Skip to main content

HITRUST to Unified Control Mapping

Use this guide to identify a Unified Control by its corresponding HITRUST framework control.

D
Written by Drew Salisbury
Updated over a year ago

If you’re used to working with a specific HITRUST framework control, you can use this guide to identify its corresponding Unified Control.

For more information, and to view other framework control maps, visit Unified Controls FAQ.

HITRUST Control

Unified Control

04.01x1Organizational.5-e1 Mobile Computing and Communications

CTRL-112 Encryption of Data at Rest and in Transit

04.01x1Organizational.5-i1 Encryption of Mobile Devices

CTRL-112 Encryption of Data at Rest and in Transit

04.01x1Organizational.5-r2 Mobile Computing and Communications

CTRL-112 Encryption of Data at Rest and in Transit

06.09b1System.2-e1 Change Management

CTRL-190 Change Management and Software Development Life Cycle

06.09b1System.2-i1 Change Management

CTRL-190 Change Management and Software Development Life Cycle

06.09b1System.2-r2 Change Management

CTRL-190 Change Management and Software Development Life Cycle

07.07a1Organizational.8-e1 IT Asset Inventory Review

CTRL-435 System Inventory

07.07a1Organizational.8-i1 Inventory of Assets Review

CTRL-435 System Inventory

07.07a1Organizational.8-r2 Inventory of Assets

CTRL-435 System Inventory

07.10m1Organizational.2-e1 Security Updates

CTRL-652 Vulnerability Management

07.10m1Organizational.2-i1 Automated Software Update

CTRL-652 Vulnerability Management

07.10m1Organizational.2-r2 Control of Technical Vulnerabilities

CTRL-652 Vulnerability Management

07.10m1Organizational.3-e1 Vulnerability Scans

CTRL-652 Vulnerability Management

07.10m1Organizational.3-i1 Vulnerability Scans

CTRL-652 Vulnerability Management

07.10m1Organizational.3-r2 Control of Technical Vulnerabilities

CTRL-652 Vulnerability Management

08.09m1Organizational.8-e1 Malicious Addresses Controls

CTRL-822 Malicious Code Protection

08.09m1Organizational.8-i1 Network Controls

CTRL-208 Configuration Management

08.09m1Organizational.8-r2 Network Controls

CTRL-208 Configuration Management

09.09v1Organizational.7-e1 Email Filtering

CTRL-883 Spam and Phishing Protection

09.09v1Organizational.7-i1 Email Filtering

CTRL-883 Spam and Phishing Protection

09.09v1Organizational.7-r2 Electronic Messaging

CTRL-883 Spam and Phishing Protection

10.01d1System.10-e1 Password Policy

CTRL-349 Password-Based Authentication

10.01d1System.10-i1 Password Policy

CTRL-349 Password-Based Authentication

10.01d1System.10-r2 User Password Management

CTRL-349 Password-Based Authentication

11.01e1System.2-e1 Review of User Access Rights

CTRL-73 Review of User Privileges

11.01e1System.2-i1 Review of User Access Rights

CTRL-73 Review of User Privileges

11.01e1System.2-r2 Review of User Access Rights

CTRL-73 Review of User Privileges

11.01p1System.5-e1 Secure Logon Procedures

CTRL-77 Unsuccessful Logon Attempts

11.01p1System.5-i1 Secure Log-on Procedures

CTRL-77 Unsuccessful Logon Attempts

11.01p1System.5-r2 Secure Log-on Procedures

CTRL-77 Unsuccessful Logon Attempts

11.01q1System.3-e1 Admin Account MFA

CTRL-320 Multi-Factor Authentication

11.01q1System.3-i1 Privileged MFA

CTRL-320 Multi-Factor Authentication

11.01q1System.3-r2 User Identification and Authentication

CTRL-320 Multi-Factor Authentication

11.01q1System.4-e1 All Accounts MFA

CTRL-320 Multi-Factor Authentication

11.01q1System.4-i1 Non-Privileged MFA

CTRL-320 Multi-Factor Authentication

11.01q1System.4-r2 User Identification and Authentication

CTRL-320 Multi-Factor Authentication

13.02e1Organizational.6-e1 Phishing Awareness Training

CTRL-245 Security and Privacy Awareness Training

13.02e1Organizational.6-i1 Phishing Awareness Training

CTRL-245 Security and Privacy Awareness Training

13.02e1Organizational.6-r2 Information Security Awareness, Education, and Training

CTRL-245 Security and Privacy Awareness Training

15.11aHIPAAOrganizational.3-r2 Reporting Information Security Events

CTRL-416 Incident Reporting

15.11aHIPAAOrganizational.4-r2 Reporting Information Security Events

CTRL-416 Incident Reporting

15.11aHIPAAOrganizational.5-r2 Reporting Information Security Events

CTRL-416 Incident Reporting

16.09l1Organizational.4-e1 Offline Backup Storage

CTRL-283 Alternate Storage Site

16.09l1Organizational.4-i1 Offline Backup Storage

CTRL-283 Alternate Storage Site

16.09l1Organizational.4-r2 Offline Backup Storage

CTRL-283 Alternate Storage Site

099.09m2Organizational.11-r2 Network Controls

CTRL-112 Encryption of Data at Rest and in Transit

0101.00a1Organizational.123-i1 Information Security Management Program

CTRL-431 Information Security Policy and Procedures

0101.00a1Organizational.123-r2 Information Security Management Program

CTRL-431 Information Security Policy and Procedures

0102.00a2Organizational.123-r2 Information Security Management Program

CTRL-431 Information Security Policy and Procedures

0104.02a1Organizational.12-i1 Roles and Responsibilities

CTRL-545 Position Descriptions

0104.02a1Organizational.12-r2 Roles and Responsibilities

CTRL-545 Position Descriptions

0109.02d1Organizational.4-i1 Management Responsibilities

CTRL-539 Access Agreements

0109.02d1Organizational.4-r2 Management Responsibilities

CTRL-539 Access Agreements

0113.04a1Organizational.2-e1 Information Security Policy Document

CTRL-431 Information Security Policy and Procedures

0113.04a1Organizational.2-i1 Information Security Policy Document

CTRL-431 Information Security Policy and Procedures

0113.04a1Organizational.2-r2 Information Security Policy Document

CTRL-431 Information Security Policy and Procedures

0113.04a2Organizational.1-r2 Information Security Policy Document

CTRL-431 Information Security Policy and Procedures

0114.04b1Organizational.1-i1 Review of the Information Security Policy

CTRL-431 Information Security Policy and Procedures

0117.05a1Organizational.1-i1 Management Commitment to Information Security

CTRL-432 Information Security Program Leadership Role

0117.05a1Organizational.1-r2 Management Commitment to Information Security

CTRL-432 Information Security Program Leadership Role

0126.05b1Organizational.1-i1 Information Security Coordination

CTRL-434 Plan of Action and Milestones Process

0126.05b1Organizational.1-r2 Information Security Coordination

CTRL-434 Plan of Action and Milestones Process

0135.02f1Organizational.56-i1 Disciplinary Process

CTRL-544 Personnel Sanctions

0135.02f1Organizational.56-r2 Disciplinary Process

CTRL-544 Personnel Sanctions

0151.02c1Organizational.23-i1 Terms and Conditions of Employment

CTRL-539 Access Agreements

0151.02c1Organizational.23-r2 Terms and Conditions of Employment

CTRL-539 Access Agreements

0168.05b2Organizational.5-r2 Information Security Coordination

CTRL-431 Information Security Policy and Procedures

0173.05c1Organizational.45-i1 Allocation of Information Security Responsibilities

CTRL-432 Information Security Program Leadership Role

0173.05c1Organizational.45-r2 Allocation of Information Security Responsibilities

