), 164.312(a)(2)(i), 164.312(a)(2)(ii), 164.312(a)(2)(iv), 164.312(e)
10.k
The implementation of changes, including patches, service packs, and other updates and modifications, shall be controlled by the use of formal change control proceduresID.AM-6, ID.RA-4, ID.RA-5, PR.AT-3, PR.DS-8, PR.IP-1, PR.IP-2, PR.IP-3, PR.PT-3, DE.CM-1, DE.CM-7164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.312 (Technical safeguards), 164.314 (Organizational requirements), 164.316 (Policies and procedures and documentation requirements)164.308(a)(1)(i), 164.308(a)(1)(ii)(A), 164.308(a)(1)(ii)(B), 164.308(a)(1)(ii)(D), 164.308(a)(2), 164.308(a)(3), 164.308(a)(4), 164.308(a)(5)(ii)(B), 164.308(a)(5)(ii)(C), 164.308(a)(6), 164.308(a)(7)(i), 164.308(a)(7)(ii), 164.308(a)(7)(ii)(D), 164.308(a)(7)(ii)(E), 164.308(a)(8), 164.308(b), 164.308(b)(1), 164.310(a)(1), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(b), 164.310(c), 164.310(d)(1), 164.310(d)(2)(iii), 164.312(a)(1), 164.312(a)(2)(i), 164.312(a)(2)(ii), 164.312(a)(2)(iv), 164.312(b), 164.312(e)(2)(i), 164.314, 164.314(a)(1), 164.314(a)(2)(i), 164.314(a)(2)(ii), 164.314(b)(2)(i), 164.316(a)
10.l
Outsourced software development shall be supervised and monitored by the organizationID.BE-1, ID.RA-3, PR.AT-3, PR.IP-2, DE.CM-4, DE.CM-6164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.312 (Technical safeguards), 164.314 (Organizational requirements), 164.316 (Policies and procedures and documentation requirements)164.308(a)(1)(i), 164.308(a)(1)(ii)(A), 164.308(a)(1)(ii)(D), 164.308(a)(3), 164.308(a)(4), 164.308(a)(4)(ii), 164.308(a)(5)(ii)(A), 164.308(a)(5)(ii)(B), 164.308(a)(7)(ii)(C), 164.308(a)(7)(ii)(E), 164.308(a)(8), 164.308(b), 164.310(a)(1), 164.310(a)(2)(i), 164.310(a)(2)(iii), 164.312(a)(1), 164.312(c), 164.312(e), 164.314, 164.314(a)(1), 164.314(a)(2)(i), 164.314(a)(2)(ii), 164.316
10.m
Timely information about technical vulnerabilities of information systems being used shall be obtained; the organization's exposure to such vulnerabilities evaluated; and appropriate measures taken to address the associated riskID.AM-6, ID.RA-1, ID.RA-2, ID.RA-4, ID.RA-5, ID.RA-6, PR.IP-12, PR.PT-1, PR.PT-3, DE.CM-8, RS.AN-5, RS.CO-3, RS.MI-3164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.312 (Technical safeguards), 164.314 (Organizational requirements), 164.316 (Policies and procedures and documentation requirements)164.308(a)(1)(i), 164.308(a)(1)(ii)(A), 164.308(a)(1)(ii)(B), 164.308(a)(1)(ii)(D), 164.308(a)(2), 164.308(a)(3), 164.308(a)(4), 164.308(a)(5)(ii)(B), 164.308(a)(5)(ii)(C), 164.308(a)(6), 164.308(a)(6)(ii), 164.308(a)(7)(ii)(D), 164.308(a)(7)(ii)(E), 164.308(a)(8), 164.308(b)(1), 164.310(a)(1), 164.310(a)(2)(iii), 164.310(a)(2)(iv), 164.310(b), 164.310(c), 164.310(d)(2)(iii), 164.312(a)(1), 164.312(a)(2)(i), 164.312(a)(2)(ii), 164.312(a)(2)(iv), 164.312(b), 164.314, 164.314(a)(2)(i)(C), 164.314(b)(2)(iv), 164.316(a), 164.316(b)(2)(iii)
11.a
Information security events shall be reported through appropriate communications channels as quickly as possible. All employees, contractors and third-party users shall be made aware of their responsibility to report any information security events as quickly as possibleID.GV-3, PR.AT-5, PR.IP-7, PR.IP-9, PR.IP-11, DE.CM-1, DE.DP-4, RS.CO-1, RS.CO-2, RS.CO-3, RS.CO-5, RS.RP-1164.306 (Security standards: General rules), 164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.312 (Technical safeguards), 164.314 (Organizational requirements), 164.316 (Policies and procedures and documentation requirements), 164.530 (Administrative requirements)164.306, 164.306(e), 164.308, 164.308(a)(1)(ii)(C), 164.308(a)(1)(ii)(D), 164.308(a)(2), 164.308(a)(3), 164.308(a)(3)(i), 164.308(a)(5)(i), 164.308(a)(5)(ii)(A), 164.308(a)(5)(ii)(B), 164.308(a)(5)(ii)(C), 164.308(a)(5)(ii)(D), 164.308(a)(6), 164.308(a)(6)(i), 164.308(a)(6)(ii), 164.308(a)(7), 164.308(a)(7)(i), 164.308(a)(7)(ii)(A), 164.308(a)(7)(ii)(B), 164.308(a)(7)(ii)(C), 164.308(a)(7)(ii)(D), 164.308(a)(8), 164.310, 164.310(a)(2)(i), 164.312, 164.312(a)(2)(ii), 164.312(b), 164.312(e)(2)(i), 164.314, 164.314(a)(2)(i)(C), 164.314(a)(2)(iii), 164.316, 164.316(b)(2)(iii), 164.530(b)(1)
