Under active development Content is continuously updated and improved

PR.DS-01The confidentiality, integrity, and availability of data-at-rest are protected

>Control Description

This data security subcategory ensures that the confidentiality, integrity, and availability of data-at-rest are protected. Key activities include: Use encryption, digital signatures, and cryptographic hashes to protect the confidentiality and integrity of stored data in files, databases, virtu...; Use full disk encryption to protect data stored on user endpoints; Confirm the integrity of software by validating signatures.

>Cross-Framework Mappings

>Informative References

Official NIST mappings to external frameworks and standards. Source: NIST CSF 2.0

CCMv4.0

BCR-08
CEK-03
CEK-04
CEK-18
CEK-19
DCS-04
DSP-17
HRS-04
+4 more

CIS Controls v8.0

3.11

CIS Controls v8.1

3.11

CRI Profile v2.0

PR.DS-01
PR.DS-01.01
PR.DS-01.02
PR.DS-01.03

CSF v1.1

PR.DS-1
PR.DS-5
PR.DS-6
PR.PT-2

ISO/IEC 27001:2022

Mandatory Clause: 4.2(b)
Mandatory Clause: 5.2
Annex A Controls: 5.1
Annex A Controls: 5.3
Annex A Controls: 5.10
Annex A Controls: 5.13
Annex A Controls: 5.14
Annex A Controls: 5.15
+14 more

NICE Framework

DD-WRL-003
DD-WRL-004
DD-WRL-007
IO-WRL-002
IO-WRL-005
IO-WRL-006
PD-WRL-001

PCI DSS

3.5.1
3.6.1
3.6.1.1
3.6.1.2
3.6.1.3
3.6.1.4
3.5.1.3
3.3.1
+2 more

SCF

DCH-01
CRY-01
CRY-01.1
CRY-05

SP 800-171 Rev 3

03.08.09
03.12.05
03.13.01
03.13.04
03.13.06
03.13.08
03.13.10
03.13.11
+2 more

SP 800-218

PS.1.1
PS.2.1
PS.3.1

SP 800-53 Rev 5.1.1

CA-03
CP-09
MP-08
SC-04
SC-07
SC-12
SC-13
SC-28
+6 more

SP 800-53 Rev 5.2.0

CA-03
CP-09
MP-08
SC-04
SC-07
SC-12
SC-13
SC-28
+6 more

Ask AI

Configure your API key to use AI features.