Date Published: August 17, 2023
Comments Due: October 6, 2023
Email Comments to:
mapping@nist.gov
Understanding how the elements of diverse sources of cybersecurity and privacy content are related to each other is an ongoing challenge for people in nearly every organization. This document explains NIST’s proposed approach for identifying and documenting relationships between concepts such as controls, requirements, recommendations, outcomes, technologies, functions, processes, techniques, roles, and skills.
NIST intends for the approach to be used for mapping relationships involving NIST cybersecurity and privacy publications that will be submitted to NIST’s National Online Informative References (OLIR) Program for hosting in NIST’s online Cybersecurity and Privacy Reference Tool (CPRT). This will include mapping the equivalent of the NIST Cybersecurity Framework’s (CSF) 1.1 Informative References in support of CSF 2.0.
By following this approach, NIST and others in the cybersecurity and privacy standards community can jointly establish a single concept system over time that links cybersecurity and privacy concepts from many sources into a cohesive, consistent set of relationship mappings. The mappings can then be used by different audiences to better describe the interrelated aspects of the global cybersecurity and privacy corpus.
The public comment period for this draft is open through October 6, 2023. Submit your comments to mapping@nist.gov.
None selected
Publication:
https://doi.org/10.6028/NIST.IR.8477.ipd
Download URL
Supplemental Material:
None available
Document History:
08/17/23: IR 8477 (Draft)
controls, general security & privacy, security programs & operations
Applications Laws and Regulations