PL-10 Baseline Selection

Planning

Low Moderate High New in Rev 5

Description

Select a control baseline for the system.

Supplemental Guidance

Control baselines are predefined sets of controls specifically assembled to address the protection needs of a group, organization, or community of interest. Controls are chosen for baselines to either satisfy mandates imposed by laws, executive orders, directives, regulations, policies, standards, and guidelines or address threats common to all users of the baseline under the assumptions specific to the baseline. Baselines represent a starting point for the protection of individuals’ privacy, information, and information systems with subsequent tailoring actions to manage risk in accordance with mission, business, or other constraints (see PL-11 ). Federal control baselines are provided in [SP 800-53B](#46d9e201-840e-440e-987c-2c773333c752) . The selection of a control baseline is determined by the needs of stakeholders. Stakeholder needs consider mission and business requirements as well as mandates imposed by applicable laws, executive orders, directives, policies, regulations, standards, and guidelines. For example, the control baselines in [SP 800-53B](#46d9e201-840e-440e-987c-2c773333c752) are based on the requirements from [FISMA](#0c67b2a9-bede-43d2-b86d-5f35b8be36e9) and [PRIVACT](#18e71fec-c6fd-475a-925a-5d8495cf8455) . The requirements, along with the NIST standards and guidelines implementing the legislation, direct organizations to select one of the control baselines after the reviewing the information types and the information that is processed, stored, and transmitted on the system; analyzing the potential adverse impact of the loss or compromise of the information or system on the organization’s operations and assets, individuals, other organizations, or the Nation; and considering the results from system and organizational risk assessments. [CNSSI 1253](#4e4fbc93-333d-45e6-a875-de36b878b6b9) provides guidance on control baselines for national security systems.

Changes from Rev 4

New control in Rev 5.

Compliance Mappings

ISO 27001:2022

4.36.16.1.38.1

COBIT 2019

APO13EDM01

PCI DSS v4.0.1

2.12.2

FINOS CCC

CCC-C14

IEC 62443

3-3 SR 7.6

NIS2 Directive

Art. 21(2)(a)

PRA Operational Resilience

PS6/21-2.1

APRA CPS 234

Para 15

BSI IT-Grundschutz

ISMS.1

ANSSI

Hygiene.36

FINMA Circular 2023/1

IV.A(23)IV.A(25)

OSFI B-13

B-13.1.2

EU GDPR

Art.24(1)

EU DORA

Art.24(2)Art.6(1)

RBI CSF

Annex1.5

FISC Security Guidelines

FISC.T1

LGPD + BCB 4893

BCB.Art.3-Supp

HKMA TM-E-1

TME1.2.3

UAE IA

T1T2

CBB TM

TM-4

Qatar NIA

GVRM

CBUAE

CR-2

CBE CSF

CRM-1GOV-1

SA JS2

JS2-5

CBN CSF

Part1.3Part2.1

BoG CISD

CISD-III

BoM CTRM

1.43.1

IOSCO Cyber Resilience

GOV-3PFMI-3

HIPAA Security Rule

§164.308(a)(1)(ii)(B)

EBA ICT Guidelines

3.13.3.13.3.4

Solvency II

Art.44(1)EIOPA-ICT-4.2

NAIC Insurance Data Security

9

PRA SS1/23

P5.1

HITRUST CSF v11

00.a

NHS DSPT

NDG-9.1