0% found this document useful (0 votes)
15 views9 pages

NIST_CSF_2_0_Audit_Checklist_Part_4_Detect__1724832771

The NIST CSF 2.0 Audit Checklist outlines a comprehensive framework for organizations to monitor and analyze potential cybersecurity threats and adverse events across various categories, including continuous monitoring, adverse event analysis, and incident declaration. It includes specific audit questions to assess compliance and effectiveness of monitoring systems, procedures for responding to incidents, and integration of threat intelligence. The checklist aims to enhance the organization's overall security posture by ensuring thorough monitoring and timely response to potential threats.

Uploaded by

8w24rr4kgh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views9 pages

NIST_CSF_2_0_Audit_Checklist_Part_4_Detect__1724832771

The NIST CSF 2.0 Audit Checklist outlines a comprehensive framework for organizations to monitor and analyze potential cybersecurity threats and adverse events across various categories, including continuous monitoring, adverse event analysis, and incident declaration. It includes specific audit questions to assess compliance and effectiveness of monitoring systems, procedures for responding to incidents, and integration of threat intelligence. The checklist aims to enhance the organization's overall security posture by ensuring thorough monitoring and timely response to potential threats.

Uploaded by

8w24rr4kgh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

NIST CSF 2.

0 AUDIT CHECKLIST
NIST CSF 2.0 AUDIT CHECKLIST

NIST CSF 2.0 Audit Checklist


DETECT (DE): Possible cybersecurity attacks and compromises are found and
Function analyzed
Continuous Monitoring (DE.CM): Assets are monitored to find anomalies, indicators
Category of compromise, and other potentially adverse events
Subcategory Audit Questionnaire Compliance Status
Continuous Monitoring 1. Does the organization have systems and
(DE.CM): Assets are processes in place to continuously monitor
monitored to find networks and network services for potentially
anomalies, indicators of adverse events?
compromise, and other 2. What tools or technologies are used for network
potentially adverse events monitoring (e.g., intrusion detection systems,
network traffic analyzers, log management tools)?
3. How does the organization define and identify
potentially adverse events in the context of
network monitoring?
4. Are there established baselines for normal
network behaviour, and how are deviations from
these baselines detected and investigated?
5. How frequently are network monitoring tools and
processes reviewed and updated to address new
threats or technologies?
6. Are there documented procedures for responding
to and investigating potentially adverse events
detected through network monitoring?
7. How are the results of network monitoring
communicated to relevant stakeholders within the
organization?
8. Does the organization monitor both internal and
external network traffic?
9. Are there mechanisms in place to correlate data
from different network monitoring tools to improve
threat detection capabilities?
10. How does the organization ensure that network
monitoring activities comply with relevant privacy
and data protection regulations?
DE.CM-02: The physical 1. Does the organization have systems and
environment is monitored processes in place to monitor the physical
to find potentially adverse environment for potentially adverse events?
events 2. What types of physical security controls are
monitored (e.g., access control systems,
surveillance cameras, environmental sensors)?
3. How does the organization define and identify
potentially adverse events in the context of
physical environment monitoring?
4. Are there established baselines for normal
physical environment conditions, and how are
deviations from these baselines detected and
investigated?
NIST CSF 2.0 AUDIT CHECKLIST

5. How frequently are physical monitoring systems


and processes reviewed and updated?
6. Are there documented procedures for responding
to and investigating potentially adverse events
detected through physical environment
monitoring?
7. How are the results of physical environment
monitoring communicated to relevant
stakeholders within the organization?
8. Does the organization integrate physical security
monitoring with cybersecurity monitoring efforts?
9. Are there mechanisms in place to ensure
continuous monitoring of critical physical areas,
even during power outages or other disruptions?
10. How does the organization ensure that physical
environment monitoring activities comply with
relevant privacy and labor regulations?
DE.CM-03: Personnel 1. Does the organization have systems and
activity and technology processes in place to monitor personnel activity
usage are monitored to and technology usage for potentially adverse
find potentially adverse events?
events 2. What types of personnel activities and technology
usage are monitored (e.g., login attempts, file
access, email usage, application usage)?
3. How does the organization define and identify
potentially adverse events in the context of
personnel activity and technology usage?
4. Are there established baselines for normal
personnel activity and technology usage, and how
are deviations from these baselines detected and
investigated?
5. How frequently are personnel activity and
technology usage monitoring systems and
processes reviewed and updated?
6. Are there documented procedures for responding
to and investigating potentially adverse events
detected through personnel and technology usage
monitoring?
7. How are the results of personnel activity and
technology usage monitoring communicated to
relevant stakeholders within the organization?
8. Does the organization have policies in place to
inform employees about monitoring activities and
ensure compliance with privacy regulations?
9. Are there mechanisms in place to detect and
investigate potential insider threats?
10. How does the organization balance the need for
monitoring with employee privacy concerns?
NIST CSF 2.0 AUDIT CHECKLIST

