PL-11 Baseline Tailoring

Planning

Low Moderate High New in Rev 5

Description

Tailor the selected control baseline by applying specified tailoring actions.

Supplemental Guidance

The concept of tailoring allows organizations to specialize or customize a set of baseline controls by applying a defined set of tailoring actions. Tailoring actions facilitate such specialization and customization by allowing organizations to develop security and privacy plans that reflect their specific mission and business functions, the environments where their systems operate, the threats and vulnerabilities that can affect their systems, and any other conditions or situations that can impact their mission or business success. Tailoring guidance is provided in [SP 800-53B](#46d9e201-840e-440e-987c-2c773333c752) . Tailoring a control baseline is accomplished by identifying and designating common controls, applying scoping considerations, selecting compensating controls, assigning values to control parameters, supplementing the control baseline with additional controls as needed, and providing information for control implementation. The general tailoring actions in [SP 800-53B](#46d9e201-840e-440e-987c-2c773333c752) can be supplemented with additional actions based on the needs of organizations. Tailoring actions can be applied to the baselines in [SP 800-53B](#46d9e201-840e-440e-987c-2c773333c752) in accordance with the security and privacy requirements from [FISMA](#0c67b2a9-bede-43d2-b86d-5f35b8be36e9), [PRIVACT](#18e71fec-c6fd-475a-925a-5d8495cf8455) , and [OMB A-130](#27847491-5ce1-4f6a-a1e4-9e483782f0ef) . Alternatively, other communities of interest adopting different control baselines can apply the tailoring actions in [SP 800-53B](#46d9e201-840e-440e-987c-2c773333c752) to specialize or customize the controls that represent the specific needs and concerns of those entities.

Changes from Rev 4

New control in Rev 5.

Compliance Mappings

ISO 27001:2022

6.16.1.38.1

COBIT 2019

APO13

PCI DSS v4.0.1

2.12.2

FINOS CCC

CCC-C14

IEC 62443

3-3 SR 7.6

NIS2 Directive

Art. 21(2)(a)

PRA Operational Resilience

PS6/21-2.1

BSI IT-Grundschutz

ISMS.1

ANSSI

Hygiene.36

FINMA Circular 2023/1

IV.A(23)IV.A(25)

OSFI B-13

B-13.1.2

EU DORA

Art.24(2)Art.6(1)

RBI CSF

Annex1.5

FISC Security Guidelines

FISC.T1

LGPD + BCB 4893

BCB.Art.3-Supp

HKMA TM-E-1

TME1.2.3

UAE IA

T1T2

CBB TM

TM-4

Qatar NIA

GV

CBUAE

CR-2

CBE CSF

CRM-1GOV-1

SA JS2

JS2-5

CBN CSF

Part1.3Part2.1

BoG CISD

CISD-III

BoM CTRM

1.43.1

IOSCO Cyber Resilience

GOV-3PFMI-3

HIPAA Security Rule

ยง164.308(a)(1)(ii)(B)

EBA ICT Guidelines

3.13.3.13.3.4

Solvency II

Art.44(1)EIOPA-ICT-4.2

PRA SS1/23

P5.1

HITRUST CSF v11

00.a

NHS DSPT

NDG-9.1