PR.IR-01—Networks and environments are protected from unauthorized logical access and usage
>Control Description
This technology infrastructure resilience subcategory ensures that networks and environments are protected from unauthorized logical access and usage. Key activities include: Logically segment organization networks and cloud-based platforms according to trust boundaries and platform types (e; Logically segment organization networks from external networks, and permit only necessary communications to enter the organization’s networks from ...; Implement zero trust architectures to restrict network access to each resource to the minimum necessary.
>Cross-Framework Mappings
NIST SP 800-53 r5
via NIST CSF 2.0 Concept CrosswalkPCI DSS v4.0.1
via NIST OLIR Catalog>Informative References
Official NIST mappings to external frameworks and standards. Source: NIST CSF 2.0
CCMv4.0
AIS-04
AIS-06
DCS-12
DSP-10
DSP-15
IVS-03
IVS-05
IVS-06
+3 more
CIS Controls v8.0
3.12
12.2
CIS Controls v8.1
3.12
12.2
CRI Profile v2.0
PR.IR-01
PR.IR-01.01
PR.IR-01.02
PR.IR-01.03
PR.IR-01.04
PR.IR-01.05
PR.IR-01.06
PR.IR-01.07
+1 more
CSF v1.1
PR.AC-3
PR.AC-5
PR.DS-7
PR.PT-4
ISO/IEC 27001:2022
Mandatory Clause: None
Annex A Controls: 8.20
Annex A Controls: 8.21
Annex A Controls: 8.22
NICE Framework
DD-WRL-001
DD-WRL-002
DD-WRL-004
DD-WRL-006
DD-WRL-009
IO-WRL-004
OG-WRL-001
OG-WRL-014
PCI DSS
1.2.3
1.2.4
10.2.1
5.2.1
5.2.2
5.2.3
5.2.3.1
11.2.1
SCF
NET-01
SEA-01
SEA-02
SP 800-171 Rev 3
03.01.02
03.01.03
03.13.01
03.13.04
03.13.06
SP 800-218
PO.5.1
SP 800-53 Rev 5.1.1
AC-03
AC-04
SC-04
SC-05
SC-07
SP 800-53 Rev 5.2.0
AC-03
AC-04
SC-04
SC-05
SC-07
Ask AI
Configure your API key to use AI features.