RA-02 Security Categorization

Risk Assessment

Low Moderate High

Description

The organization categorizes the information system and the information processed, stored, or transmitted by the system in accordance with applicable laws, Executive Orders, directives, policies, regulations, standards, and guidance and documents the results (including supporting rationale) in the system security plan. Designated senior-level officials within the organization review and approve the security categorizations.

Supplemental Guidance

The applicable federal standard for security categorization of nonnational security information and information systems is FIPS 199. The organization conducts FIPS 199 security categorizations as an organization-wide activity with the involvement of the chief information officer, senior agency information security officer, information system owners, and information owners. The organization also considers potential impacts to other organizations and, in accordance with the USA PATRIOT Act of 2001 and Homeland Security Presidential Directives, potential national-level impacts in categorizing the information system. As part of a defense-in-depth protection strategy, the organization considers partitioning higher-impact information systems into separate physical domains (or environments) and restricting or prohibiting network access in accordance with an organizational assessment of risk. NIST Special Publication 800-60 provides guidance on determining the security categories of the information types resident on the information system. Related security controls: MP-04, SC-07.

Changes from Rev 4

Control text modifies categorization requirement to include information processed, stored, and transmitted Discussion expanded to explain benefits

Enhancements

(0) None.

Compliance Mappings

ISO 27001:2022

6.1A.5.12A.5.13

ISO 27002:2022

5.125.13

COBIT 2019

APO12APO14

CIS Controls v8

CIS 15.3CIS 3CIS 3.2CIS 3.7

NIST CSF 2.0

GV.RM-06ID.AM-05ID.AM-07ID.RA-04

SOC 2 TSC

CC3.2

PCI DSS v4.0.1

12.3

CSA CCM v4

DCS-05DSP-04

CSA AICM v1

DCS-05DSP-04

FINOS CCC

CCC-C16

ISO 42001:2023

A.5.2

IEC 62443

2-1 4.3

PRA Operational Resilience

PS6/21-2.1

APRA CPS 234

Para 21

ANSSI

Hygiene.41Hygiene.8SecNumCloud.9.1

FINMA Circular 2023/1

IV.B.c(54)IV.B.c(55)IV.D(78)

OSFI B-13

B-13.1.3B-13.3.1

EU GDPR

Art.30(1)Art.35(7)(a)

EU DORA

Art.8(1)Art.8(4)

BIO2

5.125.13

RBI CSF

Annex1.1ITGRCA.9

FISC Security Guidelines

FISC.O9

LGPD + BCB 4893

BCB.Art.5-Supp

HKMA TM-E-1

TME1.7.2

MLPS 2.0

8.1.9.1

DNB Good Practice

DNB.2.2DNB.4.1DNB.6.1

SAMA CSF

1.82.1

NCA ECC

1-52-12-7

UAE IA

T2T4

CBB TM

TM-4TM-9

Qatar NIA

AMRM

CBUAE

CR-2

CBE CSF

CRM-1CRM-2

SA JS2

JS2-6.1JS2-6.2

CBN CSF

Part2.1Part3.1

BoG CISD

CISD-III

POPIA

s17

BoM CTRM

1.42.1

IOSCO Cyber Resilience

ID-1ID-3ID-4

BCBS 239

Principle 4Principle 8

CPMI-IOSCO PFMI

CG.IDPFMI.P3

FFIEC IS

II.AII.BII.C.5

NYDFS 500

500.9

HIPAA Security Rule

§164.308(a)(1)(i)§164.308(a)(1)(ii)(A)§164.308(a)(7)(ii)(E)

ECB CROE

CROE.2.2.1CROE.2.2.2

EBA ICT Guidelines

3.3.23.3.3

SEBI CSCRF

CLASSIFYID.AMID.RA

BOT Cyber Resilience

Ch1.2

CMMC 2.0

RA

NERC CIP

CIP-002-7

10 CFR 73.54

73.54(a)RG5.71-C-PL

DOE C2M2 v2.1

THREATRISK

API 1164

Sec 4

AWIA

Sec 2013(a)AWWA Sec 2

IAEA NSS 17-T

Sec 4

CBEST

CBEST.3

ISAE 3402

Clause 1Clause 3

Solvency II

Art.44(2)DR.266-DataSecEIOPA-ICT-4.3

Lloyd's Minimum Standards

MS10.2

NAIC Insurance Data Security

34A

PRA SS1/23

P1.1P1.2

FCA SYSC 13

SYSC 13.5.2

HITRUST CSF v11

00.b03.a07.a07.b

FDA 21 CFR Part 11

§11.1§11.2

FDA Cybersecurity Guidance

SPDF-2

ISO 27799

5.38.18.2

NHS DSPT

NDG-5.3

MiCA

Art.35(1)

Basel SCO60

SCO60.1SCO60.2SCO60.4

BSSC Standards

GSP-02

SEC Custody (Digital Assets)

SEC-CD-09

ISO 17799 (legacy)

7.2.1

COBIT 4.1 (legacy)

PO9.2