DCH-05.8 ยท Identity Association Techniques & Technologies

Control Description

Mechanisms exist to associate cybersecurity and data protection attributes to information.

Control Question
Assessment question for control validation

Does the organization associate cybersecurity and data protection attributes to information?

Control Weighting
2
Validation Cadence
Annual
NIST CSF Function
Protect
Supply Chain Risk Management (SCRM) Tiers
Applicable SCRM tier levels for this control
Tier 2 - Operational
Tier 3 - Tactical
Errata & Additional Notes

- wordsmithed control