The following is a list of example evidence for controls not monitored in Drata for NIST CSF 2.0.
Note: The examples below are illustrative only. An auditor may request additional or alternative forms of evidence based on your scope, risk posture, and implementation details.
This article covers NIST CSF 2.0 controls mapped in Drata that are not automatically monitored today, some evidence may be document-based while other evidence may be provided through screenshots, exports, or auditor observation depending on the control.
DCF Code | DCF Name | Example Evidence |
DCF-5 | Change Review Process | Upload evidence showing code changes are peer-reviewed and approved by an individual different from the developer prior to deployment to production.
Example: branch protection or repository ruleset settings showing pull request or merge request requirements, required reviewer approvals, restrictions on direct merges to protected branches, and other controls enforcing segregation of duties for production code changes.
|
DCF-6 | Production Changes Restricted | Upload evidence showing users with access to deploy changes to production.
Example: Users with administrator access to a production server, users that can trigger deployments in CI/CD tools, code owners in the production repositories, etc. Auditors will generally request evidence of the final "gatekeepers" for production deployments.
|
DCF-7 | Separate Environments | Upload evidence showing separate environments exist for development, testing, staging, and production, as applicable.
Example: Screenshots of web environments showing different URLs; screenshots showing separate infrastructure such as different servers, databases, or networks for production and lower environments, etc. |
DCF-8 | External Communication Channels | Upload evidence of external communication channels available to customers and third parties to report complaints, failures, bugs, incidents, vulnerabilities, or requests for information. Example: screenshots of a customer support portal, help desk page, external ticketing system, responsible disclosure page, or embedded support feature in the product.
Example: Screenshots of customer support portal, help desk page, embedded communication features in web application, etc. |
DCF-9 | Internal Communication Channels | Upload examples of internal communication channels for employees to report failures, events, incidents, concerns, and other issues.
Example: Screenshot of internal channels dedicated to security event reporting in messaging apps (Slack, MS Teams, etc.), whistleblower channels, etc. |
DCF-11 | Periodic Access Reviews | Upload documentation of the most recent access review showing review of user accounts and assigned privileges, including third-party or vendor accounts and physical access where applicable.
Example: screenshots or exports of user lists and permissions reviewed, evidence of reviewer approval, documentation of any changes identified, and evidence those changes were implemented.
|
DCF-12 | Baseline Configuration and Hardening Standards | Upload evidence of your documented baseline security configuration and hardening standards for all system components, aligned to industry-accepted hardening standards or vendor recommendations, and evidence that these standards are implemented.
Example: baseline configuration standards, hardening checklists, CIS Benchmarks, vendor configuration guidance, infrastructure-as-code configurations, and evidence the standards are reviewed periodically and updated as needed.
|
DCF-14 | Organizational Chart | Upload your current organizational chart.
Example: screenshot or export from your HRMS, people directory, or internal org chart showing personnel, job titles, departments, and reporting lines. |
DCF-16 | Periodic Risk Assessment | Upload documentation of the most recent risk assessment performed in accordance with company policy and compliance requirements. Example: risk assessment report or risk register showing identified risks, associated threats and vulnerabilities, likelihood and impact ratings, assigned risk owners, and documented results |
DCF-17 | Risk Treatment Plan | Upload the documented risk treatment plan for risks identified through risk assessment activities.
Example: risk treatment plan or risk register showing the selected treatment option for each risk, planned remediation actions, assigned owners, target dates, and status tracking. |
DCF-19 | Penetration Tests | Upload evidence of the most recent external penetration test of production environments performed by an independent third party.
Example: the penetration test report showing scope and results, evidence of management review, and documentation showing vulnerabilities are tracked to resolution in accordance with company policy.
|
DCF-20 | Asset Inventory | Upload evidence of your centralized asset inventory for physical, cloud, and other in-scope assets.
