-
Notifications
You must be signed in to change notification settings - Fork 287
/
Copy pathccb-cff-2023-03-01.yaml
7523 lines (7500 loc) · 393 KB
/
ccb-cff-2023-03-01.yaml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
urn: urn:intuitem:risk:library:ccb-cff-2023-03-01
locale: en
ref_id: CCB-CFF-2023-03-01
name: CCB CyberFundamentals Framework - 2023-03-01
description: 'Centre For Cybersecurity Belgium - CyberFundamentals Framework
With content from CyFun Self-Assessment tool V2024-11-05
https://ccb.belgium.be'
copyright: All texts, layouts, designs and other elements of any nature in this document
are subject to copyright law.
version: 5
publication_date: 2025-01-19
provider: CCB
packager: intuitem
translations:
fr:
name: CCB CyberFondamentaux - 2023-03-01
description: 'Centre For Cybersecurity Belgium - CyberFondamentaux
With content from CyFun Self-Assessment tool V2024-11-05
https://ccb.belgium.be'
objects:
framework:
urn: urn:intuitem:risk:framework:ccb-cff-2023-03-01
ref_id: CCB-CFF-2023-03-01
name: CCB CyberFundamentals Framework - 2023-03-01
description: Centre For Cybersecurity Belgium - CyberFundamentals Framework
translations:
fr:
name: CCB CyberFondamentaux - 2023-03-01
description: Centre For Cybersecurity Belgium - CyberFondamentaux
min_score: 1
max_score: 5
scores_definition:
- score: 1
name: Initial
description: Standard process does not exist.
description_doc: No Process documentation or not formally approved by management.
translations:
fr:
name: Initial
description: "Il n\u2019existe pas de processus standard."
description_doc: "Pas de documentation sur le processus ou pas d\u2019approbation\
\ formelle par la direction. "
- score: 2
name: Repeatable
description: Ad-hoc process exists and is done informally.
description_doc: Formally approved Process documentation exists but not reviewed
in the previous 2 years.
translations:
fr:
name: "R\xE9p\xE9table"
description: "Il existe un processus ad hoc qui se d\xE9roule de mani\xE8\
re informelle."
description_doc: "Il existe une documentation de processus formellement\
\ approuv\xE9e, mais elle n\u2019a pas fait l\u2019objet d\u2019un audit\
\ au cours des deux derni\xE8res ann\xE9es."
- score: 3
name: Defined
description: 'Formal process exists and is implemented.
Evidence available for most activities.
Less than 10% process exceptions.'
description_doc: 'Formally approved Process documentation exists, and exceptions
are documented and approved.
Documented & approved exceptions < 5% of the time.'
translations:
fr:
name: "D\xE9fini"
description: "Un processus formel existe et est mis en \u0153uvre.\nDes\
\ preuves sont disponibles pour la plupart des activit\xE9s. \nMoins de\
\ 10 % d\u2019exceptions au processus."
description_doc: "Il existe une documentation formellement approuv\xE9e\
\ sur les processus et les exceptions sont document\xE9es et approuv\xE9\
es.\nLes exceptions sont document\xE9es et approuv\xE9es dans moins de\
\ 5 % des cas."
- score: 4
name: Managed
description: 'Formal process exists and is implemented.
Evidence available for all activities.
Detailed metrics of the process are captured and reported.
Minimal target for metrics has been established.
Less than 5% of process exceptions.'
description_doc: 'Formally approved Process documentation exists, and exceptions
are documented and approved.
Documented & approved exceptions < 3% of the time.'
translations:
fr:
name: "G\xE9r\xE9"
description: "Un processus formel existe et est mis en \u0153uvre.\nDes\
\ preuves sont disponibles pour toutes les activit\xE9s.\nDes mesures\
\ d\xE9taill\xE9es du processus sont saisies et communiqu\xE9es.\nUn objectif\
\ minimum est fix\xE9 pour les indicateurs.\nMoins de 5 % des exceptions\
\ au processus."
description_doc: "Il existe une documentation formellement approuv\xE9e\
\ sur les processus et les exceptions sont document\xE9es et approuv\xE9\
es.\nExceptions document\xE9es et approuv\xE9es < 3 % du temps."
- score: 5
name: Optimizing
description: 'Formal process exists and is implemented.
Evidence available for all activities.
Detailed metrics of the process are captured and reported.
Minimal target for metrics has been established and continually improving.
Less than 1% of process exceptions.'
description_doc: 'Formally approved Process documentation exists, and exceptions
are documented and approved.
Documented & approved exceptions < 0,5% of the time.'
translations:
fr:
name: "Optimis\xE9"
description: "Un processus formel existe et est mis en \u0153uvre.\nDes\
\ preuves sont disponibles pour toutes les activit\xE9s.\nDes mesures\
\ d\xE9taill\xE9es du processus sont saisies et communiqu\xE9es.\nDes\
\ objectifs minimaux sont fix\xE9s pour les indicateurs et sont am\xE9\
lior\xE9s en permanence.\nMoins de 1 % des exceptions au processus."
description_doc: "Il existe une documentation formellement approuv\xE9e\
\ sur les processus et les exceptions sont document\xE9es et approuv\xE9\
es.\nExceptions document\xE9es et approuv\xE9es < 0,5 % du temps."
implementation_groups_definition:
- ref_id: B
name: basic
description: null
translations:
fr:
name: basique
description: null
- ref_id: I
name: important
description: null
translations:
fr:
name: important
description: null
- ref_id: E
name: essential
description: null
translations:
fr:
name: essentiel
description: null
- ref_id: BK
name: basic - key measures
description: null
translations:
fr:
name: "basique - mesure cl\xE9"
description: null
- ref_id: IK
name: important - key measures
description: null
translations:
fr:
name: "important - mesure cl\xE9"
description: null
- ref_id: EK
name: essential - key measures
description: null
translations:
fr:
name: "essentiel - mesure cl\xE9"
description: null
requirement_nodes:
- urn: urn:intuitem:risk:req_node:ccb-cff-2023-03-01:id
assessable: false
depth: 1
ref_id: ID
name: IDENTIFY (ID)
translations:
fr:
name: IDENTIFIER (ID)
description: ''
annotation: ''
- urn: urn:intuitem:risk:req_node:ccb-cff-2023-03-01:id.am
assessable: false
depth: 2
parent_urn: urn:intuitem:risk:req_node:ccb-cff-2023-03-01:id
ref_id: ID.AM
name: Asset Management
description: "The data, personnel, devices, systems, and facilities that enable\
\ the organization to achieve business purposes are identified and managed\
\ consistent with their relative importance to organizational objectives and\
\ the organization\u2019s risk strategy."
