Back

Use an active asset inventory discovery tool to identify sensitive information for data flow diagrams.


CONTROL ID
13737
CONTROL TYPE
Process or Activity
CLASSIFICATION
Detective

SUPPORTING AND SUPPORTED CONTROLS




This Control directly supports the implied Control(s):
  • Maintain up-to-date data flow diagrams., CC ID: 10059

There are no implementation support Controls.


SELECTED AUTHORITY DOCUMENTS COMPLIED WITH




  • Utilize an active discovery tool to identify all sensitive information stored, processed, or transmitted by the organization's technology systems, including those located on-site or at a remote service provider, and update the organization's sensitive information inventory. (CIS Control 14: Sub-Control 14.5 Utilize an Active Discovery Tool to Identify Sensitive Data, CIS Controls, 7.1)
  • Utilize an active discovery tool to identify all sensitive information stored, processed, or transmitted by the organization's technology systems, including those located on-site or at a remote service provider, and update the organization's sensitive information inventory. (CIS Control 14: Sub-Control 14.5 Utilize an Active Discovery Tool to Identify Sensitive Data, CIS Controls, V7)
  • Conduct network scouting and vulnerability analyses of systems within a network. (T0616, National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework, NIST Special Publication 800-181)
  • Conduct network scouting and vulnerability analyses of systems within a network. (T0616, Reference Spreadsheet for the Workforce Framework for Cybersecurity (NICE Framework)”, July 7, 2020)