RA-09 Criticality Analysis

Risk Assessment

Moderate High New in Rev 5

Description

Identify critical system components and functions by performing a criticality analysis for [Assignment: organization-defined parameters] at [Assignment: organization-defined parameters].

Supplemental Guidance

Not all system components, functions, or services necessarily require significant protections. For example, criticality analysis is a key tenet of supply chain risk management and informs the prioritization of protection activities. The identification of critical system components and functions considers applicable laws, executive orders, regulations, directives, policies, standards, system functionality requirements, system and component interfaces, and system and component dependencies. Systems engineers conduct a functional decomposition of a system to identify mission-critical functions and components. The functional decomposition includes the identification of organizational missions supported by the system, decomposition into the specific functions to perform those missions, and traceability to the hardware, software, and firmware components that implement those functions, including when the functions are shared by many components within and external to the system. The operational environment of a system or a system component may impact the criticality, including the connections to and dependencies on cyber-physical systems, devices, system-of-systems, and outsourced IT services. System components that allow unmediated access to critical system components or functions are considered critical due to the inherent vulnerabilities that such components create. Component and function criticality are assessed in terms of the impact of a component or function failure on the organizational missions that are supported by the system that contains the components and functions. Criticality analysis is performed when an architecture or design is being developed, modified, or upgraded. If such analysis is performed early in the system development life cycle, organizations may be able to modify the system design to reduce the critical nature of these components and functions, such as by adding redundancy or alternate paths into the system design. Criticality analysis can also influence the protection measures required by development contractors. In addition to criticality analysis for systems, system components, and system services, criticality analysis of information is an important consideration. Such analysis is conducted as part of security categorization in RA-02.

Changes from Rev 4

New control in Rev 5.

Compliance Mappings

ISO 27001:2022

8.2

COBIT 2019

APO12EDM03

SOC 2 TSC

CC3.1CC9.1

CSA CCM v4

BCR-02

CSA AICM v1

BCR-02

ISO 42001:2023

A.5.2

IEC 62443

2-1 4.3

NIS2 Directive

Art. 21(2)(f)

PRA Operational Resilience

SS1/21-3.1SS1/21-5.2SS1/21-9.1SS2/21-4.1

MAS TRM

134

ANSSI

Hygiene.36Hygiene.41RGS.3.1SecNumCloud.7.2

FINMA Circular 2023/1

IV.A(42)IV.B.c(54)IV.B.c(55)IV.B.d(58)IV.E(88)IV.E(94)IV.E(95)IV.E(96)V(101)

OSFI B-13

B-13.1.3B-13.3.1B-13.3.5

EU DORA

Art.11(2)Art.11(3)Art.29(1)Art.30(3)Art.6(2)Art.8(4)

RBI CSF

Annex1.1ITGRCA.9

FISC Security Guidelines

FISC.O1

LGPD + BCB 4893

BCB.Art.12BCB.Art.3-SuppBCB.Art.5-Supp

HKMA TM-E-1

TME1.12.1TME1.12.5TME1.2.3TME1.6.1TME1.6.2

DNB Good Practice

DNB.4.2

SAMA CSF

1.82.1

NCA ECC

1-52-1

UAE IA

T2

CBB TM

TM-14TM-15TM-4

Qatar NIA

RM

CBUAE

CR-10CR-2

CBE CSF

CRM-1CRM-2OVM-3

SA JS2

JS2-6.1JS2-6.2JS2-7.7

CBN CSF

Part2.1Part2.3Part3.1Part5.1

BoG CISD

CISD-III

BoM CTRM

1.42.13.74.3

IOSCO Cyber Resilience

ID-1ID-2RR-2

BCBS 239

Principle 4Principle 8

CPMI-IOSCO PFMI

CG.IDPFMI.P3

FFIEC IS

II.AII.BII.C.5

NYDFS 500

500.9

HIPAA Security Rule

§164.308(a)(1)(ii)(A)§164.308(a)(7)(ii)(E)

ECB CROE

CROE.2.2.1CROE.2.2.2

EBA ICT Guidelines

3.3.23.3.33.7.1

SEBI CSCRF

DE.VAGV.OCGV.RMID.AMID.RAVAPT

BOT Cyber Resilience

Ch1.2Ch2.1Ch3.2

CMMC 2.0

RA

10 CFR 73.54

RG5.71-C-PL

DOE C2M2 v2.1

THREAT

API 1164

Sec 4

AWIA

Sec 2013(a)

IAEA NSS 17-T

Sec 4

CBEST

CBEST.3

ISAE 3402

Clause 3

Solvency II

Art.44(1)Art.45Art.49(2)EIOPA-Cloud-GL3EIOPA-ICT-4.2EIOPA-ICT-4.3

Lloyd's Minimum Standards

MS10.2MS9.1MS9.3

NAIC Insurance Data Security

4A

PRA SS1/23

P1.1P1.2

FCA SYSC 13

SYSC 13.5.2

HITRUST CSF v11

00.b03.a07.a12.a

FDA Cybersecurity Guidance

CRA-2SPDF-2

NHS DSPT

NDG-5.3NDG-8.3

MiCA

Art.35(1)