translations:
fr:
name: "Gestion d'actifs\_"
description: "Les donn\xE9es, le personnel, les dispositifs, les syst\xE8\
mes et les installations qui permettent \xE0 l'organisation d'atteindre\
\ ses objectifs op\xE9rationnels sont identifi\xE9s et g\xE9r\xE9s en\
\ fonction de leur importance relative par rapport aux objectifs de l'organisation\
\ et \xE0 sa strat\xE9gie en mati\xE8re de risques."
annotation: ''
- urn: urn:intuitem:risk:req_node:ccb-cff-2023-03-01:id.am-1
assessable: false
depth: 3
parent_urn: urn:intuitem:risk:req_node:ccb-cff-2023-03-01:id.am
ref_id: ID.AM-1
description: Physical devices and systems within the organization are inventoried
translations:
fr:
name: null
description: "Les dispositifs et syst\xE8mes physiques utilis\xE9s dans\
\ l'organisation sont inventori\xE9s."
annotation: ''
- urn: urn:intuitem:risk:req_node:ccb-cff-2023-03-01:basic_id.am-1.1
assessable: true
depth: 4
parent_urn: urn:intuitem:risk:req_node:ccb-cff-2023-03-01:id.am-1
ref_id: BASIC_ID.AM-1.1
description: An inventory of assets associated with information and information
processing facilities within the organization shall be documented, reviewed,
and updated when changes occur.
annotation: "\u2022\tThis inventory includes fixed and portable computers, tablets,\
\ mobile phones, Programmable Logic Controllers (PLCs), sensors, actuators,\
\ robots, machine tools, firmware, network switches, routers, power supplies,\
\ and other networked components or devices. \n\u2022\tThis inventory must\
\ include all assets, whether or not they are connected to the organization's\
\ network.\n\u2022\tThe use of an IT asset management tool could be considered."
implementation_groups:
- B
- I
- E
translations:
fr:
name: null
description: "Un inventaire des actifs associ\xE9s aux informations et aux\
\ installations de traitement de l'information au sein de l'organisation\
\ doit \xEAtre document\xE9, examin\xE9 et mis \xE0 jour lorsque des changements\
\ surviennent."
annotation: "\u2022 Cet inventaire comprend des ordinateurs fixes et portables,\
\ des tablettes, des t\xE9l\xE9phones mobiles, des contr\xF4leurs logiques\
\ programmables (PLC), des capteurs, des actionneurs, des robots, des\
\ machines- outils, des micrologiciels, des switchs, des routeurs, des\
\ alimentations et d'autres composants ou dispositifs en r\xE9seau. \n\
\u2022 Cet inventaire doit inclure tous les actifs, qu'ils soient ou non\
\ connect\xE9s au r\xE9seau de l'organisation. \n\u2022 L'utilisation\
\ d'un outil de gestion des actifs informatiques pourrait \xEAtre envisag\xE9\
e."
- urn: urn:intuitem:risk:req_node:ccb-cff-2023-03-01:important_id.am-1.2
assessable: true
depth: 4
parent_urn: urn:intuitem:risk:req_node:ccb-cff-2023-03-01:id.am-1
ref_id: IMPORTANT_ID.AM-1.2
description: "The inventory of assets associated with information and information\
\ processing facilities shall reflect changes in the organization\u2019s\
\ context and include all information necessary for effective accountability."
annotation: "\u2022\tInventory specifications include for example, manufacturer,\
\ device type, model, serial number, machine names and network addresses,\
\ physical location\u2026\n\u2022\tAccountability is the obligation to explain,\
\ justify, and take responsibility for one's actions, it implies answerability\
\ for the outcome of the task or process.\n\u2022\tChanges include the decommissioning\
\ of material."
implementation_groups:
- I
- E
translations:
fr:
name: null
description: "L'inventaire des actifs associ\xE9s aux informations et aux\
\ installations de traitement de l'information doit refl\xE9ter les changements\
\ intervenus dans le contexte de l'organisation et inclure toutes les\
\ informations n\xE9cessaires \xE0 une responsabilisation efficace."
annotation: "\u2022 Les sp\xE9cifications de l'inventaire comprennent par\
\ exemple le fabricant, le type de dispositif, le mod\xE8le, le num\xE9\
ro de s\xE9rie, les noms de machine et les adresses de r\xE9seau, l'emplacement\
\ physique... \n\u2022 La responsabilisation est l\u2019obligation de\
\ rendre compte , d'expliquer, de justifier et d'assumer la responsabilit\xE9\
\ de ses actions, elle implique la responsabilit\xE9 du r\xE9sultat de\
\ la t\xE2che ou du processus. \n\u2022 Les changements incluent le d\xE9\
classement de mat\xE9riel."
- urn: urn:intuitem:risk:req_node:ccb-cff-2023-03-01:important_id.am-1.3
assessable: true
depth: 4
parent_urn: urn:intuitem:risk:req_node:ccb-cff-2023-03-01:id.am-1
ref_id: IMPORTANT_ID.AM-1.3
description: When unauthorized hardware is detected, it shall be quarantined
for possible exception handling, removed, or replaced, and the inventory shall
be updated accordingly.
annotation: "\u2022\tAny unsupported hardware without an exception documentation,\
\ is designated as unauthorized.\n\u2022\tUnauthorized hardware can be detected\
\ during inventory, requests for support by the user or other means."
implementation_groups:
- I
- E
translations:
fr:
name: null
description: "Lorsque du mat\xE9riel non autoris\xE9 est d\xE9tect\xE9,\
\ il est mis en quarantaine pour un \xE9ventuel traitement d'exception,\
\ retir\xE9 ou remplac\xE9, et l'inventaire est mis \xE0 jour en cons\xE9\
quence."
annotation: "\u2022 Tout mat\xE9riel non pris en charge, sans documentation\
\ d'exception, est d\xE9sign\xE9 comme non autoris\xE9. \n\u2022 Le mat\xE9\
riel non autoris\xE9 peut \xEAtre d\xE9tect\xE9 lors de l'inventaire,\
\ des demandes d'assistance de l'utilisateur ou par d'autres moyens."