11.b
All employees, contractors, and third-party users of information systems and services shall be required to note and report any observed or suspected security weaknesses in systems or servicesID.RA-1, PR.AT-1, RS.CO-2164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.312 (Technical safeguards), 164.314 (Organizational requirements), 164.316 (Policies and procedures and documentation requirements)164.308(a)(1)(ii)(A), 164.308(a)(5), 164.308(a)(5)(ii)(B), 164.308(a)(5)(ii)(C), 164.308(a)(6)(ii), 164.308(a)(7)(ii)(E), 164.308(a)(8), 164.310(a)(1), 164.312(a)(1), 164.314(a)(2)(i)(C), 164.314(a)(2)(iii), 164.316(b)(2)(iii)
11.c
Management responsibilities and procedures shall be established to ensure a quick, effective, and orderly response to information security incidentsID.GV-3, PR.AT-1, PR.IP-9, PR.IP-10, DE.AE-3, DE.AE-3, RS.AN-3, RS.AN-4, RS.CO-1, RS.CO-2, RS.CO-3, RS.CO-4, RS.CO-5, RS.IM-1, RS.IM-2, RS.MI-1, RS.MI-2, RS.RP-1, RC.CO-1, RC.CO-2164.306 (Security standards: General rules), 164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.312 (Technical safeguards), 164.314 (Organizational requirements), 164.316 (Policies and procedures and documentation requirements)164.306, 164.308, 164.308(a)(1)(ii)(D), 164.308(a)(2), 164.308(a)(5), 164.308(a)(5)(ii)(B), 164.308(a)(5)(ii)(C), 164.308(a)(6), 164.308(a)(6)(i), 164.308(a)(6)(i)5, 164.308(a)(6)(ii), 164.308(a)(7), 164.308(a)(7)(i), 164.308(a)(7)(ii)(A), 164.308(a)(7)(ii)(B), 164.308(a)(7)(ii)(C), 164.308(a)(7)(ii)(D), 164.308(a)(8), 164.310, 164.310(a)(2)(i), 164.310(d)(2)(iii), 164.312, 164.312(a)(2)(ii), 164.312(b), 164.314, 164.314(a)(2)(i)(C), 164.314(a)(2)(iii), 164.316, 164.316(b)(2)(iii))
11.d
There shall be mechanisms in place to enable the types, volumes, and costs of information security incidents to be quantified and monitoredID.AM-6, DE.AE-1, DE.AE-2, DE.AE-4, RS.AN-1, RS.AN-2, RS.AN-3, RS.CO-3, RS.CO-4, RS.IM-1, RS.IM-2, RS.MI-1, RS.MI-2, RS.RP-1, RC.CO-1, RC.CO-3, RC.IM-1, RC.IM-2, RC.RP-1164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.312 (Technical safeguards), 164.314 (Organizational requirements), 164.316 (Policies and procedures and documentation requirements)164.308(6)(i), 164.308(a)(1)(i), 164.308(a)(1)(ii)(D), 164.308(a)(2), 164.308(a)(3), 164.308(a)(4), 164.308(a)(5)(ii)(B), 164.308(a)(5)(ii)(C), 164.308(a)(6), 164.308(a)(6)(i)5, 164.308(a)(6)(ii), 164.308(a)(7), 164.308(a)(7)(i), 164.308(a)(7)(ii)(A), 164.308(a)(7)(ii)(B), 164.308(a)(7)(ii)(C), 164.308(a)(7)(ii)(D), 164.308(a)(7)(ii)(E), 164.308(a)(8), 164.308(b)(1), 164.310(a)(2)(i), 164.312(a)(2)(ii), 164.312(b), 164.314, 164.314(a)(2)(i)(C), 164.316(b)(2)(iii), 164.316(b)(2)(iii))
11.e
Where a follow-up action against a person or organization after an information security incident involves legal action (either civil or criminal), evidence shall be collected, retained, and presented in support of potential legal action in accordance with the rules for evidence in the relevant jurisdiction(s)ID.GV-3, PR.IP-11, RS.AN-3164.306 (Security standards: General rules), 164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.312 (Technical safeguards), 164.314 (Organizational requirements), 164.316 (Policies and procedures and documentation requirements)164.306, 164.308, 164.308(a)(1)(ii)(C), 164.308(a)(3), 164.308(a)(6), 164.310, 164.312, 164.314, 164.316
12.a