CTRL-432 Information Security Program Leadership Role

0180.05h1Organizational.4-i1 Independent Review of Information Security

CTRL-167 Continuous Monitoring

0180.05h1Organizational.4-r2 Independent Review of Information Security

CTRL-167 Continuous Monitoring

0181.06a1Organizational.12-i1 Identification of Applicable Legislation

CTRL-245 Security and Privacy Awareness Training

0181.06a1Organizational.12-r2 Identification of Applicable Legislation

CTRL-245 Security and Privacy Awareness Training

0183.07b1Organizational.1-i1 Ownership of Assets

CTRL-435 System Inventory

0183.07b1Organizational.1-r2 Ownership of Assets

CTRL-435 System Inventory

0193.09a1System.3-i1 Documented Operations Procedures

CTRL-431 Information Security Policy and Procedures

0193.09a1System.3-r2 Documented Operations Procedures

CTRL-431 Information Security Policy and Procedures

0199.00aHIXOrganizational.2-r2 Information Security Management Program

CTRL-431 Information Security Policy and Procedures

0201.09j1Organizational.124-i1 Controls Against Malicious Code

CTRL-883 Spam and Phishing Protection

0201.09j1Organizational.124-r2 Controls Against Malicious Code

CTRL-883 Spam and Phishing Protection

0207.09j1Organizational.6-i1 Centrally Managed Spam Protection

CTRL-883 Spam and Phishing Protection

0207.09j1Organizational.6-r2 Controls Against Malicious Code

CTRL-883 Spam and Phishing Protection

0210.01g1Organizational.1-i1 Unattended User Equipment

CTRL-539 Access Agreements

0210.01g1Organizational.1-r2 Unattended User Equipment

CTRL-539 Access Agreements

0217.09j1Organizational.7-i1 Spam Protection Configurations

CTRL-883 Spam and Phishing Protection

0217.09j1Organizational.7-r2 Controls Against Malicious Code

CTRL-883 Spam and Phishing Protection

0226.09k1Organizational.2-e1 Controls Against Mobile Code

CTRL-822 Malicious Code Protection

0226.09k1Organizational.2-i1 Mobile Code Protection

CTRL-822 Malicious Code Protection

0226.09k1Organizational.2-r2 Controls Against Mobile Code

CTRL-822 Malicious Code Protection

0265.09m1Organizational.2-e1 Default Deny

CTRL-950 Boundary Protection

0265.09m1Organizational.2-i1 Default Deny Firewall

CTRL-950 Boundary Protection

0265.09m1Organizational.2-r2 Network Controls

CTRL-950 Boundary Protection

0302.09o1Organizational.3-i1 Removable Media Transmission

CTRL-506 Media Transport

0302.09o1Organizational.3-r2 Management of Removable Media

CTRL-506 Media Transport

0304.09o1Organizational.2-e1 Management of Removable Media

CTRL-520 Media Use

0304.09o1Organizational.2-i1 Restrict Writable Removable Media

CTRL-520 Media Use

0304.09o1Organizational.2-r2 Management of Removable Media

CTRL-520 Media Use

0305.09q1Organizational.12-i1 Information Handling Procedures

CTRL-502 Media Marking

0305.09q1Organizational.12-r2 Information Handling Procedures

CTRL-502 Media Marking

0311.09o1Organizational.5-i1 Removable Media Sanitization

CTRL-511 Media Sanitization and Disposal

0311.09o1Organizational.5-r2 Management of Removable Media

CTRL-511 Media Sanitization and Disposal

0321.09u1Organizational.2-i1 Physical Media in Transit

CTRL-506 Media Transport

0321.09u1Organizational.2-r2 Physical Media in Transit

CTRL-506 Media Transport

0322.09u2Organizational.12-r2 Media Encryption

CTRL-503 Media Storage

0323.09u2Organizational.3-r2 Physical Media in Transit

CTRL-506 Media Transport

0330.09o1Organizational.4-i1 Removable Media Business Need

CTRL-520 Media Use

0330.09o1Organizational.4-r2 Management of Removable Media

CTRL-520 Media Use

0403.01x1Organizational.5-i1 Mobile Device Monitoring

CTRL-79 Mobile Device Management

0403.01x1Organizational.5-r2 Mobile Computing and Communications

CTRL-79 Mobile Device Management

0404.01x1Organizational.5-i1 Mobile Device Travel

CTRL-79 Mobile Device Management

0407.01y1Organizational.4-i1 Teleworking Physical Security

CTRL-596 Alternate Work Site

0407.01y1Organizational.4-r2 Teleworking

CTRL-596 Alternate Work Site

0415.01y1Organizational.10-i1 Teleworking Security

CTRL-596 Alternate Work Site

0415.01y1Organizational.10-r2 Teleworking

CTRL-596 Alternate Work Site

0429.01x1Organizational.5-i1 Mobile Device Security

CTRL-79 Mobile Device Management

0429.01x1Organizational.5-r2 Mobile Computing and Communications

CTRL-79 Mobile Device Management

0501.09m1Organizational.10-i1 WAP Default

CTRL-121 Wireless Network

0501.09m1Organizational.11-i1 Wireless Encryption Keys

CTRL-121 Wireless Network

0502.09m1Organizational.5-e1 Wireless Access Security

CTRL-121 Wireless Network

0502.09m1Organizational.5-i1 Wireless Access Approval

CTRL-121 Wireless Network

0503.09m1Organizational.6-i1 Wireless Access Security

CTRL-121 Wireless Network

0504.09m1Organizational.13-i1 Perimeter Firewalls

CTRL-950 Boundary Protection

0504.09m1Organizational.13-r2 Network Controls

CTRL-950 Boundary Protection

0505.09m1Organizational.11-i1 Wireless Access Point Scans

CTRL-652 Vulnerability Management

0505.09m1Organizational.11-r2 Network Controls

CTRL-652 Vulnerability Management

0506.09m1Organizational.11-i1 Network Controls

CTRL-121 Wireless Network

0601.06g1Organizational.124-i1 Compliance with Security Policies and Standards

CTRL-652 Vulnerability Management

0601.06g1Organizational.124-r2 Compliance with Security Policies and Standards

CTRL-149 Control Assessments

0605.10h2System.7-r2 Control of Operational Software

CTRL-190 Change Management and Software Development Life Cycle

0606.10h2System.1-r2 Control of Operational Software

CTRL-190 Change Management and Software Development Life Cycle

0607.10h2System.23-r2 Control of Operational Software

CTRL-208 Configuration Management

0613.06h1Organizational.12-i1 Technical Compliance Checking

CTRL-208 Configuration Management

0613.06h1Organizational.12-r2 Technical Compliance Checking

CTRL-208 Configuration Management

0625.10c2System.8-r2 Control of Internal Processing

CTRL-208 Configuration Management

0627.10h1System.45-e1 Control of Operational Software

CTRL-1109 Supplier Assessments and Reviews

0627.10h1System.45-i1 Control of Operational Software

CTRL-1109 Supplier Assessments and Reviews

0627.10h1System.45-r2 Control of Operational Software

CTRL-1109 Supplier Assessments and Reviews

0628.10h2System.8-r2 Control of Operational Software

CTRL-190 Change Management and Software Development Life Cycle

0629.10h2System.45-r2 Control of Operational Software

CTRL-190 Change Management and Software Development Life Cycle

0630.10h2System.6-r2 Control of Operational Software

CTRL-16 Access Provisioning

0633.10j1System.1-i1 Access Control to Program Source Code

CTRL-9 Privileged User Accounts

0633.10j1System.1-r2 Access Control to Program Source Code

CTRL-9 Privileged User Accounts

0636.10k1Organizational.3-i1 Change Control Procedures

CTRL-190 Change Management and Software Development Life Cycle

0636.10k1Organizational.3-r2 Change Control Procedures

CTRL-190 Change Management and Software Development Life Cycle

0663.10h2System.9-r2 Control of Operational Software

CTRL-950 Boundary Protection

0663.10h2System.10-r2 Control of Operational Software

CTRL-184 Authorized / Unauthorized Software

0664.10h2System.10-r2 Control of Operational Software

CTRL-184 Authorized / Unauthorized Software

0666.10h1System.5-i1 Authorized Software

CTRL-184 Authorized / Unauthorized Software

0666.10h1System.5-r2 Control of Operational Software

CTRL-184 Authorized / Unauthorized Software

0667.10h1System.6-i1 Application Allow Listing Technology

CTRL-184 Authorized / Unauthorized Software

0667.10h1System.6-r2 Control of Operational Software

CTRL-184 Authorized / Unauthorized Software

0701.07a1Organizational.7-e1 IT Asset Inventory

CTRL-435 System Inventory

0701.07a1Organizational.7-i1 Inventory of Assets

CTRL-435 System Inventory

0701.07a1Organizational.7-r2 Inventory of Assets

CTRL-435 System Inventory

0701.07a1Organizational.8-i1 Inventory of Assets Information