- urn: urn:intuitem:risk:req_node:ccb-cff-2023-03-01:id.am-1.4
assessable: true
depth: 4
parent_urn: urn:intuitem:risk:req_node:ccb-cff-2023-03-01:id.am-1
ref_id: ID.AM-1.4
description: Mechanisms for detecting the presence of unauthorized hardware
and firmware components within the organization's network shall be identified.
annotation: "\u2022\tWhere safe and feasible, these mechanisms should be automated.\n\
\u2022\tThere should be a process to address unauthorized assets on a frequently\
\ basis; The organization may choose to remove the asset from the network,\
\ deny the asset from connecting remotely to the network, or quarantine the\
\ asset."
implementation_groups:
- E
translations:
fr:
name: null
description: "Les m\xE9canismes permettant de d\xE9tecter la pr\xE9sence\
\ de composants mat\xE9riels et micrologiciels non autoris\xE9s dans le\
\ r\xE9seau de l'organisation doivent \xEAtre identifi\xE9s."
annotation: "\u2022 Lorsque cela est possible et s\xFBr, il convient d\u2019\
automatiser ces m\xE9canismes. \n\u2022 Il convient d\u2019avoir un process\
\ pour traiter les actifs non autoris\xE9s sur une base fr\xE9quente ;\
\ L'organisation peut choisir de retirer l\u2019actif du r\xE9seau, de\
\ l'emp\xEAcher de se connecter \xE0 distance au r\xE9seau ou de le mettre\
\ en quarantaine."
- urn: urn:intuitem:risk:req_node:ccb-cff-2023-03-01:id.am-2
assessable: false
depth: 3
parent_urn: urn:intuitem:risk:req_node:ccb-cff-2023-03-01:id.am
ref_id: ID.AM-2
description: Software platforms and applications within the organization are
inventoried
translations:
fr:
name: null
description: "Les plateformes et applications logicielles utilis\xE9es au\
\ sein de l'organisation sont inventori\xE9es."
annotation: ''
- urn: urn:intuitem:risk:req_node:ccb-cff-2023-03-01:basic_id.am-2.1
assessable: true
depth: 4
parent_urn: urn:intuitem:risk:req_node:ccb-cff-2023-03-01:id.am-2
ref_id: BASIC_ID.AM-2.1
description: An inventory that reflects what software platforms and applications
are being used in the organization shall be documented, reviewed, and updated
when changes occur.
annotation: "\u2022\tThis inventory includes software programs, software platforms\
\ and databases, even if outsourced (SaaS).\n\u2022\tOutsourcing arrangements\
\ should be part of the contractual agreements with the provider.\n\u2022\t\
Information in the inventory should include for example: name, description,\
\ version, number of users, data processed, etc.\n\u2022\tA distinction should\
\ be made between unsupported software and unauthorized software.\n\u2022\t\
The use of an IT asset management tool could be considered."
implementation_groups:
- B
- I
- E
translations:
fr:
name: null
description: "Un inventaire refl\xE9tant les plateformes et les applications\
\ logicielles utilis\xE9es dans l'organisation doit \xEAtre document\xE9\
, r\xE9vis\xE9 et mis \xE0 jour lorsque des changements surviennent."
annotation: "\u2022 Cet inventaire comprend les programmes logiciels, les\
\ plateformes logicielles et les bases de donn\xE9es, m\xEAme s'ils sont\
\ externalis\xE9s (SaaS). \n\u2022 Il convient que les accords d'externalisation\
\ fassent partie des accords contractuels avec le fournisseur. \n\u2022\
\ Il convient que les informations de l'inventaire comprennent par exemple\
\ : le nom, la description, la version, le nombre d'utilisateurs, les\
\ donn\xE9es trait\xE9es, etc. \n\u2022 Il convient de faire la distinction\
\ entre les logiciels non pris en charge et les logiciels non autoris\xE9\
s. \n\u2022 L'utilisation d'un outil de gestion des actifs informatiques\
\ pourrait \xEAtre envisag\xE9e."
- urn: urn:intuitem:risk:req_node:ccb-cff-2023-03-01:important_id.am-2.2
assessable: true
depth: 4
parent_urn: urn:intuitem:risk:req_node:ccb-cff-2023-03-01:id.am-2
ref_id: IMPORTANT_ID.AM-2.2
description: "The inventory of software platforms and applications associated\
\ with information and information processing shall reflect changes in the\
\ organization\u2019s context and include all information necessary for effective\
\ accountability."
annotation: The inventory of software platforms and applications should include
the title, publisher, initial install/use date, and business purpose for each
entry; where appropriate, include the Uniform Resource Locator (URL), app
store(s), version(s), deployment mechanism, and decommission date.
implementation_groups:
- I
- E
translations:
fr:
name: null
description: "L'inventaire des plates-formes logicielles et des applications\
\ associ\xE9es \xE0 l'information et au traitement de l'information doit\
\ refl\xE9ter l'\xE9volution du contexte de l'organisation et inclure\
\ toutes les informations n\xE9cessaires \xE0 une responsabilisation efficace."
annotation: "Il convient que l'inventaire des plateformes logicielles et\
\ des applications comprenne le titre, l'\xE9diteur, la date d'installation/utilisation\
\ initiale et l'objectif de l'organisation pour chaque entr\xE9e ; le\
\ cas \xE9ch\xE9ant, il convient d\u2019inclure l\u2019adresse web (URL),\
\ le ou les magasins d'applications, la ou les versions, le m\xE9canisme\
\ de d\xE9ploiement et la date de mise hors service."