DE.CM-06: External 1. Does the organization have systems and


service provider activities processes in place to monitor the activities and
and services are services of external service providers for
monitored to find potentially adverse events?
potentially adverse events 2. What types of external service provider activities
and services are monitored?
3. How does the organization define and identify
potentially adverse events in the context of
external service provider activities?
4. Are there established baselines for normal
external service provider activities, and how are
deviations from these baselines detected and
investigated?
5. How frequently are external service provider
monitoring systems and processes reviewed and
updated?
6. Are there documented procedures for responding
to and investigating potentially adverse events
detected through external service provider
monitoring?
7. How are the results of external service provider
monitoring communicated to relevant
stakeholders within the organization?
8. Does the organization have agreements in place
with external service providers that allow for
monitoring of their activities?
9. Are there mechanisms in place to ensure that
external service providers comply with the
organization's security policies and standards?
10. How does the organization ensure that its
monitoring of external service providers complies
with relevant contractual and legal requirements?
DE.CM-09: Computing 1. Does the organization have systems and
hardware and software, processes in place to monitor computing
runtime environments, hardware, software, runtime environments, and
and their data are their data for potentially adverse events?
monitored to find 2. What specific aspects of computing hardware,
potentially adverse events software, runtime environments, and data are
monitored (e.g., system logs, application logs,
configuration changes, data access patterns)?
3. How does the organization define and identify
potentially adverse events in the context of these
IT assets?
4. Are there established baselines for normal
behaviour of computing hardware, software,
runtime environments, and data, and how are
deviations from these baselines detected and
investigated?
5. How frequently are monitoring systems and
processes for these IT assets reviewed and
updated?
NIST CSF 2.0 AUDIT CHECKLIST

6. Are there documented procedures for responding


to and investigating potentially adverse events
detected through monitoring of these IT assets?
7. How are the results of this monitoring
communicated to relevant stakeholders within the
organization?
8. Does the organization use automated tools for
monitoring and analyzing the behavior of
computing hardware, software, runtime
environments, and data?
9. Are there mechanisms in place to detect and
investigate potential malware infections,
unauthorized software installations, or
unauthorized changes to runtime environments?
10. How does the organization ensure that its
monitoring of computing hardware, software,
runtime environments, and data complies with
relevant privacy and data protection regulations?

Adverse Event Analysis (DE.AE): Anomalies, indicators of compromise, and other


Category potentially adverse events are analyzed to characterize the events and detect
cybersecurity incidents

Subcategory Audit Questionnaire Compliance Status


DE.AE-02: Potentially 1. Does the organization have a defined process for
adverse events are analyzing potentially adverse events?
analyzed to better 2. What criteria are used to identify and prioritize
understand associated potentially adverse events for analysis?
activities 3. How does the organization ensure that the
analysis of potentially adverse events is thorough
and timely?
4. What tools or technologies are used to support the
analysis of potentially adverse events?
5. Are there documented procedures for conducting
the analysis of potentially adverse events?
6. How does the organization capture and document
the findings from the analysis of potentially
adverse events?
7. Are there mechanisms in place to identify patterns
or trends across multiple potentially adverse
events?
8. How does the organization use the results of the
analysis to improve its overall security posture?
9. Are there clear roles and responsibilities assigned
for the analysis of potentially adverse events?
10. How does the organization's leadership ensure the
effectiveness of the analysis process for
potentially adverse events?
DE.AE-03: Information is 1. Does the organization have processes in place to
correlated from multiple correlate information from multiple sources when
sources analyzing cybersecurity events?
NIST CSF 2.0 AUDIT CHECKLIST