A managed program and process shall be developed and maintained for business continuity throughout the organization that addresses the information security requirements needed for the organization's business continuityID.AM-5, ID.AM-6, ID.BE-5, PR.IP-9, PR.IP-11, PR.PT-5, DE.AE-4164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.312 (Technical safeguards), 164.314 (Organizational requirements)164.308(a)(1)(ii)(B), 164.308(a)(1)(ii)(C), 164.308(a)(2), 164.308(a)(3), 164.308(a)(4), 164.308(a)(6), 164.308(a)(6)(ii), 164.308(a)(7), 164.308(a)(7)(ii)(E), 164.308(a)(8), 164.308(b)(1), 164.310(a)(2)(i), 164.312(a)(2)(ii), 164.314, 164.314(b)(2)(i)
12.b
Events that can cause interruptions to business processes shall be identified, along with the probability and impact of such interruptions and their consequences for information securityID.BE-2, ID.BE-4, ID.BE-5, ID.RA-1, ID.RA-2, ID.RA-3, ID.RA-4, ID.RA-5, ID.RM-3, PR.IP-9, PR.PT-5, DE.AE-4164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.312 (Technical safeguards), 164.314 (Organizational requirements), 164.316 (Policies and procedures and documentation requirements)164.308(a)(1)(i), 164.308(a)(1)(ii)(A), 164.308(a)(1)(ii)(B), 164.308(a)(1)(ii)(D), 164.308(a)(3), 164.308(a)(4), 164.308(a)(4)(ii), 164.308(a)(5)(ii)(A), 164.308(a)(6), 164.308(a)(6)(ii), 164.308(a)(7), 164.308(a)(7)(i), 164.308(a)(7)(ii)(C), 164.308(a)(7)(ii)(D), 164.308(a)(7)(ii)(E), 164.308(a)(8), 164.310(a)(1), 164.310(a)(2)(i), 164.310(a)(2)(iii), 164.312(a)(1), 164.312(a)(2)(ii), 164.312(c), 164.312(e), 164.314, 164.314(a)(1), 164.314(b)(2)(i), 164.316, 164.316(a), 164.316(b)(2)(iii)
12.c
Plans shall be developed and implemented to maintain or restore operations and ensure availability of information, at the required level and in the required time scales, following interruption to, or failure of, critical business processesID.AM-5, ID.AM-6, ID.BE-4, ID.BE-5, PR.AT-1, PR.DS-1, PR.DS-4, PR.IP-9, PR.PT-5, RS.CO-1, RS.CO-4, RC.CO-3, RC.RP-1164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.312 (Technical safeguards), 164.314 (Organizational requirements)164.308(a)(1)(ii)(A), 164.308(a)(1)(ii)(B), 164.308(a)(1)(ii)(D), 164.308(a)(2), 164.308(a)(3), 164.308(a)(4), 164.308(a)(5), 164.308(a)(6), 164.308(a)(6)(i), 164.308(a)(6)(ii), 164.308(a)(7), 164.308(a)(7)(i), 164.308(a)(7)(ii)(A), 164.308(a)(7)(ii)(B), 164.308(a)(7)(ii)(C), 164.308(a)(7)(ii)(E), 164.308(a)(8), 164.308(b)(1), 164.310(a)(2)(i), 164.310(d), 164.310(d)(2)(iv), 164.312(a)(1), 164.312(a)(2)(ii), 164.312(a)(2)(iii), 164.312(a)(2)(iv), 164.312(b), 164.312(c), 164.312(d), 164.314, 164.314(a)(1), 164.314(a)(2)(i)(C), 164.314(b)(2)(i)
12.d
A single framework of business continuity plans shall be maintained to ensure all plans are consistent, to consistently address information security requirements, and to identify priorities for testing and maintenanceID.AM-5, ID.AM-6, ID.BE-5, PR.AT-1, PR.IP-7, PR.IP-9, PR.PT-5, DE.AE-5, RS.CO-1164.306 (Security standards: General rules), 164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.312 (Technical safeguards), 164.314 (Organizational requirements), 164.316 (Policies and procedures and documentation requirements)164.306(e), 164.308(a)(1)(ii)(B), 164.308(a)(2), 164.308(a)(3), 164.308(a)(4), 164.308(a)(5), 164.308(a)(6), 164.308(a)(6)(i), 164.308(a)(6)(ii), 164.308(a)(7), 164.308(a)(7)(ii)(A), 164.308(a)(7)(ii)(B), 164.308(a)(7)(ii)(C), 164.308(a)(7)(ii)(D), 164.308(a)(7)(ii)(E), 164.308(a)(8), 164.308(b)(1), 164.310(a)(2)(i), 164.312(a)(2)(ii), 164.314, 164.314(b)(2)(i), 164.316(b)(2)(iii)
12.e
Business continuity plans shall be tested and updated regularly, at a minimum annually, to ensure that they are up to date and effectiveID.AM-6, ID.GV-3, ID.SC-5, PR.IP-7, PR.IP-9, PR.IP-10, RS.CO-1, RC.IM-1, RC.IM-2164.306 (Security standards: General rules), 164.308 (Administrative safeguards), 164.310 (Physical safeguards), 164.312 (Technical safeguards), 164.314 (Organizational requirements), 164.316 (Policies and procedures and documentation requirements)164.306, 164.306(e), 164.308, 164.308(a)(2), 164.308(a)(3), 164.308(a)(4), 164.308(a)(6), 164.308(a)(6)(i), 164.308(a)(7), 164.308(a)(7)(ii)(A), 164.308(a)(7)(ii)(B), 164.308(a)(7)(ii)(C), 164.308(a)(7)(ii)(D), 164.308(a)(8), 164.308(b)(1), 164.310, 164.310(a)(2)(i), 164.312, 164.312(a)(2)(ii), 164.314, 164.316, 164.316(b)(2)(iii)