CTRL-435 System Inventory

0701.07a1Organizational.8-r2 Inventory of Assets

CTRL-435 System Inventory

0703.07a2Organizational.1-r2 Inventory of Assets

CTRL-435 System Inventory

0704.07a1Organizational.8-i1 Inventory of Assets Process

CTRL-435 System Inventory

0704.07a1Organizational.8-r2 Inventory of Assets

CTRL-435 System Inventory

0704.07a1Organizational.9-i1 Inventory of Assets ID

CTRL-435 System Inventory

0704.07a1Organizational.9-r2 Inventory of Assets

CTRL-435 System Inventory

0706.10b1System.2-i1 Input Data Validation

CTRL-190 Change Management and Software Development Life Cycle

0706.10b1System.2-r2 Input Data Validation

CTRL-190 Change Management and Software Development Life Cycle

0707.10b2System.1-r2 Input Data Validation

CTRL-652 Vulnerability Management

0709.10m1Organizational.1-i1 Vulnerability Risk and Remediation

CTRL-652 Vulnerability Management

0709.10m1Organizational.1-r2 Control of Technical Vulnerabilities

CTRL-652 Vulnerability Management

0715.10m1Organizational.4-i1 Control of Technical Vulnerabilities

CTRL-118 Network Protocols

0715.10m1Organizational.4-r2 Control of Technical Vulnerabilities

CTRL-118 Network Protocols

0732.09r1Organizational.3-i1 Security of System Documentation

CTRL-9 Privileged User Accounts

0732.09r1Organizational.3-r2 Security of System Documentation

CTRL-9 Privileged User Accounts

0733.10b2System.4-r2 Input Data Validation

CTRL-190 Change Management and Software Development Life Cycle

0778.10m1Organizational.5-i1 Vulnerability Comparison

CTRL-652 Vulnerability Management

0778.10m1Organizational.5-r2 Control of Technical Vulnerabilities

CTRL-652 Vulnerability Management

0791.10b2System.5-r2 Input Data Validation

CTRL-190 Change Management and Software Development Life Cycle

0802.01i1Organizational.2-i1 Policy on the Use of Network Services

CTRL-1 Access Control Policy and Procedures

0802.01i1Organizational.2-r2 Policy on the Use of Network Services

CTRL-1 Access Control Policy and Procedures

0805.01m1Organizational.12-e1 Segregation in Networks

CTRL-950 Boundary Protection

0805.01m1Organizational.12-i1 Segregation in Networks

CTRL-950 Boundary Protection

0805.01m1Organizational.12-r2 Segregation in Networks

CTRL-950 Boundary Protection

0808.10b2System.3-r2 Input Data Validation

CTRL-950 Boundary Protection

0809.01n2Organizational.1234-r2 Network Connection Control

CTRL-950 Boundary Protection

0810.01n2Organizational.5-r2 Network Connection Control

CTRL-112 Encryption of Data at Rest and in Transit

0811.01n2Organizational.6-r2 Network Connection Control

CTRL-950 Boundary Protection

0812.01n2Organizational.8-r2 Network Connection Control

CTRL-950 Boundary Protection

0814.01n1Organizational.12-i1 Network Connection Control

CTRL-950 Boundary Protection

0814.01n1Organizational.12-r2 Network Connection Control

CTRL-950 Boundary Protection

0815.01o1Organizational.1-i1 Network Routing Control

CTRL-950 Boundary Protection

0815.01o1Organizational.1-r2 Network Routing Control

CTRL-950 Boundary Protection

0816.01w1System.1-i1 Sensitive System Isolation

CTRL-896 Information Management and Retention

0816.01w1System.1-r2 Sensitive System Isolation

CTRL-896 Information Management and Retention

0820.01k1System.3-i1 Equipment Identification in Networks

CTRL-110 Remote Access

0820.01k1System.3-r2 Equipment Identification in Networks

CTRL-110 Remote Access

0821.09m2Organizational.2-r2 Network Controls

CTRL-950 Boundary Protection

0822.09m2Organizational.4-r2 Network Controls

CTRL-950 Boundary Protection

0825.09m1Organizational.14-i1 IDS / IPS

CTRL-833 Logging and Monitoring

0825.09m1Organizational.14-r2 Network Controls

CTRL-833 Logging and Monitoring

0835.09n1Organizational.1-i1 Security of Network Services

CTRL-1109 Supplier Assessments and Reviews

0835.09n1Organizational.1-r2 Security of Network Services

CTRL-1109 Supplier Assessments and Reviews

0861.09m2Organizational.67-r2 Network Controls

CTRL-112 Encryption of Data at Rest and in Transit

0862.09m2Organizational.8-r2 Network Controls

CTRL-112 Encryption of Data at Rest and in Transit

0863.09m2Organizational.910-r2 Network Controls

CTRL-950 Boundary Protection

0864.09m2Organizational.12-r2 Network Controls

CTRL-950 Boundary Protection

0865.09m2Organizational.14-r2 Network Controls

CTRL-950 Boundary Protection

0903.10f1Organizational.1-i1 Policy on the Use of Cryptographic Controls

CTRL-112 Encryption of Data at Rest and in Transit

0903.10f1Organizational.1-r2 Policy on the Use of Cryptographic Controls

CTRL-112 Encryption of Data at Rest and in Transit

0905.10g1Organizational.12-i1 Key Management

CTRL-194 Cryptography Management

0905.10g1Organizational.12-r2 Key Management

CTRL-194 Cryptography Management

0913.09s1Organizational.5-i1 Information Exchange Policies and Procedures

CTRL-112 Encryption of Data at Rest and in Transit

0913.09s1Organizational.5-r2 Information Exchange Policies and Procedures

CTRL-112 Encryption of Data at Rest and in Transit

0928.09v2Organizational.1-r2 Electronic Messaging

CTRL-112 Encryption of Data at Rest and in Transit

0931.09v1Organizational.8-e1 Email Security

CTRL-883 Spam and Phishing Protection

0931.09v1Organizational.8-i1 Electronic Messaging

CTRL-883 Spam and Phishing Protection

0931.09v1Organizational.8-r2 Electronic Messaging

CTRL-883 Spam and Phishing Protection

0936.09w1Organizational.1-i1 Interconnected Business Information Systems

CTRL-178 Interconnected Systems

0936.09w1Organizational.1-r2 Interconnected Business Information Systems

CTRL-178 Interconnected Systems

0939.09x1Organizational.2-i1 Electronic Commerce Services

CTRL-1128 Customer Agreements

0945.09y1Organizational.3-i1 On-line Transactions

CTRL-112 Encryption of Data at Rest and in Transit

0945.09y1Organizational.3-r2 On-line Transactions

CTRL-112 Encryption of Data at Rest and in Transit

0947.09y2Organizational.2-r2 On-line Transactions

CTRL-112 Encryption of Data at Rest and in Transit

0948.09y2Organizational.3-r2 On-line Transactions

CTRL-112 Encryption of Data at Rest and in Transit

0949.09y3Organizational.1-r2 On-line Transactions

CTRL-112 Encryption of Data at Rest and in Transit

0954.10d1System.1-i1 Message Integrity

CTRL-112 Encryption of Data at Rest and in Transit

0954.10d1System.1-r2 Message Integrity

CTRL-112 Encryption of Data at Rest and in Transit

0965.09sGDPROrganizational.1-r2 Information Exchange Policies and Procedures

CTRL-153 Information Exchange

0966.09sGDPROrganizational.2-r2 Information Exchange Policies and Procedures

CTRL-153 Information Exchange

1002.01d2System.7-r2 User Password Management

CTRL-349 Password-Based Authentication

1003.01d1System.3-i1 User Password Identification

CTRL-349 Password-Based Authentication

1003.01d1System.3-r2 User Password Management

CTRL-349 Password-Based Authentication

1004.01d2System.8-r2 User Password Management

CTRL-349 Password-Based Authentication

1006.01d2System.1-r2 User Password Management

CTRL-349 Password-Based Authentication

1007.01d2System.2-r2 User Password Management

CTRL-349 Password-Based Authentication

1008.01d2System.3-r2 User Password Management

CTRL-539 Access Agreements

1009.01d2System.4-r2 User Password Management

CTRL-349 Password-Based Authentication

1011.01f1Organizational.1-i1 Password Use

CTRL-349 Password-Based Authentication

1011.01f1Organizational.1-r2 Password Use

CTRL-349 Password-Based Authentication

1012.01r2System.1-r2 Password Management System

CTRL-349 Password-Based Authentication

1013.01r1System.2-i1 Password Management System

CTRL-349 Password-Based Authentication

1013.01r1System.2-r2 Password Management System

CTRL-349 Password-Based Authentication

1014.01d2System.9-r2 User Password Management

CTRL-349 Password-Based Authentication

1015.01d2System.10-r2 User Password Management

CTRL-349 Password-Based Authentication

1023.01d1System.11-e1 Default Password Controls