Example: an asset register or CMDB showing asset owner, description, location, classification, and other relevant attributes by asset type, along with evidence that the inventory is kept current through manual review or automated discovery/update processes. |
DCF-22 | Network Diagram | Upload your current network diagram documenting system boundaries and connections to external networks. Include evidence that the diagram was reviewed and approved by management within the past year and updated as needed when changes occurred.
Example: the current network diagram plus approval records, review signoff, change tickets, or emails confirming the diagram’s accuracy and completeness.
|
DCF-26 | Business Continuity Plan/Disaster Recovery Test | Upload evidence of the most recent business continuity and/or disaster recovery test performed within the past year.
Example: the test plan or exercise documentation, participants, activities performed, results, lessons learned, and evidence that the business continuity and/or disaster recovery plans were updated as necessary based on the outcome of the test.
|
DCF-28, | Security Events Tracked and Evaluated | Upload evidence for a recent security event or incident showing it was evaluated, categorized, documented, tracked, and resolved in accordance with company policies and procedures.
Example: an incident ticket or case record showing incident priority, categorization, escalation, status tracking, containment and remediation steps, communications, and closure.
|
DCF-30 | Incident Response Lessons Learned Documented | Upload the post-mortem review for a recent incident.
Example: a completed incident review showing incident metadata, root-cause analysis, supporting evidence, summary of containment, eradication, and recovery actions, timelines, incident metrics, internal and external communications as applicable, impact and scope, and lessons learned.
|
DCF-29 | Incident Response Team | Upload documentation identifying the incident response team roles and responsibilities.
Example: incident response plan, team charter, or responsibility matrix showing who is responsible for invoking the incident management process, serving as incident lead, handling incidents, coordinating communications, providing technical guidance, and providing legal or compliance support, as applicable.
|
DCF-38 | Performance Evaluations | Upload evidence of a completed performance evaluation for eligible personnel performed within the past year in accordance with company policies and procedures.
Example: a completed performance review showing evaluation against established goals and objectives, reviewer signoff or approval, and supporting documentation for the evaluation process. Consider redacting sensitive information such as employee names, compensation details, or other confidential personnel information.
|
DCF-42 | DefinedRoles and Responsibilities | Upload documentation showing defined roles and responsibilities for implementation and oversight of the organization’s risk management and compliance programs.
Example: roles and responsibilities section of a governance, security, privacy, or compliance policy; RACI matrix; program charter; committee charter; or other document identifying responsible roles and oversight responsibilities.
|
DCF-46 | Formal Screening Process | Upload evidence of the formal screening process for a recently hired employee or contractor.
Example: applicant tracking system record, interview schedule and interviewer feedback, resume review, verification of academic or professional qualifications, identity verification, reference checks, technical assessment results, and documented hiring evaluation or approval.
|
DCF-47 | Job Descriptions | Upload documented job descriptions for applicable company positions. Example: job descriptions showing the role title, core responsibilities, reporting structure, and the required qualifications, skills, and experience for the role.
|
DCF-56 | Vendor Register and Agreements | Upload evidence of a centralized, up-to-date vendor or third-party register that includes vendor name, relationship owner, description of services, assigned risk rating, and results of vendor or third-party risk management activities. Also provide, upon request for a selected sample, an executed agreement with a vendor or service provider involved in accessing, processing, storing, or managing information assets that outlines the responsibilities of the vendor or service provider. . |
DCF-57 | Vendor Compliance Monitoring | Upload evidence showing that compliance reports or other security/compliance evidence for critical vendors and service providers are obtained and reviewed at least annually.
Example: SOC 2 Type II reports, ISO 27001 certificates, PCI DSS attestations, completed security questionnaires, or equivalent assessment documentation, along with documented review notes, identified gaps, and any resulting action items or follow-up activities.
|
DCF-59 | Privileged Access Restricted | Upload screenshots or exports of user lists showing users with administrative or privileged access for relevant systems.
Example: privileged user listings for cloud infrastructure, code repositories, identity provider, password vault systems, VPN systems, databases, and other in-scope systems, including the roles or permissions assigned. |
DCF-62 | Session Termination | Upload evidence showing the system automatically terminates user sessions based on predefined conditions.