- urn: urn:intuitem:risk:req_node:ccb-cff-2023-03-01:important_id.am-2.3
assessable: true
depth: 4
parent_urn: urn:intuitem:risk:req_node:ccb-cff-2023-03-01:id.am-2
ref_id: IMPORTANT_ID.AM-2.3
description: Individuals who are responsible and who are accountable for administering
software platforms and applications within the organization shall be identified.
annotation: No additional guidance on this topic.
implementation_groups:
- I
- E
translations:
fr:
name: null
description: "Les personnes qui sont responsables de l'administration des\
\ plates-formes et des applications logicielles au sein de l'organisation\
\ et qui doivent en rendre compte doivent \xEAtre identifi\xE9es."
annotation: "Aucune orientation suppl\xE9mentaire sur ce sujet."
- urn: urn:intuitem:risk:req_node:ccb-cff-2023-03-01:important_id.am-2.4
assessable: true
depth: 4
parent_urn: urn:intuitem:risk:req_node:ccb-cff-2023-03-01:id.am-2
ref_id: IMPORTANT_ID.AM-2.4
description: When unauthorized software is detected, it shall be quarantined
for possible exception handling, removed, or replaced, and the inventory shall
be updated accordingly.
annotation: "\u2022\tAny unsupported software without an exception documentation,\
\ is designated as unauthorized.\n\u2022\tUnauthorized software can be detected\
\ during inventory, requests for support by the user or other means."
implementation_groups:
- I
- E
translations:
fr:
name: null
description: "Lorsqu'un logiciel non autoris\xE9 est d\xE9tect\xE9, il est\
\ mis en quarantaine en vue d'un \xE9ventuel traitement d'exception, supprim\xE9\
\ ou remplac\xE9, et l'inventaire est mis \xE0 jour en cons\xE9quence."
annotation: "\u2022 Tout logiciel non pris en charge sans documentation\
\ d'exception, est d\xE9sign\xE9 comme non autoris\xE9. \n\u2022 Les logiciels\
\ non autoris\xE9s peuvent \xEAtre d\xE9tect\xE9s lors de l'inventaire,\
\ des demandes d'assistance de l'utilisateur ou par d'autres moyens."
- urn: urn:intuitem:risk:req_node:ccb-cff-2023-03-01:id.am-2.5
assessable: true
depth: 4
parent_urn: urn:intuitem:risk:req_node:ccb-cff-2023-03-01:id.am-2
ref_id: ID.AM-2.5
description: "Mechanisms for detecting the presence of unauthorized software\
\ within the organization\u2019s ICT/OT environment shall be identified. "
annotation: "\u2022\tWhere safe and feasible, these mechanisms should be automated.\n\
\u2022\tThere should be a process to regularly address unauthorised assets;\
\ The organization may choose to remove the asset from the network, deny the\
\ asset from connecting remotely to the network, or quarantine the asset."
implementation_groups:
- E
translations:
fr:
name: null
description: "Les m\xE9canismes permettant de d\xE9tecter la pr\xE9sence\
\ de logiciels non autoris\xE9s dans l'environnement TIC/OT de l'organisation\
\ doivent \xEAtre identifi\xE9s."
annotation: "\u2022 Lorsque cela est possible et s\xFBr, il convient d\u2019\
automatiser ces m\xE9canismes. \n\u2022 Il convient d\u2019avoir un process\
\ pour traiter les actifs non autoris\xE9s sur une base fr\xE9quente ;\
\ L'organisation peut choisir de retirer l\u2019actif du r\xE9seau, de\
\ l'emp\xEAcher de se connecter \xE0 distance au r\xE9seau ou de le mettre\
\ en quarantaine."
- urn: urn:intuitem:risk:req_node:ccb-cff-2023-03-01:id.am-3
assessable: false
depth: 3
parent_urn: urn:intuitem:risk:req_node:ccb-cff-2023-03-01:id.am
ref_id: ID.AM-3
description: Organizational communication and data flows are mapped
translations:
fr:
name: null
description: "La communication organisationnelle et les flux de donn\xE9\
es sont sch\xE9matis\xE9s."
annotation: ''
- urn: urn:intuitem:risk:req_node:ccb-cff-2023-03-01:basic_id.am-3.1
assessable: true
depth: 4
parent_urn: urn:intuitem:risk:req_node:ccb-cff-2023-03-01:id.am-3
ref_id: BASIC_ID.AM-3.1
description: Information that the organization stores and uses shall be identified.
annotation: "\u2022\tStart by listing all the types of information your business\
\ stores or uses. Define \u201Cinformation type\u201D in any useful way that\
\ makes sense to your business. You may want to have your employees make a\
\ list of all the information they use in their regular activities. List everything\
\ you can think of, but you do not need to be too specific. For example, you\
\ may keep customer names and email addresses, receipts for raw material,\
\ your banking information, or other proprietary information.\n\u2022\tConsider\
\ mapping this information with the associated assets identified in the inventories\
\ of physical devices, systems, software platforms and applications used within\
\ the organization (see ID.AM-1 & ID.AM-2)."
implementation_groups:
- B
- I
- E
translations:
fr:
name: null
description: "Les informations que l'organisation stocke et utilise doivent\
\ \xEAtre identifi\xE9es."
annotation: "\u2022 Commencez par \xE9num\xE9rer tous les types d'informations\
\ que votre organisation stocke ou utilise. D\xE9finissez le \"type d'information\"\
\ de toute mani\xE8re utile et logique pour votre organisation. Vous pouvez\
\ demander \xE0 vos employ\xE9s de dresser une liste de toutes les informations\
\ qu'ils utilisent dans le cadre de leurs activit\xE9s habituelles. Dressez\
\ une liste de tout ce \xE0 quoi vous pouvez penser, mais il n'est pas\
\ n\xE9cessaire d'\xEAtre trop pr\xE9cis. Par exemple, vous pouvez conserver\
\ les noms et adresses \xE9lectroniques de vos clients, les re\xE7us de\
\ mati\xE8res premi\xE8res, vos informations bancaires ou d'autres informations\
\ exclusives. \n\u2022 Envisagez de mettre en correspondance ces informations\
\ avec les actifs associ\xE9s identifi\xE9s dans les inventaires des dispositifs\
\ physiques, des syst\xE8mes, des plateformes logicielles et des applications\
\ utilis\xE9s au sein de l'organisation (voir ID.AM-1 & ID.AM-2)."