CTRL-353 Change Authenticators Prior To Delivery

1023.01d1System.11-i1 Default Password Reset

CTRL-353 Change Authenticators Prior To Delivery

1023.01d1System.11-r2 User Password Management

CTRL-353 Change Authenticators Prior To Delivery

1031.01d2System.11-r2 User Password Management

CTRL-349 Password-Based Authentication

1101.01a1Organizational.1245-i1 Access Control Policy

CTRL-1 Access Control Policy and Procedures

1101.01a1Organizational.1245-r2 Access Control Policy

CTRL-1 Access Control Policy and Procedures

1103.01a2Organizational.3-r2 Access Control Policy

CTRL-1 Access Control Policy and Procedures

1105.09c1Organizational.2-i1 Segregation of Duties

CTRL-65 Separation of Duties

1105.09c1Organizational.2-r2 Segregation of Duties

CTRL-65 Separation of Duties

1106.01b2System.4-r2 User Registration

CTRL-16 Access Provisioning

1107.01b1System.2-i1 User Registration

CTRL-535 Access Termination

1107.01b1System.2-r2 User Registration

CTRL-208 Configuration Management

1108.01b2System.5-r2 User Registration

CTRL-535 Access Termination

1109.01b2System.6-r2 User Registration

CTRL-1 Access Control Policy and Procedures

01109.02b1Organizational.7-i1 Personnel Screening

CTRL-530 Personnel Screening

01109.02b1Organizational.7-r2 Screening

CTRL-530 Personnel Screening

1110.01b2System.7-r2 User Registration

CTRL-539 Access Agreements

1111.01b2System.1-r2 User Registration

CTRL-2 Shared and Temporary Accounts

1114.01h1Organizational.123-i1 Clear Desk and Clear Screen Policy

CTRL-255 Physical Security Controls

1114.01h1Organizational.123-r2 Clear Desk and Clear Screen Policy

CTRL-255 Physical Security Controls

1117.01j1Organizational.23-i1 User Authentication for External Connections

CTRL-110 Remote Access

1117.01j1Organizational.23-r2 User Authentication for External Connections

CTRL-110 Remote Access

1123.01q1System.2-e1 Unique User IDs

CTRL-319 Identification and Authentication

1123.01q1System.2-i1 User Identification and Authentication

CTRL-319 Identification and Authentication

1123.01q1System.2-r2 User Identification and Authentication

CTRL-319 Identification and Authentication

1124.01q2System.12-r2 User Identification and Authentication

CTRL-2 Shared and Temporary Accounts

1125.01q2System.1-r2 User Identification and Authentication

CTRL-320 Multi-Factor Authentication

1128.01q2System.5-r2 User Identification and Authentication

CTRL-319 Identification and Authentication

1129.01v1System.12-i1 Information Access Restriction

CTRL-23 Role-Based Access Control

1129.01v1System.12-r2 Information Access Restriction

CTRL-23 Role-Based Access Control

1130.01v2System.1-r2 Information Access Restriction

CTRL-23 Role-Based Access Control

1131.01v2System.2-r2 Information Access Restriction

CTRL-910 Information Output Filtering

1132.01v2System.3-r2 Information Access Restriction

CTRL-319 Identification and Authentication

1133.01v2System.4-r2 Information Access Restriction

CTRL-319 Identification and Authentication

1134.01v3System.1-r2 Information Access Restriction

CTRL-110 Remote Access

1139.01b2System.10-r2 User Registration

CTRL-319 Identification and Authentication

1143.01c1System.123 Privilege Management

CTRL-23 Role-Based Access Control

1143.01c1System.123-e1 Privilege Management

CTRL-23 Role-Based Access Control

1143.01c1System.123-e1 User Access Management

CTRL-23 Role-Based Access Control

1143.01c1System.123-i1 Access Control

CTRL-23 Role-Based Access Control

1143.01c1System.123-r2 Privilege Management

CTRL-23 Role-Based Access Control

1145.01c2System.1-r2 Privilege Management

CTRL-23 Role-Based Access Control

1146.01c2System.23-r2 Privilege Management

CTRL-9 Privileged User Accounts

1147.01c2System.456-r2 Privilege Management

CTRL-9 Privileged User Accounts

1148.01c2System.78-r2 Privilege Management

CTRL-9 Privileged User Accounts

1149.01c2System.9-r2 Privilege Management

CTRL-23 Role-Based Access Control

1150.01c2System.10-r2 Privilege Management

CTRL-1 Access Control Policy and Procedures

1151.01c1System.2-e1 Admin Access Privileges

CTRL-9 Privileged User Accounts

1151.01c1System.2-i1 Limit Admin Access

CTRL-9 Privileged User Accounts

1151.01c1System.2-r2 Privilege Management

CTRL-9 Privileged User Accounts

1166.01e2System.3-r2 Review of User Access Rights

CTRL-73 Review of User Privileges

1167.01e2System.1-r2 Review of User Access Rights

CTRL-73 Review of User Privileges

1168.01e2System.2-r2 Review of User Access Rights

CTRL-73 Review of User Privileges

1194.01l1Organizational.2-e1 Remote Diagnostic and Configuration Port Protection

CTRL-118 Network Protocols

1194.01l1Organizational.2-i1 Remote Diagnostic and Configuration Port Protection

CTRL-118 Network Protocols

1194.01l1Organizational.2-r2 Remote Diagnostic and Configuration Port Protection

CTRL-118 Network Protocols

1202.09aa2System.5-r2 Audit Logging

CTRL-833 Logging and Monitoring

1203.09aa1System.2-e1 Audit Record Detail

CTRL-833 Logging and Monitoring

1203.09aa1System.2-i1 Audit Records

CTRL-833 Logging and Monitoring

1203.09aa1System.2-r2 Audit Logging

CTRL-833 Logging and Monitoring

1213.09ab2System.6-r2 Monitoring System Use

CTRL-833 Logging and Monitoring

1214.09ab2System.3456-r2 Monitoring System Use

CTRL-833 Logging and Monitoring

1223.09ac1System.1-e1 Protection of Log Information

CTRL-833 Logging and Monitoring

1223.09ac1System.1-i1 Protection of Log Information

CTRL-833 Logging and Monitoring

1223.09ac1System.1-r2 Protection of Log Information

CTRL-833 Logging and Monitoring

1235.06j1Organizational.1-i1 Protection of Information Systems Audit Tools

CTRL-16 Access Provisioning

1235.06j1Organizational.1-r2 Protection of Information Systems Audit Tools

CTRL-16 Access Provisioning

1239.09aa1System.4-e1 Audit Log Retention

CTRL-833 Logging and Monitoring

1239.09aa1System.4-i1 Audit Log Retention

CTRL-833 Logging and Monitoring

1239.09aa1System.4-r2 Audit Logging

CTRL-833 Logging and Monitoring

1270.09ad1System.12-i1 Administrator and Operator Logs

CTRL-833 Logging and Monitoring

1270.09ad1System.12-r2 Administrator and Operator Logs

CTRL-833 Logging and Monitoring

1272.09ae1System.13-i1 Fault Logging

CTRL-833 Logging and Monitoring

1272.09ae1System.13-r2 Fault Logging

CTRL-833 Logging and Monitoring

1295.09af1System.2-i1 Clock Synchronization

CTRL-1063 Synchronization

1295.09af1System.2-r2 Clock Synchronization

CTRL-1063 Synchronization

1304.02e1Organizational.7-i1 Role Based Training

CTRL-245 Security and Privacy Awareness Training

1304.02e1Organizational.7-r2 Information Security Awareness, Education, and Training

CTRL-245 Security and Privacy Awareness Training

1306.06e1Organizational.5-i1 Prevention of Misuse of Information Assets

CTRL-544 Personnel Sanctions

1306.06e1Organizational.5-r2 Prevention of Misuse of Information Assets

CTRL-544 Personnel Sanctions

1307.07c1Organizational.124-i1 Acceptable Use of Assets

CTRL-539 Access Agreements

1307.07c1Organizational.124-r2 Acceptable Use of Assets

CTRL-539 Access Agreements

1308.09j1Organizational.5-e1 Controls Against Malicious Code

CTRL-184 Authorized / Unauthorized Software

1308.09j1Organizational.5-i1 Controls Against Malicious Code

CTRL-184 Authorized / Unauthorized Software

1308.09j1Organizational.5-r2 Controls Against Malicious Code

CTRL-184 Authorized / Unauthorized Software

1334.02e2Organizational.12-r2 Information Security Awareness, Education, and Training

CTRL-245 Security and Privacy Awareness Training

1336.02e2Organizational.10-r2 Information Security Awareness, Education, and Training

CTRL-245 Security and Privacy Awareness Training

1403.05i1Organizational.67-e1 Identification of Risks Related to External Parties

CTRL-16 Access Provisioning

1403.05i1Organizational.67-i1 Identification of Risks Related to External Parties

CTRL-16 Access Provisioning

1403.05i1Organizational.67-r2 Identification of Risks Related to External Parties