Example: screenshots or screen recordings showing a user is logged out after a defined period of inactivity and logged out when the browser or application session is closed, with reauthentication required to regain access. |
DCF-64 | Commitments Communicated to Customers | Upload evidence showing service commitments and system requirements are communicated to customers and other external parties, as appropriate.
Example: customer contracts, order forms, service descriptions, trust center or website content, implementation guides, or other customer-facing documentation, along with evidence that relevant parties are notified when service commitments or system requirements change. |
DCF-67 | Multi-Factor Authentication | Upload screenshots of the multi-factor authentication configurations for relevant systems where MFA is not integrated with Drata. If MFA is enforced on a per-user basis instead of as a global setting, upload evidence showing all users have MFA enabled.
Example: screenshots or exports from the relevant systems showing MFA settings, enforcement configuration, or user-level MFA status.
|
DCF-68 | Password Policy and Configuration | Upload your documented password policy and evidence of password requirements enforced for relevant systems in accordance with company policy.
Example: password policy defining minimum length, complexity, and related requirements, along with screenshots or exports from relevant systems showing those password settings are configured and enforced.
|
DCF-69 | Access Provisioning | Upload evidence of a recent access request showing access to information resources was documented and approved by management before provisioning.
Example: access request form, IAM workflow, or help desk ticket for a new hire, role change, or access modification showing the requested systems or data, requested access level, business justification, approver, approval date, and completed provisioning record. Include physical access requests as applicable. |
DCF-70 | Access Deprovisioning
| Upload evidence for a recently terminated employee, contractor, vendor, or other personnel showing system and physical access were revoked within one business day of the effective termination date.
Example: offboarding checklist, IAM or help desk ticket, account disabled logs, badge or physical access revocation records, and evidence of completion dates for each deprovisioning step. |
DCF-76 | Critical Change Management | Upload evidence for a recent emergency change or hot fix implemented outside the standard change management process.
Example: emergency change ticket or incident-linked change record showing the reason for the emergency change, implementation details, date of implementation, post-implementation review, and approval by an authorized individual after implementation.
|
DCF-77 | Data Backups | Upload evidence showing backups of production data are performed at least daily and retained in accordance with company policies and procedures.
Example: screenshots or exports from backup systems showing backup schedules, successful backup job history, and configured retention periods for production data. |
DCF-79 | Logging System | Upload evidence of your centralized logging system that collects and stores system activity logs and sends alerts to personnel based on pre-configured rules.
Example: screenshots or exports showing log sources feeding into the SIEM or log management platform, sample alert rules and resulting notifications, and access control settings showing access to logs is restricted to authorized personnel. |
DCF-85 | Network Security Controls | Upload evidence of network security controls for in-scope environments.
Example: screenshots or exports of firewall rules, security groups, network ACLs, or equivalent configurations showing inbound and outbound traffic is limited to only what is necessary based on business justification and all other traffic is explicitly denied.
|
DCF-86 | System Monitoring | Upload evidence showing production systems and resources are monitored and automated alerts are sent to personnel based on pre-configured rules.
Example: screenshots from monitoring or observability tools showing system availability or health monitoring, alert rules or notification configurations, sample alerts, and documentation or tickets showing events are triaged and escalated in accordance with company policy when necessary.
|
DCF-88 | Web Application Firewall (WAF) | Upload evidence that a web application firewall is in place to protect public-facing web applications from outside threats.
Example: screenshots or exports showing the WAF is enabled for public-facing applications, the applications or domains protected by the WAF, active rule sets or protection policies, and alerting or event logs showing the WAF is operating.
|
DCF-91 | Intrusion Detection/Prevention System | Upload evidence that an intrusion detection system (IDS), intrusion prevention system (IPS), or equivalent is in place to detect real-time suspicious or anomalous network traffic and alert personnel when a potential intrusion is detected.