2. What types of information sources are used in the


correlation process (e.g., log files, network traffic
data, threat intelligence feeds)?
3. How does the organization ensure that the
information from different sources is accurately
and effectively correlated?
4. What tools or technologies are used to support the
correlation of information from multiple sources?
5. Are there documented procedures for correlating
and analyzing information from multiple sources?
6. How does the organization handle discrepancies
or conflicts in information from different sources?
7. Are there mechanisms in place to identify complex
or sophisticated attacks that may only be visible
when correlating multiple data sources?
8. How does the organization use the correlated
information to improve its detection and response
capabilities?
9. Are there clear roles and responsibilities assigned
for the correlation and analysis of information
from multiple sources?
DE.AE-04: The estimated 1. Does the organization have a process for
impact and scope of estimating the impact and scope of adverse
adverse events are events?
understood 2. What criteria or metrics are used to assess the
impact of adverse events (e.g., financial loss,
operational disruption, data compromise)?
3. How does the organization determine the scope of
adverse events, including affected systems, data,
and users?
4. Are there documented procedures for assessing
and documenting the impact and scope of
adverse events?
5. What tools or methodologies are used to support
the impact and scope assessment process?
6. How does the organization ensure that the impact
and scope assessments are accurate and
consistent across different types of adverse
events?
7. Are there mechanisms in place to update the
impact and scope assessments as new
information becomes available?
8. How does the organization use the impact and
scope assessments to prioritize its response and
recovery efforts?
9. Are there clear roles and responsibilities assigned
for assessing the impact and scope of adverse
events?
NIST CSF 2.0 AUDIT CHECKLIST

DE.AE-06: Information on 1. Does the organization have a process for providing


adverse events is information on adverse events to authorized staff
provided to authorized and tools?
staff and tools 2. How does the organization determine which staff
members and tools are authorized to receive
information on adverse events?
3. What types of information about adverse events
are shared with authorized staff and tools?
4. Are there mechanisms in place to ensure that
sensitive information about adverse events is
appropriately protected and shared only with
authorized parties?
5. How quickly is information about adverse events
made available to authorized staff and tools after
detection?
6. What communication channels or platforms are
used to share information about adverse events
with authorized staff and tools?
7. Are there procedures in place for escalating
information about critical or high-impact adverse
events to appropriate stakeholders?
8. How does the organization ensure that the
information provided about adverse events is
accurate, timely, and actionable?
9. Are there clear roles and responsibilities assigned
for managing and distributing information about
adverse events?
DE.AE-07: Cyber threat 1. Does the organization integrate cyber threat
intelligence and other intelligence and other contextual information into
contextual information its analysis of adverse events?
are integrated into the 2. What sources of cyber threat intelligence and
analysis contextual information does the organization use?
3. How does the organization ensure the reliability
and relevance of the threat intelligence and
contextual information it uses?
4. Are there processes in place to correlate threat
intelligence and contextual information with
observed adverse events?
5. How does the organization use threat intelligence
and contextual information to enhance its
understanding of potential threats and attack
patterns?
6. What tools or technologies are used to support the
integration of threat intelligence and contextual
information into the analysis process?
7. Are there mechanisms in place to update and
refine detection and analysis processes based on
new threat intelligence and contextual
information?
8. How does the organization measure the
effectiveness of integrating threat intelligence and
NIST CSF 2.0 AUDIT CHECKLIST

contextual information into its analysis


processes?
9. Are there clear roles and responsibilities assigned
for managing and integrating threat intelligence
and contextual information?
DE.AE-08: Incidents are 1. Does the organization have defined criteria for
declared when adverse declaring an incident based on adverse events?
events meet the defined 2. What factors are considered in the incident
incident criteria declaration criteria (e.g., impact, scope, severity,
type of assets affected)?
3. How are the incident declaration criteria
communicated to relevant staff members?
4. Are there documented procedures for evaluating
adverse events against the incident declaration
criteria?
5. How does the organization ensure consistency in
applying the incident declaration criteria across
different types of adverse events?
6. What is the process for declaring an incident once
the defined criteria are met?
7. Are there mechanisms in place to escalate
potential incidents to appropriate decision-
makers for declaration?
8. How quickly are incidents typically declared after
the criteria are met?
9. Are there clear roles and responsibilities assigned
for evaluating adverse events and declaring
incidents?
NIST CSF 2.0 AUDIT CHECKLIST

You might also like