CTRL-16 Access Provisioning

1406.05k2Organizational.2-r2 Addressing Security in Third Party Agreements

CTRL-1129 Third-Party Agreements

1406.05k2Organizational.3-r2 Addressing Security in Third Party Agreements

CTRL-1129 Third-Party Agreements

1408.09e1System.1-i1 Service Delivery

CTRL-1128 Customer Agreements

1408.09e1System.1-r2 Service Delivery

CTRL-1128 Customer Agreements

1411.09f1System.1-i1 Monitoring and Review of Third Party Services

CTRL-1128 Customer Agreements

1411.09f1System.1-r2 Monitoring and Review of Third Party Services

CTRL-1128 Customer Agreements

1414.09g1System.1-i1 Managing Changes to Third Party Services

CTRL-1094 Third-Party Risk Management Policy and Procedures

1414.09g1System.1-r2 Managing Changes to Third Party Services

CTRL-1094 Third-Party Risk Management Policy and Procedures

1416.10l1Organizational.1-i1 Outsourced Software Development

CTRL-1129 Third-Party Agreements

1416.10l1Organizational.1-r2 Outsourced Software Development

CTRL-1129 Third-Party Agreements

1419.05j1Organizational.12-i1 Addressing Security When Dealing with Customers

CTRL-1129 Third-Party Agreements

1419.05j1Organizational.12-r2 Addressing Security When Dealing with Customers

CTRL-1129 Third-Party Agreements

1428.05k1Organizational.2-i1 Addressing Security in Third Party Agreements

CTRL-1128 Customer Agreements

1428.05k1Organizational.2-r2 Addressing Security in Third Party Agreements

CTRL-1128 Customer Agreements

1444.09t1Organizational.12-i1 Exchange Agreements

CTRL-1129 Third-Party Agreements

1444.09t1Organizational.12-r2 Exchange Agreements

CTRL-1129 Third-Party Agreements

1464.05kGDPROrganizational.1-r2 Addressing Security in Third Party Agreements

CTRL-1129 Third-Party Agreements

1465.05kGDPROrganizational.2-r2 Addressing Security in Third Party Agreements

CTRL-1129 Third-Party Agreements

1466.05kGDPROrganizational.3-r2 Addressing Security in Third Party Agreements

CTRL-1129 Third-Party Agreements

1467.05kGDPROrganizational.4-r2 Addressing Security in Third Party Agreements

CTRL-1129 Third-Party Agreements

1468.05kGDPROrganizational.5-r2 Addressing Security in Third Party Agreements

CTRL-1129 Third-Party Agreements

1504.06e2Organizational.2-r2 Prevention of Misuse of Information Assets

CTRL-435 System Inventory

1506.11a1Organizational.2-i1 Reporting Information Security Events

CTRL-423 Incident Response Plan

1506.11a1Organizational.2-r2 Reporting Information Security Events

CTRL-423 Incident Response Plan

1510.11a2Organizational.47-r2 Reporting Information Security Events

CTRL-416 Incident Reporting

1535.11b1Organizational.12-i1 Reporting Security Weaknesses

CTRL-416 Incident Reporting

1535.11b1Organizational.12-r2 Reporting Security Weaknesses

CTRL-416 Incident Reporting

1560.11d1Organizational.1-i1 Post Incident Learnings

CTRL-423 Incident Response Plan

1560.11d1Organizational.1-r2 Learning from Information Security Incidents

CTRL-423 Incident Response Plan

1561.11c1Organizational.4-e1 Responsibilities and Procedures

CTRL-423 Incident Response Plan

1561.11c1Organizational.4-i1 Incident Handling Responsibilities

CTRL-423 Incident Response Plan

1561.11c1Organizational.4-r2 Responsibilities and Procedures

CTRL-423 Incident Response Plan

1563.11d1Organizational.2-i1 Post Incident Analysis

CTRL-423 Incident Response Plan

1563.11d1Organizational.2-r2 Learning from Information Security Incidents

CTRL-423 Incident Response Plan

1569.11e1Organizational.12-i1 Collection of Evidence

CTRL-398 Incident Evidence

1569.11e1Organizational.12-r2 Collection of Evidence

CTRL-398 Incident Evidence

1589.11aGDPROrganizational.1-r2 Reporting Information Security Events

CTRL-416 Incident Reporting

1589.11c1Organizational.5-i1 Incident Response Test

CTRL-394 Incident Response Testing

1589.11c1Organizational.5-r2 Responsibilities and Procedures

CTRL-394 Incident Response Testing

1590.11aGDPROrganizational.2-r2 Reporting Information Security Events

CTRL-416 Incident Reporting

1591.11aGDPROrganizational.3-r2 Reporting Information Security Events

CTRL-416 Incident Reporting

1592.11aGDPROrganizational.4-r2 Reporting Information Security Events

CTRL-416 Incident Reporting

1593.11aGDPROrganizational.5-r2 Reporting Information Security Events

CTRL-416 Incident Reporting

1601.12c2Organizational.7-r2 Developing and Implementing Continuity Plans Including Information Security

CTRL-264 Contingency Plan

1602.12c1Organizational.4567-i1 Developing and Implementing Continuity Plans Including Information Security

CTRL-264 Contingency Plan

1602.12c1Organizational.4567-r2 Developing and Implementing Continuity Plans Including Information Security

CTRL-264 Contingency Plan

1611.09h1System.2-i1 Capacity Management

CTRL-266 Capacity Planning

1611.09h1System.2-r2 Capacity Management

CTRL-266 Capacity Planning

1612.09h2System.1-r2 Capacity Management

CTRL-266 Capacity Planning

1613.09h2System.2-r2 Capacity Management

CTRL-266 Capacity Planning

1614.09h2System.3-r2 Capacity Management

CTRL-266 Capacity Planning

1616.09l1Organizational.16-e1 Backup Settings and Restoration Tests

CTRL-300 System Backup

1616.09l1Organizational.16-i1 Backups

CTRL-300 System Backup

1616.09l1Organizational.16-r2 Back-up

CTRL-300 System Backup

1617.09l1Organizational.23-i1 Backup Requirements

CTRL-300 System Backup

1617.09l1Organizational.23-r2 Back-up

CTRL-300 System Backup

1618.09l1Organizational.45-e1 Physical Backup Storage Controls

CTRL-283 Alternate Storage Site

1618.09l1Organizational.45-i1 Physical Backup Storage Controls

CTRL-283 Alternate Storage Site

1618.09l1Organizational.45-r2 Physical Backup Storage Controls

CTRL-283 Alternate Storage Site

1621.09l2Organizational.1-r2 Back-up

CTRL-300 System Backup

1622.09l2Organizational.23-r2 Back-up

CTRL-300 System Backup

1623.09l2Organizational.4-r2 Back-up

CTRL-300 System Backup

1626.09l3Organizational.5-r2 Back-up

CTRL-300 System Backup

1632.12a1Organizational.1-i1 Including Information Security in the Business Continuity Management Process

CTRL-266 Capacity Planning

1632.12a1Organizational.1-r2 Including Information Security in the Business Continuity Management Process

CTRL-266 Capacity Planning

1634.12b1Organizational.1-i1 Business Continuity and Risk Assessment

CTRL-264 Contingency Plan

1634.12b1Organizational.1-r2 Business Continuity and Risk Assessment

CTRL-264 Contingency Plan

1636.12b2Organizational.1-r2 Business Continuity and Risk Assessment

CTRL-264 Contingency Plan

1637.12b2Organizational.2-r2 Business Continuity and Risk Assessment

CTRL-264 Contingency Plan

1666.12d1Organizational.1235-i1 Business Continuity Planning Framework

CTRL-264 Contingency Plan

1666.12d1Organizational.1235-r2 Business Continuity Planning Framework

CTRL-264 Contingency Plan

1677.12e1Organizational.6-i1 Testing, Maintaining and Re-Assessing Business Continuity Plans

CTRL-276 Contingency Plan Testing

1677.12e1Organizational.6-r2 Testing, Maintaining and Re-Assessing Business Continuity Plans

CTRL-276 Contingency Plan Testing

1680.12e2Organizational.2-r2 Testing, Maintaining and Re-Assessing Business Continuity Plans

CTRL-276 Contingency Plan Testing

1681.12e2Organizational.345-r2 Testing, Maintaining and Re-Assessing Business Continuity Plans

CTRL-276 Contingency Plan Testing

1701.03a1Organizational.12345678-i1 Risk Management Program Development

CTRL-646 Risk Assessment

1701.03a1Organizational.12345678-r2 Risk Management Program Development

CTRL-646 Risk Assessment

1704.03b1Organizational.12-e1 Performing Risk Assessments

CTRL-646 Risk Assessment

1704.03b1Organizational.12-i1 Performing Risk Assessments

CTRL-646 Risk Assessment

1704.03b1Organizational.12-r2 Performing Risk Assessments

CTRL-646 Risk Assessment

1706.03bHIPAAOrganizational.3-r2 Performing Risk Assessments

CTRL-646 Risk Assessment

1708.03c2Organizational.12-r2 Risk Mitigation

CTRL-646 Risk Assessment

1734.03d1Organizational.2-i1 Risk Evaluation

CTRL-646 Risk Assessment

1734.03d1Organizational.2-r2 Risk Evaluation

CTRL-646 Risk Assessment

1739.05d1Organizational.3-i1 Authorization Process for Information Assets and Facilities

CTRL-435 System Inventory

1739.05d1Organizational.3-r2 Authorization Process for Information Assets and Facilities

CTRL-435 System Inventory

1744.05f1Organizational.23-i1 Contact with Authorities

CTRL-264 Contingency Plan

1744.05f1Organizational.23-r2 Contact with Authorities

CTRL-264 Contingency Plan

1749.05g1Organizational.1-i1 Contact with Special Interest Groups

CTRL-447 Security and Privacy Groups and Associations

1749.05g1Organizational.1-r2 Contact with Special Interest Groups

CTRL-447 Security and Privacy Groups and Associations

1752.05g2Organizational.4-r2 Contact with Special Interest Groups

CTRL-447 Security and Privacy Groups and Associations

1767.07d1Organizational.2-i1 Classification Guidelines

CTRL-896 Information Management and Retention

1767.07d1Organizational.2-r2 Classification Guidelines

CTRL-896 Information Management and Retention

1769.09i1System.12-i1 System Acceptance

CTRL-190 Change Management and Software Development Life Cycle

1769.09i1System.12-r2 System Acceptance

CTRL-190 Change Management and Software Development Life Cycle

1781.10a1Organizational.23-i1 Security Requirements Analysis and Specification

CTRL-190 Change Management and Software Development Life Cycle

1781.10a1Organizational.23-r2 Security Requirements Analysis and Specification

CTRL-190 Change Management and Software Development Life Cycle

1787.10a2Organizational.1-r2 Security Requirements Analysis and Specification

CTRL-431 Information Security Policy and Procedures

1788.10a2Organizational.2-r2 Security Requirements Analysis and Specification

CTRL-190 Change Management and Software Development Life Cycle

1789.10a2Organizational.3-r2 Security Requirements Analysis and Specification

CTRL-190 Change Management and Software Development Life Cycle

1790.10a2Organizational.45-r2 Security Requirements Analysis and Specification

CTRL-190 Change Management and Software Development Life Cycle

1791.10a2Organizational.6-r2 Security Requirements Analysis and Specification

CTRL-190 Change Management and Software Development Life Cycle

1792.10a2Organizational.7814-r2 Security Requirements Analysis and Specification

CTRL-190 Change Management and Software Development Life Cycle

1793.10a2Organizational.91011-r2 Security Requirements Analysis and Specification