Example: screenshots or exports from the IDS/IPS or equivalent tool showing the service is enabled, the detection rules or threat types monitored, and alerting or notification settings identifying how personnel are notified of potential intrusions.
|
DCF-92 | Encrypted Remote Production Access | Upload evidence showing remote access to production systems is only available through an encrypted connection.
Example: screenshots or exports showing the approved remote access method in use, such as VPN, SSH, bastion host, or another encrypted administrative access path, along with evidence that direct unencrypted remote access to production is not allowed.
|
DCF-95 | Monitoring Processing Capacity and Usage | Upload evidence showing processing capacity and resource usage are monitored continuously to manage demand and enable additional resources to be implemented as necessary.
Example: dashboards or reports showing CPU, memory, storage, network, or other utilization metrics for critical systems, configured utilization thresholds or alerts, and evidence of capacity reviews, scaling actions, or planned resource increases when thresholds are approached. |
DCF-97 | Autoscaling | Upload evidence showing autoscaling is enabled for relevant cloud resources and configured to provision additional resources when predefined capacity thresholds are met.
Example: screenshots or exports of autoscaling group settings, scaling policies, threshold-based triggers, minimum/maximum capacity settings, and recent scaling activity or event history. |
DCF-98 | Backup Storage | Upload evidence showing backups are encrypted and segmented from production systems to protect them from disaster or incident scenarios.
Example: screenshots or exports showing backup encryption settings, backup storage architecture, replication to a different region or offsite location, air-gapped or logically segregated backup storage, and access controls restricting backup storage access. |
DCF-99 | Backup Monitoring | Upload evidence showing automated notifications are sent to personnel when backup processes fail and that backup failures are investigated and resolved in accordance with company policies and procedures.
Example: backup service alert configuration, sample failed backup notification, and ticket or incident record showing investigation, remediation, and resolution by engineering personnel.
|
DCF-100 | Backup Restore Testing | Upload evidence of your most recent test restore of backed-up data completed within the past year.
Example: Documentation of the backup restoration process showing steps taken and associated evidence, results, date completed, etc. The evidence should include the steps taken to restore the data from a backup and validation of the completeness and accuracy of the restored data. |
DCF-104 | Test Data | Upload evidence showing test data is used in testing, development, staging, or other non-production environments to prevent sensitive information from being copied into lower environments.
Example: screenshots from non-production databases showing mock or synthetic data, documented anonymization or masking procedures, data generation scripts, or environment configuration standards prohibiting the use of live production data in lower environments.
|
DCF-105 | Personnel Non-Disclosure Agreements (NDA) | Upload an example executed confidentiality agreement for a recently hired employee or contractor.
Example: signed NDA, PIIA, employment agreement, contractor agreement, or other executed agreement that outlines confidentiality requirements and was completed prior to hire.
|
DCF-107 | Disposal of Sensitive Data on Paper | Observation of hard copy material being disposed of through secure means such as cross-cut shredding, incinerating, or pulping so the data cannot be reconstructed.
Note: This can be performed by auditors on-site, or via live virtual meeting. |
DCF-108 | Secure Storage Mechanisms | Upload evidence of secure storage mechanisms used for digital media, hardcopy materials containing sensitive data, and critical equipment or other assets.
Example: photos or screenshots showing locked cabinets, file rooms, storage closets, key cabinets, secure cages, or similar storage mechanisms, along with evidence that access to those storage locations, physical keys, or authentication information is restricted to authorized personnel. |
DCF-109 | Disposal of Sensitive Data on Hardware | Upload evidence for one instance of hardware disposal or reuse showing sensitive data on the device was securely destroyed or wiped in accordance with documented policies and procedures.
Example: certificate of destruction, media sanitization record, device disposal log, or screenshots showing secure wipe completion before reuse or disposal.
|
DCF-123 | Procedures for Information Disposal | Upload documented policies and procedures for erasure or destruction of information that has been identified for disposal.