13.a
Data Subjects have a right to adequate and easily accessible notice of the use and disclosures of their PII that may be made by the PII controller, and of the data subject's rights and the controller’s legal duties with respect to PIINo mappingNo mapping
13.b
To provide data subjects with clear and easily accessible information about the PII controller’s policies, procedures and practices with respect to the handling of PIINo mappingNo mapping
13.c
To ensure that disclosures of PII, especially to third parties, are recorded. To ensure the PII processor notifies the PII controller of any legally binding requests for disclosure of PII. Provisions for the use of subcontractors to process PII should be specified in the contract between the PII processor and the PII controllerNo mappingNo mapping
13.d
To make data subjects active participants in the decision-making process regarding the processing of their PII, except as otherwise limited by legislation and regulations, through the exercise of meaningful, informed and freely given consentNo mappingNo mapping
13.e
To present to data subjects, where appropriate and feasible, the choice not to allow the processing of their PII, to refuse or withdraw consent or to oppose a specific type of processing, and to explain to data subjects the implications of granting or refusing consentNo mappingNo mapping
13.f
To give data subjects the ability to access and review their PII and to challenge its accuracy and completenessNo mappingNo mapping
13.g
To ensure that the purpose(s) for processing PII complies with applicable laws and relies on a permissible legal groundNo mappingNo mapping
13.h
To specify the purposes for which PII are collected no later than at the time of PII collection where feasible and limit the subsequence use to the fulfillment of original purposesNo mappingNo mapping
13.i
To limit the collection of PII to that which is within the boundaries of applicable law and strictly necessary for the specified purpose(s)No mappingNo mapping
13.j
To minimize the PII which is processed to what is strictly necessary for the legitimate interest pursued by the PII controller and to limit the disclosure of PII to a minimum number of internal and external partiesNo mappingNo mapping
13.k
To limit the use and disclosure of PII for specific, explicit and legitimate purposes and to fulfill the stated purpose(s) or to abide by applicable lawsNo mappingNo mapping
13.l
To retain PII no longer than necessary to fulfill the stated purpose(s) or to abide by applicable lawsNo mappingNo mapping
13.m
To ensure that the PII processed is accurate, complete, up-to-date, adequate and relevant for the purpose of useNo mappingNo mapping
13.n
To provide any amendment, correction or removal to PII processors and third parties to whom personal data had been disclosedNo mappingNo mapping
13.o
To set up efficient internal complaint handling and redress procedures for use by data subjectsNo mappingNo mapping
13.p
To establish efficient governance for PII processingNo mappingNo mapping
13.q
To establish a privacy impact assessment process and to perform a privacy impact assessment as necessaryNo mappingNo mapping
13.r
To ensure, through contractual or other means, that third party recipients provide at least equivalent levels of PII protectionNo mappingNo mapping
13.s
To monitor and audit PII protection controls and the effectiveness of internal PII protection policyNo mappingNo mapping
13.t
To provide suitable training and awareness concerning PII protection for the personnel of the PII controller who will have access to PIINo mappingNo mapping
13.u
To develop, disseminate and update PII protection reportsNo mappingNo mapping