CTRL-190 Change Management and Software Development Life Cycle

1794.10a2Organizational.12-r2 Security Requirements Analysis and Specification

CTRL-190 Change Management and Software Development Life Cycle

1795.10a2Organizational.13-r2 Security Requirements Analysis and Specification

CTRL-190 Change Management and Software Development Life Cycle

1796.10a2Organizational.15-r2 Security Requirements Analysis and Specification

CTRL-1109 Supplier Assessments and Reviews

1802.08b1Organizational.3-e1 Physical Entry Controls

CTRL-551 Physical Access Control

1802.08b1Organizational.3-i1 Physical Access

CTRL-551 Physical Access Control

1802.08b1Organizational.3-r2 Physical Entry Controls

CTRL-551 Physical Access Control

1803.08b2Organizational.10-r2 Physical Entry Controls

CTRL-472 Maintenance Tools

1825.08l2Organizational.1-r2 Secure Disposal or Re-Use of Equipment

CTRL-899 Information Disposal

1826.09p1Organizational.1-e1 Disposal of Media

CTRL-899 Information Disposal

1826.09p1Organizational.1-i1 Disposal of Media

CTRL-899 Information Disposal

1826.09p1Organizational.1-r2 Disposal of Media

CTRL-899 Information Disposal

1828.08a1Organizational.12-i1 Physical Security Perimeter

CTRL-255 Physical Security Controls

1828.08a1Organizational.12-r2 Physical Security Perimeter

CTRL-255 Physical Security Controls

1830.08a2Organizational.1-r2 Physical Security Perimeter

CTRL-255 Physical Security Controls

1845.08b1Organizational.7-i1 Physical Security

CTRL-255 Physical Security Controls

1845.08b1Organizational.7-r2 Physical Entry Controls

CTRL-255 Physical Security Controls

1847.08b2Organizational.910-r2 Physical Entry Controls

CTRL-551 Physical Access Control

1857.08c1Organizational.1-i1 Securing Offices, Rooms, and Facilities

CTRL-590 Environmental Controls

1857.08c1Organizational.1-r2 Securing Offices, Rooms, and Facilities

CTRL-590 Environmental Controls

1863.08d1Organizational.4-i1 Protecting Against External and Environmental Threats

CTRL-546 Physical and Environmental Protection Policy and Procedures

1863.08d1Organizational.4-r2 Protecting Against External and Environmental Threats

CTRL-546 Physical and Environmental Protection Policy and Procedures

1867.08e1Organizational.12-i1 Working in Secure Areas

CTRL-255 Physical Security Controls

1867.08e1Organizational.12-r2 Working in Secure Areas

CTRL-255 Physical Security Controls

1871.08f1Organizational.13-i1 Public Access, Delivery, and Loading Areas

CTRL-551 Physical Access Control

1871.08f1Organizational.13-r2 Public Access, Delivery, and Loading Areas

CTRL-551 Physical Access Control

1880.08g1Organizational.6-i1 Equipment Siting and Protection

CTRL-590 Environmental Controls

1880.08g1Organizational.6-r2 Equipment Siting and Protection

CTRL-590 Environmental Controls

1888.08h1Organizational.456-i1 Supporting Utilities

CTRL-590 Environmental Controls

1888.08h1Organizational.456-r2 Supporting Utilities

CTRL-590 Environmental Controls

1899.08i1Organizational.1-i1 Cabling Security

CTRL-255 Physical Security Controls

1899.08i1Organizational.1-r2 Cabling Security

CTRL-255 Physical Security Controls

1903.06d1Organizational.3456711-i1 Data Protection and Privacy of Covered Information

CTRL-112 Encryption of Data at Rest and in Transit

1903.06d1Organizational.3456711-r2 Data Protection and Privacy of Covered Information

CTRL-112 Encryption of Data at Rest and in Transit

1906.06cHIPAAOrganizational.4-r2 Protection of Organizational Records

CTRL-896 Information Management and Retention

1908.10c1System.5-i1 Control of Internal Processing

CTRL-814 System Integrity Policy and Procedures

1908.10c1System.5-r2 Control of Internal Processing

CTRL-814 System Integrity Policy and Procedures

02962.09j1Organizational.5-i1 Endpoint Protection Strategies

CTRL-822 Malicious Code Protection

02962.09j1Organizational.5-r2 Controls Against Malicious Code

CTRL-822 Malicious Code Protection

06900.09d1System.2-i1 Separation of Development, Test, and Operational Environments

CTRL-198 Network Segmentation

06900.09d1System.2-r2 Separation of Development, Test, and Operational Environments

CTRL-198 Network Segmentation

08101.09m2Organizational.14-r2 Network Controls

CTRL-112 Encryption of Data at Rest and in Transit

10902.01d1System.12-i1 User Password Management

CTRL-319 Identification and Authentication

10902.01d1System.12-r2 User Password Management

CTRL-319 Identification and Authentication

11109.01q2System.9-r2 User Identification and Authentication

CTRL-319 Identification and Authentication

11110.01q2System.10-r2 User Identification and Authentication

CTRL-319 Identification and Authentication

11111.01q2System.4-r2 User Identification and Authentication

CTRL-319 Identification and Authentication

11112.01q2System.12-r2 User Identification and Authentication

CTRL-319 Identification and Authentication

11113.01q3System.3-r2 User Identification and Authentication

CTRL-320 Multi-Factor Authentication

11124.01s1System.2-i1 Use of System Utilities

CTRL-1 Access Control Policy and Procedures

11124.01s1System.2-r2 Use of System Utilities

CTRL-1 Access Control Policy and Procedures

11126.01t2System.2-r2 Session Time-out

CTRL-91 Session Termination

11131.01u1System.2-i1 Limitation of Connection Time

CTRL-91 Session Termination

11131.01u1System.2-r2 Limitation of Connection Time

CTRL-91 Session Termination

11143.02i1Organizational.3-e1 Removal of Access Rights

CTRL-535 Access Termination

11143.02i1Organizational.3-i1 Removal of Access Rights

CTRL-535 Access Termination

11143.02i1Organizational.3-r2 Removal of Access Rights

CTRL-535 Access Termination

11149.02g1Organizational.2-i1 Termination or Change Responsibilities

CTRL-535 Access Termination

11149.02g1Organizational.2-r2 Termination or Change Responsibilities

CTRL-535 Access Termination

11152.02h1Organizational.1-i1 Return of Assets

CTRL-535 Access Termination

11152.02h1Organizational.1-r2 Return of Assets

CTRL-535 Access Termination

11183.01c1System.3-e1 Admin Account Separation

CTRL-9 Privileged User Accounts

11183.01c1System.3-i1 Seperate Admin Accounts

CTRL-9 Privileged User Accounts

11183.01c1System.3-r2 Privilege Management

CTRL-9 Privileged User Accounts

11190.01t1System.2-e1 Session Timeout

CTRL-91 Session Termination

11190.01t1System.2-i1 Session Time-out

CTRL-91 Session Termination

11190.01t1System.2-r2 Session Time-out

CTRL-91 Session Termination

11219.01b2System.8-r2 User Registration

CTRL-319 Identification and Authentication

11220.01b2System.9-r2 User Registration

CTRL-16 Access Provisioning

12101.09ab1System.2-i1 Monitoring System Use

CTRL-833 Logging and Monitoring

12101.09ab1System.2-r2 Monitoring System Use

CTRL-833 Logging and Monitoring

12148.06i1Organizational.1-i1 Information Systems Audit Controls

CTRL-833 Logging and Monitoring

12148.06i1Organizational.1-r2 Information Systems Audit Controls

CTRL-833 Logging and Monitoring

13998.02e1Organizational.2-e1 Security Awareness Training

CTRL-245 Security and Privacy Awareness Training

13998.02e1Organizational.2-i1 Security Awareness Training

CTRL-245 Security and Privacy Awareness Training

13998.02e1Organizational.2-r2 Information Security Awareness, Education, and Training

CTRL-245 Security and Privacy Awareness Training

16982.12aHIPAAOrganizational.1-r2 Including Information Security in the Business Continuity Management Process