- urn: urn:intuitem:risk:req_node:ccb-cff-2023-03-01:important_id.am-3.2
assessable: true
depth: 4
parent_urn: urn:intuitem:risk:req_node:ccb-cff-2023-03-01:id.am-3
ref_id: IMPORTANT_ID.AM-3.2
description: All connections within the organization's ICT/OT environment, and
to other organization-internal platforms shall be mapped, documented, approved,
and updated as appropriate.
annotation: "\u2022\tConnection information includes, for example, the interface\
\ characteristics, data characteristics, ports, protocols, addresses, description\
\ of the data, security requirements, and the nature of the connection.\n\u2022\
\tConfiguration management can be used as supporting asset.\n\u2022\tThis\
\ documentation should not be stored only on the network it represents.\n\u2022\
\tConsider keeping a copy of this documentation in a safe offline environment\
\ (e.g. offline hard disk, paper hardcopy, \u2026)"
implementation_groups:
- I
- E
translations:
fr:
name: null
description: "Toutes les connexions au sein de l'environnement TIC/OT de\
\ l'organisation, ainsi qu'\xE0 d'autres plateformes internes \xE0 l'organisation,\
\ doivent \xEAtre sch\xE9matis\xE9es, document\xE9es, approuv\xE9es et\
\ mises \xE0 jour le cas \xE9ch\xE9ant."
annotation: "\u2022 Les informations relatives \xE0 la connexion comprennent,\
\ par exemple, les caract\xE9ristiques de l'interface, les caract\xE9\
ristiques des donn\xE9es, les ports, les protocoles, les adresses, la\
\ description des donn\xE9es, les exigences de s\xE9curit\xE9 et la nature\
\ de la connexion. \n\u2022 La gestion de la configuration peut \xEAtre\
\ utilis\xE9e comme soutien. \n\u2022 Il convient que cette documentation\
\ ne soit pas stock\xE9e uniquement sur le r\xE9seau qu'elle repr\xE9\
sente. \n\u2022 Envisagez de conserver une copie de cette documentation\
\ dans un environnement hors ligne s\xFBr (par exemple, disque dur hors\
\ ligne, copie papier, ...)."
- urn: urn:intuitem:risk:req_node:ccb-cff-2023-03-01:id.am-3.3
assessable: true
depth: 4
parent_urn: urn:intuitem:risk:req_node:ccb-cff-2023-03-01:id.am-3
ref_id: ID.AM-3.3
description: "The information flows/data flows within the organization\u2019\
s ICT/OT environment, as well as to other organization-internal systems shall\
\ be mapped, documented, authorized, and updated when changes occur."
annotation: "\u2022\tWith knowledge of the information/data flows within a system\
\ and between systems, it is possible to determine where information can and\
\ cannot go.\n\u2022\tConsider:\no\tEnforcing controls restricting connections\
\ to only authorized interfaces.\no\tHeightening system monitoring activity\
\ whenever there is an indication of increased risk to organization's critical\
\ operations and assets.\no\tProtecting the system from information leakage\
\ due to electromagnetic signals emanations."
implementation_groups:
- E
translations:
fr:
name: null
description: "Les flux d'informations/de donn\xE9es dans l'environnement\
\ TIC/OT de l'organisation, ainsi que vers d'autres syst\xE8mes internes\
\ \xE0 l'organisation, doivent \xEAtre sch\xE9matis\xE9s, document\xE9\
s, autoris\xE9s et mis \xE0 jour lorsque des changements surviennent."
annotation: "\u2022 En connaissant les flux d'informations et de donn\xE9\
es au sein d'un syst\xE8me et entre les syst\xE8mes, il est possible de\
\ d\xE9terminer o\xF9 les informations peuvent et ne peuvent pas aller.\
\ \n\u2022 Envisagez de : \n o Appliquer des contr\xF4les restreignant\
\ les connexions aux seules interfaces autoris\xE9es. \n o Renforcer\
\ l'activit\xE9 de surveillance du syst\xE8me chaque fois qu'il y a une\
\ indication d'un risque accru pour les op\xE9rations et les actifs critiques\
\ de l'organisation. \n o Prot\xE9ger le syst\xE8me contre les fuites\
\ d'informations dues aux \xE9manations de signaux \xE9lectromagn\xE9\
tiques."
- urn: urn:intuitem:risk:req_node:ccb-cff-2023-03-01:id.am-4
assessable: false
depth: 3
parent_urn: urn:intuitem:risk:req_node:ccb-cff-2023-03-01:id.am
ref_id: ID.AM-4
description: External information systems are catalogued
translations:
fr:
name: null
description: " Les syst\xE8mes d'information externes sont catalogu\xE9\
s."
annotation: ''
- urn: urn:intuitem:risk:req_node:ccb-cff-2023-03-01:important_id.am-4.1
assessable: true
depth: 4
parent_urn: urn:intuitem:risk:req_node:ccb-cff-2023-03-01:id.am-4
ref_id: IMPORTANT_ID.AM-4.1
description: The organization shall map, document, authorize and when changes
occur, update, all external services and the connections made with them.
annotation: "\u2022\tOutsourcing of systems, software platforms and applications\
\ used within the organization is covered in ID.AM-1 & ID.AM-2\n\u2022\tExternal\
\ information systems are systems or components of systems for which organizations\
\ typically have no direct supervision and authority over the application\
\ of security requirements and controls, or the determination of the effectiveness\
\ of implemented controls on those systems i.e., services that are run in\
\ cloud, SaaS, hosting or other external environments, API (Application Programming\
\ Interface)\u2026\n\u2022\tMapping external services and the connections\
\ made to them and authorizing them in advance avoids wasting unnecessary\
\ resources investigating a supposedly non-authenticated connection to external\
\ systems."
implementation_groups:
- I
- E
translations:
fr:
name: null
description: "L'organisation doit sch\xE9matiser, documenter, autoriser\
\ et, lorsque des changements surviennent, mettre \xE0 jour, tous les\
\ services externes et les connexions \xE9tablies avec eux."
annotation: "\u2022\tOutsourcing of systems, software platforms and applications\
\ used within the organization is covered in ID.AM-1 & ID.AM-2 \n\u2022\
\tExternal information systems are systems or components of systems for\
\ which organizations typically have no direct supervision and authority\
\ over the application of security requirements and controls, or the determination\
\ of the effectiveness of implemented controls on those systems i.e.,\
\ services that are run in cloud, SaaS, hosting or other external environments,\
\ API (Application Programming Interface)\u2026 \n\u2022\tMapping external\
\ services and the connections made to them and authorizing them in advance\
\ avoids wasting unnecessary resources investigating a supposedly non-authenticated\
\ connection to external systems."
