NIST CSF_RECOVER (RC) - Incident Recovery Plan Execution (RC.RP)
NIST SP6800-53 (Low)_Access Control
NIST SP6800-53 (Low)_Awareness and Training
NIST SP6800-53 (Low)_Audit and Accountability
NIST SP6800-53 (Low)_Assessment, Authorization, and Monitoring
NIST SP6800-53 (Low)_Configuration Management
NIST SP6800-53 (Low)_Contingency Planning
NIST SP6800-53 (Low)_Incident Response
NIST SP6800-53 (Low)_Identification and Authentication
NIST SP6800-53 (Low)_Maintenance
NIST SP6800-53 (Low)_Media Protection
NIST SP6800-53 (Low)_Risk Assessment
NIST SP6800-53 (Low)_NIST SP6800-53 (Low)_System and Services Acquisition
NIST SP6800-53 (Low)_System and Communications Protection
NIST SP6800-53 (Low)_System and Information Integrity
NIST SP6800-53 (Low)_Supply Chain Risk Management
NIST SSDF_Prepare the Organization (PO) Implement Roles and Responsibilities (PO.2)
NIST SSDF_Implement Supporting Toolchains (PO.3)
NIST SSDF_Define and Use Criteria for Software Security Checks (PO.4)
NIST SSDF_Implement and Maintain Secure Environments for Software Development (PO.5)
NIST SSDF_Protect Software (PS) Protect All Forms of Code from Unauthorized Access and Tampering (PS.1)
NIST SSDF_Provide a Mechanism for Verifying Software Release Integrity (PS.2)
NIST SSDF_Archive and Protect Each Software Release (PS.3)
NIST SSDF_Produce Well-Secured Software (PW) Design Software to Meet Security Requirements and Mitigate Security Risks (PW.1)
NIST SSDF_Review the Software Design to Verify Compliance with Security Requirements and Risk Information (PW.2)
NIST SSDF_Reuse Existing, Well-Secured Software When Feasible Instead of Duplicating Functionality (PW.4)
NIST SSDF_Create Source Code by Adhering to Secure Coding Practices (PW.5)
NIST SSDF_Configure the Compilation, Interpreter, and Build Processes to Improve Executable Security (PW.6)
NIST SSDF_Review and/or Analyze Human-Readable Code to Identify Vulnerabilities and Verify Compliance with Security Requirements (PW.7)
NIST SSDF_Test Executable Code to Identify Vulnerabilities and Verify Compliance with Security Requirements (PW.8)
NIST SSDF_Configure Software to Have Secure Settings by Default (PW.9)
NIST SSDF_Respond to Vulnerabilities (RV) Identify and Confirm Vulnerabilities on an Ongoing Basis (RV.1)
NIST SSDF_Assess, Prioritize, and Remediate Vulnerabilities (RV.2)
NIST SSDF_Analyze Vulnerabilities to Identify Their Root Causes (RV.3)
Periodic compliance activities supported by the Software
The Software store, process, or transmit
The Software requires to be integrated with other systems impacting the cybersecurity or compliance of the customer
Software modules implemented
Software vendor Third-Party Service Providers (TPSPs) used
Support a BES Reliability Operating Service (BROS)
In Electronic Security Perimeter (ESP)
External Routable Connectivity (ERC) Scope Impact
In Physical Security Perimeter (PSP)
With Electronic Access Point (EAP)
Accessibility Attributes
Connectivity Attributes
Software secure development lifecycle
The Software vendor provides support during installation or set-up
The Software vendor provides an implementation guide to assist customers in securely setting up the application
Cardholder Data Environment (CDE) Systems (in-scope for PCI DSS)
Connected-to and/or security-impacting systems
Out-of-scope Systems
Compare
Compare ×
See comparisonContinue browsing software
Free Ebook
Get your 5 steps guide to choose software
We promise not to spam you. By signing up to our newsletter, you will receive tools and insights from compliance experts, as well as important information to improve your account.