CTRL-596 Alternate Work Site

17126.03c1Organizational.2-i1 Risk Mitigation

CTRL-646 Risk Assessment

17126.03c1Organizational.2-r2 Risk Mitigation

CTRL-646 Risk Assessment

17131.03aGDPROrganizational.1-r2 Risk Management Program Development

CTRL-646 Risk Assessment

17132.03bGDPROrganizational.1-r2 Performing Risk Assessments

CTRL-646 Risk Assessment

17133.03bGDPROrganizational.2-r2 Performing Risk Assessments

CTRL-646 Risk Assessment

17134.03bGDPROrganizational.3-r2 Performing Risk Assessments

CTRL-646 Risk Assessment

17135.03bGDPROrganizational.4-r2 Performing Risk Assessments

CTRL-646 Risk Assessment

17136.03bGDPROrganizational.5-r2 Performing Risk Assessments

CTRL-646 Risk Assessment

18108.08j1Organizational.1-i1 Equipment Maintenance

CTRL-472 Maintenance Tools

18108.08j1Organizational.1-r2 Equipment Maintenance

CTRL-472 Maintenance Tools

18122.08k1Organizational.1-i1 Security of Equipment Off-Premises

CTRL-520 Media Use

18122.08k1Organizational.1-r2 Security of Equipment Off-Premises

CTRL-520 Media Use

18127.08l1Organizational.3-i1 Secure Disposal or Re-Use of Equipment

CTRL-511 Media Sanitization and Disposal

18127.08l1Organizational.3-r2 Secure Disposal or Re-Use of Equipment

CTRL-511 Media Sanitization and Disposal

18128.08m1Organizational.12-i1 Removal of Property

CTRL-255 Physical Security Controls

18128.08m1Organizational.12-r2 Removal of Property

CTRL-255 Physical Security Controls

18131.09p2Organizational.3-r2 Disposal of Media

CTRL-511 Media Sanitization and Disposal

19131.05e1Organizational.45-i1 Confidentiality Agreements

CTRL-1129 Third-Party Agreements

19131.05e1Organizational.45-r2 Confidentiality Agreements

CTRL-1129 Third-Party Agreements

19140.06c2Organizational.5-r2 Protection of Organizational Records

CTRL-896 Information Management and Retention

19142.06c1Organizational.8-i1 Protection of Organizational Records

CTRL-502 Media Marking

19142.06c1Organizational.8-r2 Protection of Organizational Records

CTRL-498 Media Protection Policy and Procedures

19145.06c2Organizational.2-r2 Protection of Organizational Records

CTRL-896 Information Management and Retention

19165.07e1Organizational.13-i1 Information Labeling and Handling

CTRL-896 Information Management and Retention

19165.07e1Organizational.13-r2 Information Labeling and Handling

CTRL-896 Information Management and Retention

19180.09z1Organizational.2-e1 Publicly Available Information

CTRL-139 Publicly Available Information

19180.09z1Organizational.2-i1 Publicly Available Information

CTRL-139 Publicly Available Information

19180.09z1Organizational.2-r2 Publicly Available Information

CTRL-139 Publicly Available Information

19199.10e1System.12-i1 Output Data Validation

CTRL-910 Information Output Filtering

19199.10e1System.12-r2 Output Data Validation

CTRL-910 Information Output Filtering

19204.10i1System.1-i1 Protection of System Test Data

CTRL-1186 Sensitive Data in Non-Production Environments

19204.10i1System.1-r2 Protection of System Test Data

CTRL-1186 Sensitive Data in Non-Production Environments

19249.06b1Organizational.2-i1 Intellectual Property Rights

CTRL-235 Software Usage Restrictions

19249.06b1Organizational.2-r2 Intellectual Property Rights

CTRL-235 Software Usage Restrictions

19257.06dGDPROrganizational.1-r2 Data Protection and Privacy of Covered Information

CTRL-457 Data Governance Body

19258.06dGDPROrganizational.2-r2 Data Protection and Privacy of Covered Information

CTRL-457 Data Governance Body

19259.06dGDPROrganizational.3-r2 Data Protection and Privacy of Covered Information

CTRL-457 Data Governance Body

19300.13aGDPROrganizational.2-r2 Privacy Notice

CTRL-622 Privacy Policy and Procedures

19301.13aGDPROrganizational.3-r2 Privacy Notice

CTRL-622 Privacy Policy and Procedures

19302.13aGDPROrganizational.4-r2 Privacy Notice

CTRL-622 Privacy Policy and Procedures

19314.13b1Organizational.1-r2 Openness and Transparency

CTRL-622 Privacy Policy and Procedures

19315.13b1Organizational.2-r2 Openness and Transparency

CTRL-622 Privacy Policy and Procedures

19317.13bGDPROrganizational.1-r2 Openness and Transparency

CTRL-622 Privacy Policy and Procedures

19321.13c1Organizational.1-r2 Accounting of Disclosures

CTRL-455 Accounting of Disclosures

19322.13c1Organizational.2-r2 Accounting of Disclosures

CTRL-455 Accounting of Disclosures

19322.13c1Organizational.3-r2 Accounting of Disclosures

CTRL-455 Accounting of Disclosures

19323.13c1Organizational.4-r2 Accounting of Disclosures

CTRL-455 Accounting of Disclosures

19339.13dGDPROrganizational.1-r2 Consent

CTRL-1142 Obtaining, Recording, and Revoking Consent

19340.13dGDPROrganizational.2-r2 Consent

CTRL-1142 Obtaining, Recording, and Revoking Consent

19341.13dGDPROrganizational.3-r2 Consent

CTRL-1142 Obtaining, Recording, and Revoking Consent

19355.13eHIPAAOrganizational.5-r2 Choice

CTRL-1142 Obtaining, Recording, and Revoking Consent

19361.13eGDPROrganizational.1-r2 Choice

CTRL-1142 Obtaining, Recording, and Revoking Consent

19362.13eGDPROrganizational.2-r2 Choice

CTRL-1142 Obtaining, Recording, and Revoking Consent

19363.13eGDPROrganizational.3-r2 Choice

CTRL-1142 Obtaining, Recording, and Revoking Consent

19364.13eGDPROrganizational.4-r2 Choice

CTRL-1142 Obtaining, Recording, and Revoking Consent

19365.13eGDPROrganizational.5-r2 Choice

CTRL-1142 Obtaining, Recording, and Revoking Consent

19366.13eGDPROrganizational.6-r2 Choice

CTRL-1142 Obtaining, Recording, and Revoking Consent

19379.13fHIPAAOrganizational.4-r2 Principle Access

CTRL-622 Privacy Policy and Procedures

19393.13fGDPROrganizational.1-r2 Principle Access

CTRL-622 Privacy Policy and Procedures

19394.13fGDPROrganizational.2-r2 Principle Access

CTRL-622 Privacy Policy and Procedures

19395.13fGDPROrganizational.3-r2 Principle Access

CTRL-622 Privacy Policy and Procedures

19396.13fGDPROrganizational.4-r2 Principle Access

CTRL-622 Privacy Policy and Procedures

19397.13fGDPROrganizational.5-r2 Principle Access

CTRL-622 Privacy Policy and Procedures

19398.13fGDPROrganizational.6-r2 Principle Access

CTRL-622 Privacy Policy and Procedures

19399.13fGDPROrganizational.7-r2 Principle Access

CTRL-622 Privacy Policy and Procedures

19400.13fGDPROrganizational.8-r2 Principle Access

CTRL-622 Privacy Policy and Procedures

19405.13gGDPROrganizational.5-r2 Purpose Legitimacy

CTRL-622 Privacy Policy and Procedures

19406.13gGDPROrganizational.6-r2 Purpose Legitimacy

CTRL-622 Privacy Policy and Procedures

19415.13iGDPROrganizational.1-r2 Collection Limitation

CTRL-729 Minimization

19419.13jHIPAAOrganizational.1-r2 Data Minimization

CTRL-729 Minimization

19425.13jGDPROrganizational.1-r2 Data Minimization

CTRL-729 Minimization

19439.13kHIPAAOrganizational.11-r2 Use and Disclosure

CTRL-455 Accounting of Disclosures

19440.13kHIPAAOrganizational.12-r2 Use and Disclosure

CTRL-455 Accounting of Disclosures

19441.13kHIPAAOrganizational.13-r2 Use and Disclosure

CTRL-455 Accounting of Disclosures

19446.13kHIPAAOrganizational.18-r2 Use and Disclosure

CTRL-455 Accounting of Disclosures

19452.13kHIPAAOrganizational.24-r2 Use and Disclosure

CTRL-455 Accounting of Disclosures

19455.13kGDPROrganizational.1-r2 Use and Disclosure

CTRL-455 Accounting of Disclosures

19494.13l1Organizational.2-r2 Retention and Disposal

CTRL-896 Information Management and Retention

19499.13nGDPROrganizational.1-r2 Participation and Redress

CTRL-899 Information Disposal

19500.13nGDPROrganizational.2-r2 Participation and Redress

CTRL-899 Information Disposal

19501.13nGDPROrganizational.3-r2 Participation and Redress

CTRL-899 Information Disposal

19502.13nGDPROrganizational.4-r2 Participation and Redress

CTRL-896 Information Management and Retention

19512.13pGDPROrganizational.1-r2 Governance

CTRL-457 Data Governance Body

19513.13pGDPROrganizational.2-r2 Governance

CTRL-457 Data Governance Body

19514.13pGDPROrganizational.3-r2 Governance

CTRL-457 Data Governance Body

19515.13pGDPROrganizational.4-r2 Governance

CTRL-457 Data Governance Body

19517.13qGDPROrganizational.1-r2 Privacy and Impact Assessment

CTRL-613 Privacy Impact Assessment

19518.13qGDPROrganizational.2-r2 Privacy and Impact Assessment

CTRL-613 Privacy Impact Assessment

19519.13qGDPROrganizational.3-r2 Privacy and Impact Assessment

CTRL-613 Privacy Impact Assessment

19520.13qGDPROrganizational.4-r2 Privacy and Impact Assessment

CTRL-613 Privacy Impact Assessment

19546.13rHIPAAOrganizational.1-r2 Privacy Requirements for Contractors and Processors

CTRL-1129 Third-Party Agreements

19547.13rHIPAAOrganizational.2-r2 Privacy Requirements for Contractors and Processors

CTRL-1129 Third-Party Agreements

19548.13rHIPAAOrganizational.3-r2 Privacy Requirements for Contractors and Processors

CTRL-1129 Third-Party Agreements

19549.13rGDPROrganizational.1-r2 Privacy Requirements for Contractors and Processors

CTRL-833 Logging and Monitoring

19550.13rGDPROrganizational.2-r2 Privacy Requirements for Contractors and Processors

CTRL-1129 Third-Party Agreements

19551.13rGDPROrganizational.3-r2 Privacy Requirements for Contractors and Processors

CTRL-1129 Third-Party Agreements

19612.13kHIPAAOrganizational.25-r2 Use and Disclosure

CTRL-455 Accounting of Disclosures

19801.13eGDPROrganizational.7-r2 Choice

CTRL-1146 Privacy Notice

19922.06f1Organizational.2-i1 Regulation of Cryptographic Controls

CTRL-194 Cryptography Management

19922.06f1Organizational.2-r2 Regulation of Cryptographic Controls

CTRL-194 Cryptography Management

19980.06dHIPAAOrganizational.1-r2 Data Protection and Privacy of Covered Information

CTRL-112 Encryption of Data at Rest and in Transit

AC-02-HI User Account Management

CTRL-1 Access Control Policy and Procedures

AC-02-HI User Account Management

CTRL-73 Review of User Privileges

AC-02-i1 User Account Management

CTRL-1 Access Control Policy and Procedures

AC-03-HI Role-based Access Controls (RBAC)