- urn: urn:intuitem:risk:req_node:ccb-cff-2023-03-01:id.am-4.2
assessable: true
depth: 4
parent_urn: urn:intuitem:risk:req_node:ccb-cff-2023-03-01:id.am-4
ref_id: ID.AM-4.2
description: The flow of information to/from external systems shall be mapped,
documented, authorized, and update when changes occur.
annotation: Consider requiring external service providers to identify and document
the functions, ports, protocols, and services necessary for the connection
services.
implementation_groups:
- E
translations:
fr:
name: null
description: "Le flux d'informations vers/depuis les syst\xE8mes externes\
\ doit \xEAtre sch\xE9matis\xE9, document\xE9, autoris\xE9 et mis \xE0\
\ jour lorsque des changements surviennent."
annotation: "Envisagez d'exiger des fournisseurs de services externes qu'ils\
\ identifient et documentent les fonctions, ports, protocoles et services\
\ n\xE9cessaires aux services de connexion."
- urn: urn:intuitem:risk:req_node:ccb-cff-2023-03-01:id.am-5
assessable: false
depth: 3
parent_urn: urn:intuitem:risk:req_node:ccb-cff-2023-03-01:id.am
ref_id: ID.AM-5
description: 'Resources (e.g., hardware, devices, data, time, personnel, and
software) are prioritized based on their classification, criticality, and
business value '
translations:
fr:
name: null
description: "Les ressources sont organis\xE9es par ordre de priorit\xE9\
\ en fonction de leur classification, de leur criticit\xE9 et de leur\
\ valeur op\xE9rationnelle."
annotation: ''
- urn: urn:intuitem:risk:req_node:ccb-cff-2023-03-01:basic_id.am-5.1
assessable: true
depth: 4
parent_urn: urn:intuitem:risk:req_node:ccb-cff-2023-03-01:id.am-5
ref_id: BASIC_ID.AM-5.1
description: "The organization\u2019s resources (hardware, devices, data, time,\
\ personnel, information, and software) shall be prioritized based on their\
\ classification, criticality, and business value."
annotation: "\u2022\tDetermine organization\u2019s resources (e.g., hardware,\
\ devices, data, time, personnel, information, and software):\no\tWhat would\
\ happen to my business if these resources were made public, damaged, lost\u2026\
?\no\tWhat would happen to my business when the integrity of resources is\
\ no longer guaranteed?\no\tWhat would happen to my business if I/my customers\
\ couldn\u2019t access these resources? And rank these resources based on\
\ their classification, criticality, and business value.\n\u2022\tResources\
\ should include enterprise assets. \u2022\tCreate a classification for sensitive\
\ information by first determining categories, e.g.\no\tPublic - freely accessible\
\ to all, even externally\no\tInternal - accessible only to members of your\
\ organization\no\tConfidential - accessible only to those whose duties require\
\ access.\n\u2022\tCommunicate these categories and identify what types of\
\ data fall into these categories (HR data, financial data, legal data, personal\
\ data, etc.).\n\u2022\tConsider the use of the Traffic Light Protocol (TLP).\n\
\u2022\tData classification should apply to the three aspects: C-I-A. Consider\
\ implementing an automated tool, such as a host-based Data Loss Prevention\
\ (DLP) tool to identify all sensitive data stored, processed, or transmitted\
\ through enterprise assets, including those located onsite or at a remote\
\ service provider."
implementation_groups:
- B
- I
- E
translations:
fr:
name: null
description: "Les ressources de l'organisation (mat\xE9riel, dispositifs,\
\ donn\xE9es, temps, personnel, informations et logiciels) doivent \xEA\
tre organis\xE9es par ordre de priorit\xE9 en fonction de leur classification,\
\ de leur criticit\xE9 et de leur valeur op\xE9rationnelle."
annotation: "\u2022 D\xE9terminer les ressources de l'organisation (par\
\ exemple, le mat\xE9riel, les dispositifs, les donn\xE9es, le temps,\
\ le personnel, les informations et les logiciels) :\n o Qu'arriverait-il\
\ \xE0 mon organisation si ces ressources \xE9taient rendues publiques,\
\ endommag\xE9es, perdues... ? \n o Qu'arriverait-il \xE0 mon organisation\
\ lorsque l'int\xE9grit\xE9 des ressources ne serait plus garantie ? \n\
\ o Que se passerait-il pour mon organisation si mes clients ou moi-m\xEA\
me ne pouvions pas acc\xE9der \xE0 ces ressources ? Et organisez ces ressources\
\ en fonction de leur classification, de leur criticit\xE9 et de leur\
\ valeur op\xE9rationnelle. \n\u2022 Il convient que les ressources incluent\
\ les actifs de l\u2019organisation. \n\u2022 Cr\xE9ez une classification\
\ pour les informations sensibles en d\xE9terminant d'abord les cat\xE9\
gories, par ex. \n o Public - librement accessible \xE0 tous, m\xEAme\
\ \xE0 l'ext\xE9rieur. o Interne - accessible uniquement aux membres de\
\ votre organisation \n o Confidentiel - accessible uniquement aux personnes\
\ dont les fonctions l'exigent. \n\u2022 Communiquer ces cat\xE9gories\
\ et identifier les types de donn\xE9es qui en font partie (donn\xE9es\
\ RH, donn\xE9es financi\xE8res, donn\xE9es juridiques, donn\xE9es personnelles,\
\ etc.) \n\u2022 Envisager l'utilisation du protocole de feux de circulation\
\ (TLP). \n\u2022 Il convient que la classification des donn\xE9es s'applique\
\ aux trois aspects : C-I-A \n\u2022 Envisagez de mettre en place un outil\
\ automatis\xE9, tel qu'un outil de pr\xE9vention des pertes de donn\xE9\
es (DLP) bas\xE9 sur l'h\xF4te, pour identifier toutes les donn\xE9es\
\ sensibles stock\xE9es, trait\xE9es ou transmises par le biais des actifs\
\ de l\u2019organisation, y compris ceux situ\xE9s sur place ou chez un\
\ fournisseur de services distant."