CTRL-23 Role-Based Access Control

AC-05-HI Separation of Duties

CTRL-65 Separation of Duties

AC-06-HI Least Privilege Access

CTRL-1 Access Control Policy and Procedures

AC-08-HI System Use Notification

CTRL-539 Access Agreements

AC-11-HI Device Lock and Session Timeouts

CTRL-91 Session Termination

AC-17-HI Remote Access

CTRL-110 Remote Access

AC-19-HI Access Control for Mobile Devices

CTRL-79 Mobile Device Management

AT-02-HI Security Awareness and Privacy Training

CTRL-245 Security and Privacy Awareness Training

AT-02-i1 Security Awareness Training

CTRL-245 Security and Privacy Awareness Training

AT-04-HI Training Records

CTRL-245 Security and Privacy Awareness Training

AU-02-HI Event Logging in IT Systems

CTRL-833 Logging and Monitoring

AU-06-HI Log Review and Reporting

CTRL-833 Logging and Monitoring

AU-10-HI Non-Repudiation

CTRL-153 Information Exchange

AU-11-HI Audit Record Retention

CTRL-833 Logging and Monitoring

CA-02-HI Control Assessments

CTRL-149 Control Assessments

CA-03-HI Third-Party Agreements

CTRL-1129 Third-Party Agreements

CA-07-HI Continuous Monitoring

CTRL-833 Logging and Monitoring

CA-08-HI Penetration Testing

CTRL-174 Penetration Testing

CA-08-i1 Penetration Testing

CTRL-174 Penetration Testing

CM-03-HI Configuration Change Control

CTRL-190 Change Management and Software Development Life Cycle

CM-06-HI System Hardening Through Baseline Configurations

CTRL-208 Configuration Management

CM-06-i1 System Hardening Through Baseline Configurations

CTRL-208 Configuration Management

CM-08-HI Asset Inventory

CTRL-435 System Inventory

CM-08-i1 Asset Inventory

CTRL-435 System Inventory

CM-09-HI Configuration Management Plan

CTRL-65 Separation of Duties

CM-09-i1 Configuration Management Plan

CTRL-65 Separation of Duties

CP-02-HI Organizations need to develop a contingency plan that supports continuous operation for system(s) that perform essential mission and business functions and need to disseminate that plan to appropriate stakeholders.

CTRL-264 Contingency Plan

CP-02-HI Contingency Plan (BCP/DR)

CTRL-264 Contingency Plan

CP-04-HI Contingency Plan (BCP/DR) Testing

CTRL-276 Contingency Plan Testing

CP-04-i1 Contingency Plan (BCP/DR) Testing

CTRL-276 Contingency Plan Testing

CP-09-HI Data Backup

CTRL-300 System Backup

CP-09-i1 Data Backup

CTRL-300 System Backup

IA-02-HI Internal Users Identification and Authentication

CTRL-319 Identification and Authentication

IA-02-HI User Identification and Authentication

CTRL-319 Identification and Authentication

IA-02-i1 User Identification and Authentication

CTRL-349 Password-Based Authentication

IA-05-HI Password Management

CTRL-349 Password-Based Authentication

IA-05-i1 Password Management

CTRL-349 Password-Based Authentication

IR-01-HI Incident Response Policy and Procedures

CTRL-423 Incident Response Plan

IR-01-i1 Incident Response Policy and Procedures

CTRL-423 Incident Response Plan

IR-04-HI Incident Handling and Reporting

CTRL-423 Incident Response Plan

IR-08-HI Incident Response Plan

CTRL-423 Incident Response Plan

IR-08-i1 Incident Response Plan

CTRL-423 Incident Response Plan

KT-01-HI Key Tool Selection (HR)

CTRL-1134 Key Tools Selection (HR)

KT-02-HI Key Tool Selection (Technical)

CTRL-1135 Key Tools Selection (Technical)

MA-01-HI Maintenance Policy and Procedures

CTRL-468 Maintenance Policy and Procedures

MP-01-HI Media Protection Policy and Procedures

CTRL-498 Media Protection Policy and Procedures

MP-06-HI Media Sanitization

CTRL-511 Media Sanitization and Disposal

PE-02-HI Physical Access Authorizations

CTRL-551 Physical Access Control

PE-03-HI Physical Access Control

CTRL-255 Physical Security Controls

PL-04-HI Rules of Behavior

CTRL-539 Access Agreements

PM-01-HI Information Security Program Management Policy and Procedures

CTRL-431 Information Security Policy and Procedures

PM-02-HI Information Security Program Leadership Role

CTRL-432 Information Security Program Leadership Role

PM-03-HI Information Security and Privacy Resources

CTRL-431 Information Security Policy and Procedures

PM-07-HI Network Architecture and Dataflow Diagrams

CTRL-198 Network Segmentation

PM-07-i1 Network Architecture and Dataflow Diagrams

CTRL-198 Network Segmentation

PM-15-HI Security and Privacy Groups and Associations

CTRL-447 Security and Privacy Groups and Associations

PM-21-HI Accounting of Disclosures

CTRL-455 Accounting of Disclosures

POL-01-HI Policy Review and Publication

CTRL-431 Information Security Policy and Procedures

POL-01-i1 Policy Review and Publication

CTRL-431 Information Security Policy and Procedures

PS-02-HI Security Job and Risk Descriptions

CTRL-545 Position Descriptions

PS-02-i1 Security Job and Risk Descriptions

CTRL-545 Position Descriptions

PS-03-HI Personnel Screening

CTRL-530 Personnel Screening

PS-03-i1 Personnel Screening

CTRL-530 Personnel Screening

PS-04-HI Personnel Termination

CTRL-535 Access Termination

PS-06-HI Confidentiality Agreements for Company Personnel

CTRL-539 Access Agreements

PS-06-i1 Confidentiality Agreements for Company Personnel

CTRL-539 Access Agreements

PS-08-HI Personnel Sanctions

CTRL-544 Personnel Sanctions

PT-01-HI Privacy Policy and Procedures

CTRL-431 Information Security Policy and Procedures

PT-02-HI Authority to Process PII (Individual Rights - Access / Amend / Restrict / Object / Delete)

CTRL-622 Privacy Policy and Procedures

PT-04-HI Consent

CTRL-1142 Obtaining, Recording, and Revoking Consent

PT-05-HI Privacy Notice

CTRL-1146 Privacy Notice

PT-07-HI Specific Categories of PII (Use / Disclosure Limitations and Restrictions)

CTRL-639 Specific Categories of Personally Identifiable Information

RA-03-HI Risk Assessment

CTRL-646 Risk Assessment

RA-03-i1 Risk Assessment

CTRL-646 Risk Assessment

RA-05-HI Vulnerability Monitoring and Scanning

CTRL-814 System Integrity Policy and Procedures

RA-05-HI Vulnerability Monitoring and Scanning

CTRL-652 Vulnerability Management

RA-05-i1

CTRL-652 Vulnerability Management

RA-05-i1 Vulnerability Monitoring and Scanning

CTRL-814 System Integrity Policy and Procedures

RA-07-HI Risk Response and Remediation

CTRL-646 Risk Assessment

RA-07-HI Risk Response and Remediation

CTRL-652 Vulnerability Management

SA-03-HI System Development Life Cycle

CTRL-262 Change Management and Software Development Policy and Procedures

SA-05-HI System Documentation

CTRL-431 Information Security Policy and Procedures

SA-09-HI External System Services

CTRL-1109 Supplier Assessments and Reviews

SA-09-HI External System Services

CTRL-1129 Third-Party Agreements

SA-15-HI Development Process, Standards, and Tools

CTRL-190 Change Management and Software Development Life Cycle

SC-07-HI Boundary Protection and Firewalls

CTRL-950 Boundary Protection

SC-08-HI Transmission Confidentiality and Integrity

CTRL-112 Encryption of Data at Rest and in Transit

SC-08-i1 Transmission Confidentiality and Integrity

CTRL-112 Encryption of Data at Rest and in Transit

SC-13-HI Cryptographic Protection

CTRL-194 Cryptography Management

SI-03-HI Malware and Endpoint Protection

CTRL-822 Malicious Code Protection

SI-04-HI System Monitoring

CTRL-833 Logging and Monitoring

SI-04-i1 System Monitoring

CTRL-833 Logging and Monitoring

SI-07-HI Software, Firmware, and Information Integrity

CTRL-833 Logging and Monitoring

SI-10-HI Information Input Validation

CTRL-190 Change Management and Software Development Life Cycle

SI-12-HI Data Handling, Retention, and Disposal

CTRL-896 Information Management and Retention

SI-12-i1 Data Handling, Retention, and Disposal

CTRL-896 Information Management and Retention

SI-19-HI De-identification

CTRL-923 Removal of Direct Identifiers

SR-06-HI Vendor Management

CTRL-1109 Supplier Assessments and Reviews

SR-06-HI Third-Party Risk Assessments

CTRL-1109 Supplier Assessments and Reviews

SR-06-i1 Vendor Management

CTRL-1109 Supplier Assessments and Reviews

Viewing Framework Controls in Thoropass

You can view the framework requirements satisfied by a Unified Control by clicking References on the side panel when viewing the Unified Control.

The IDs and names of all framework controls satisfied by the Unified Control are listed by framework. Click a framework control to view its description.

Did this answer your question?