- urn: urn:intuitem:risk:req_node:ccb-cff-2023-03-01:id.am-6
assessable: false
depth: 3
parent_urn: urn:intuitem:risk:req_node:ccb-cff-2023-03-01:id.am
ref_id: ID.AM-6
description: Cybersecurity roles, responsibilities, and authorities for the
entire workforce and third-party stakeholders are established
translations:
fr:
name: null
description: "Les r\xF4les, responsabilit\xE9s et pouvoirs en mati\xE8re\
\ de cybers\xE9curit\xE9 pour l'ensemble du personnel et les parties prenantes\
\ tierces (par exemple, les fournisseurs, les clients, les partenaires)\
\ sont \xE9tablis."
annotation: ''
- urn: urn:intuitem:risk:req_node:ccb-cff-2023-03-01:important_id.am-6.1
assessable: true
depth: 4
parent_urn: urn:intuitem:risk:req_node:ccb-cff-2023-03-01:id.am-6
ref_id: IMPORTANT_ID.AM-6.1
description: '[KEY MEASURE] Information security and cybersecurity roles, responsibilities
and authorities within the organization shall be documented, reviewed, authorized,
and updated and alignment with organization-internal roles and external partners.'
annotation: "It should be considered to:\n\u2022\tDescribe security roles, responsibilities,\
\ and authorities: who in your organization should be consulted, informed,\
\ and held accountable for all or part of your assets.\n\u2022\tProvide security\
\ roles, responsibilities, and authority for all key functions in information/cyber\
\ security (legal, detection activities\u2026).\n\u2022\tInclude information/cybersecurity\
\ roles and responsibilities for third-party providers (e.g., suppliers, customers,\
\ partners) with physical or logical access to the organization\u2019s ICT/OT\
\ environment."
implementation_groups:
- I
- E
- IK
- EK
translations:
fr:
name: null
description: "[MESURE CL\xC9] Les r\xF4les, les responsabilit\xE9s et les\
\ pouvoirs en mati\xE8re de s\xE9curit\xE9 de l'information et de cybers\xE9\
curit\xE9 au sein de l'organisation sont document\xE9s, examin\xE9s, autoris\xE9\
s et mis \xE0 jour et align\xE9s sur les r\xF4les internes de l'organisation\
\ et les partenaires externes."
annotation: "Il convient d'envisager : \n\u2022 D\xE9crire les r\xF4les,\
\ les responsabilit\xE9s et les autorit\xE9s en mati\xE8re de s\xE9curit\xE9\
\ : qui, dans votre organisation, il convient de consulter, informer et\
\ tenir responsable de tout ou partie de vos actifs. \n\u2022 Fournir\
\ les r\xF4les, les responsabilit\xE9s et l'autorit\xE9 en mati\xE8re\
\ de s\xE9curit\xE9 pour toutes les fonctions cl\xE9s de la s\xE9curit\xE9\
\ de l'information/cyber (juridique, activit\xE9s de d\xE9tection...).\
\ \n\u2022 Inclure les r\xF4les et responsabilit\xE9s en mati\xE8re de\
\ s\xE9curit\xE9 de l'information/cybers\xE9curit\xE9 pour les fournisseurs\
\ tiers ayant un acc\xE8s physique ou logique \xE0 l'environnement TIC/OT\
\ de l'organisation."
- urn: urn:intuitem:risk:req_node:ccb-cff-2023-03-01:id.am-6.2
assessable: true
depth: 4
parent_urn: urn:intuitem:risk:req_node:ccb-cff-2023-03-01:id.am-6
ref_id: ID.AM-6.2
description: The organization shall appoint an information security officer.
annotation: The information security officer should be responsible for monitoring
the implementation of the organization's information/cyber security strategy
and safeguards.
implementation_groups:
- E
translations:
fr:
name: null
description: "L'organisation doit nommer un responsable de la s\xE9curit\xE9\
\ des informations."
annotation: "Il convient que le responsable de la s\xE9curit\xE9 de l'information\
\ soit charg\xE9 de surveiller la mise en \u0153uvre de la strat\xE9gie\
\ de s\xE9curit\xE9 de l'information/cyber et des mesures de protection\
\ de l'organisation."
- urn: urn:intuitem:risk:req_node:ccb-cff-2023-03-01:id.be
assessable: false
depth: 2
parent_urn: urn:intuitem:risk:req_node:ccb-cff-2023-03-01:id
ref_id: ID.BE
name: Business Environment
description: "The organization\u2019s mission, objectives, stakeholders, and\
\ activities are understood and prioritized; this information is used to inform\
\ cybersecurity roles, responsibilities, and risk management decisions."
translations:
fr:
name: "Environnement op\xE9rationnel"
description: "La mission, les objectifs, les parties prenantes et les activit\xE9\
s de l'organisation sont compris et class\xE9s par ordre de priorit\xE9\
\ ; ces informations sont utilis\xE9es pour d\xE9finir les r\xF4les, les\
\ responsabilit\xE9s et les d\xE9cisions en mati\xE8re de gestion des\
\ risques li\xE9s \xE0 la cybers\xE9curit\xE9."
annotation: ''
- urn: urn:intuitem:risk:req_node:ccb-cff-2023-03-01:id.be-1
assessable: false
depth: 3
parent_urn: urn:intuitem:risk:req_node:ccb-cff-2023-03-01:id.be
ref_id: ID.BE-1
description: "The organization\u2019s role in the supply chain is identified\
\ and communicated"
translations:
fr:
name: null
description: "Le r\xF4le de l'organisation dans la cha\xEEne d'approvisionnement\
\ est identifi\xE9 et communiqu\xE9."
annotation: ''
- urn: urn:intuitem:risk:req_node:ccb-cff-2023-03-01:important_id.be-1.1
assessable: true
depth: 4
parent_urn: urn:intuitem:risk:req_node:ccb-cff-2023-03-01:id.be-1
ref_id: IMPORTANT_ID.BE-1.1
description: "The organization\u2019s role in the supply chain shall be identified,\
\ documented, and communicated. "
annotation: "\u2022\tThe organisation should be able to clearly identify who\
\ is upstream and downstream of the organisation and which suppliers provide\
\ services, capabilities, products and items to the organisation.\n\u2022\t\
The organisation should communicate its position to its upstream and downstream\
\ so that it is understood where they sit in terms of critical importance\
\ to the organisation's operations."
implementation_groups:
- I
- E
translations:
fr:
name: null
description: "Le r\xF4le de l'organisation dans la cha\xEEne d'approvisionnement\
\ doit \xEAtre identifi\xE9, document\xE9 et communiqu\xE9."
annotation: "\u2022 Il convient que l'organisation soit en mesure d'identifier\
\ clairement qui se trouve en amont et en aval de l'organisation et quels\
\ fournisseurs lui apportent des services, des capacit\xE9s, des produits\
\ et des articles. \u2022 Il convient que l'organisation communique sa\
\ position \xE0 ses partenaires en amont et en aval afin de comprendre\
\ o\xF9 ils se situent en termes d'importance critique pour les op\xE9\
rations de l'organisation."
- urn: urn:intuitem:risk:req_node:ccb-cff-2023-03-01:id.be-1.2
assessable: true
depth: 4
parent_urn: urn:intuitem:risk:req_node:ccb-cff-2023-03-01:id.be-1
ref_id: ID.BE-1.2
description: The organization shall protect its ICT/OT environment from supply
chain threats by applying security safeguards as part of a documented comprehensive
security strategy.
annotation: No additional guidance on this topic.
implementation_groups:
- E
translations:
fr:
name: null
description: "L'organisation doit prot\xE9ger son environnement TIC/OT des\
\ menaces pesant sur la cha\xEEne d'approvisionnement en appliquant des\
\ mesures de s\xE9curit\xE9 dans le cadre d'une strat\xE9gie de s\xE9\
curit\xE9 globale document\xE9e."
annotation: "Aucune orientation suppl\xE9mentaire sur ce sujet."
- urn: urn:intuitem:risk:req_node:ccb-cff-2023-03-01:id.be-2
assessable: false
depth: 3
parent_urn: urn:intuitem:risk:req_node:ccb-cff-2023-03-01:id.be
ref_id: ID.BE-2
description: "The organization\u2019s place in critical infrastructure and its\
\ industry sector is identified and communicated"
translations:
fr:
name: null
description: "La place de l'organisation dans les infrastructures critiques\
\ et son secteur d'activit\xE9 est identifi\xE9e et communiqu\xE9e."
annotation: ''
- urn: urn:intuitem:risk:req_node:ccb-cff-2023-03-01:important_id.be-2.1
assessable: true
depth: 4
parent_urn: urn:intuitem:risk:req_node:ccb-cff-2023-03-01:id.be-2
ref_id: IMPORTANT_ID.BE-2.1
description: "The organization\u2019s place in critical infrastructure and its\
\ industry sector shall be identified and communicated."
annotation: The organisation covered by NIS legislation has a responsibility
to know the other organisations in the same sector in order to work with them
to achieve the objectives set by NIS for that particular sector.
implementation_groups:
- I
- E
translations:
fr:
name: null
description: "La place de l'organisation dans les infrastructures critiques\
\ et dans son secteur d'activit\xE9 doit \xEAtre identifi\xE9e et communiqu\xE9\
e."
annotation: "L'organisation couverte par la l\xE9gislation NIS a la responsabilit\xE9\
\ de conna\xEEtre les autres organisations du m\xEAme secteur afin de\
\ travailler avec elles pour atteindre les objectifs fix\xE9s par NIS\
\ pour ce secteur particulier."
- urn: urn:intuitem:risk:req_node:ccb-cff-2023-03-01:id.be-3
assessable: false
depth: 3
parent_urn: urn:intuitem:risk:req_node:ccb-cff-2023-03-01:id.be
ref_id: ID.BE-3
description: Priorities for organizational mission, objectives, and activities
are established and communicated
translations:
fr:
name: null
description: "Les priorit\xE9s de la mission, des objectifs et des activit\xE9\
s de l'organisation sont \xE9tablies et communiqu\xE9es."
annotation: null
- urn: urn:intuitem:risk:req_node:ccb-cff-2023-03-01:important_id.be-3.1
assessable: true
depth: 4
parent_urn: urn:intuitem:risk:req_node:ccb-cff-2023-03-01:id.be-3
ref_id: IMPORTANT_ID.BE-3.1
description: Priorities for organizational mission, objectives, and activities
are established and communicated.
annotation: Information protection needs should be determined, and the related
processes revised as necessary.
implementation_groups:
- I
- E
translations:
fr:
name: null
description: "Les priorit\xE9s pour les op\xE9rations, les objectifs et\
\ les activit\xE9s de l'organisation doivent \xEAtre \xE9tablies et communiqu\xE9\
es."
annotation: "Il convient que les besoins en mati\xE8re de protection de\
\ l'information soient d\xE9termin\xE9s, et les processus connexes r\xE9\
vis\xE9s si n\xE9cessaire, jusqu'\xE0 l'obtention d'un ensemble r\xE9\
alisable."
- urn: urn:intuitem:risk:req_node:ccb-cff-2023-03-01:id.be-4
assessable: false
depth: 3
parent_urn: urn:intuitem:risk:req_node:ccb-cff-2023-03-01:id.be
ref_id: ID.BE-4
description: Dependencies and critical functions for delivery of critical services
are established
translations:
fr:
name: null
description: "Les d\xE9pendances et les fonctions critiques pour la prestation\
\ des services critiques sont \xE9tablies."
annotation: ''
- urn: urn:intuitem:risk:req_node:ccb-cff-2023-03-01:important_id.be-4.1
assessable: true
depth: 4
parent_urn: urn:intuitem:risk:req_node:ccb-cff-2023-03-01:id.be-4
ref_id: IMPORTANT_ID.BE-4.1
description: Dependencies and mission-critical functions for the delivery of
critical services shall be identified, documented, and prioritized according
to their criticality as part of the risk assessment process.
annotation: Dependencies and business critical functions should include support
services.
implementation_groups:
- I
- E
translations:
fr:
name: null