Example: data disposal or media sanitization procedure, retention and disposal standard, records management procedure, or secure destruction procedure showing how information is identified for disposal and then erased or destroyed using approved methods. |
DCF-132 | Privacy and Security Requirements in Third-Party Agreements | Upload an executed agreement with a vendor or third party involved in accessing, processing, storing, transferring, or managing information that includes security, confidentiality, and privacy requirements.
Example: master service agreement, data processing agreement, business associate agreement, security addendum, or similar contract showing obligations for protecting information during transfer and processing.
|
DCF-135 | Notification of Incidents or Breaches | Upload evidence showing the organization communicates breaches and incidents to affected parties, organizational officials, authorities, and other internal and external stakeholders in accordance with company policies and procedures and applicable legal and contractual obligations.
Example: documented breach notification procedure, notification decision tree, breach notification template, incident communications log, sample notification to affected parties or authorities, or internal escalation records showing how notification requirements are evaluated and executed.
|
DCF-140 | Point of Contact for Privacy Inquiries | Upload evidence showing the organization provides a contact mechanism for data subjects to submit privacy-related requests or report privacy incidents.
Example: privacy email address, web form, customer portal, help center intake flow, or other documented channel made available to data subjects. |
DCF-146 | Board Meetings | Upload the agenda and meeting minutes for the most recent board, owner, senior leadership, or equivalent governance meeting showing review of company performance, strategic objectives, compliance initiatives, and security and privacy risk and mitigation strategies. Include documented attendees, decisions made, and action items. |
DCF-149 | Removable Media Device Encryption | Upload evidence showing removable media devices that contain sensitive data are encrypted.
Example: screenshots or exports from device encryption tools, endpoint management settings, or removable media control configurations showing encryption is enforced for USB drives, external hard drives, optical media, or other removable storage used to store or transport sensitive data.
|
DCF-150 | Data Loss Prevention (DLP) Mechanisms | Upload evidence showing data loss prevention mechanisms are implemented on systems that process, store, or transmit sensitive information.
Example: screenshots or exports of DLP rules in email, endpoint, cloud storage, collaboration, or other relevant systems showing the controls are configured to prevent data leakage and generate audit logs and alerts. |
DCF-154 | Incident Response Test | Upload evidence of the most recent incident response test performed within the past year.
Example: tabletop exercise, walkthrough, simulation, or other documented test of the incident response plan and procedures showing scenario details, participants, activities performed, results, lessons learned, and evidence that the incident response plan and procedures were updated as needed based on the outcome of the test.
|
DCF-155 | Testing of Changes | Upload evidence for a recent change showing it was tested in a non-production environment before deployment to production.
Example: a change ticket or work item with documented test criteria or acceptance criteria, screenshots or exports of test results, CI/CD or QA test run results, evidence of any defects identified and resolved, and approval to promote the change after testing was completed. |
DCF-157 | Cybersecurity Insurance | Upload your current certificate of insurance or policy documentation showing cybersecurity insurance and/or errors and omissions coverage in effect.
Example: certificate of insurance or declarations page showing the insurer, policy number, coverage type, coverage amounts, and policy effective and expiration dates.
|
DCF-160 | Continuous Control Monitoring | Upload evidence showing the organization uses compliance automation software to identify, select, and continuously monitor internal controls.
Example: screenshots or exports from Drata or equivalent compliance automation tooling showing the control inventory, mapped control tests, monitoring status, test results, control owners, and open failures or remediation workflows.
|
DCF-163 | Legal Requirements | Upload documentation showing the organization has identified and documented the legal, statutory, regulatory, and contractual requirements relevant to the company, assigned responsibility for those requirements, and established processes to satisfy them and monitor and review changes. Example: legal and regulatory requirements register, contractual obligations register, compliance matrix, assigned owners, and evidence of periodic review or update tracking.
|
DCF-165 | Periodic Independent Assessments | Upload evidence of a recent periodic independent assessment of internal controls.
Example: internal audit plan or assessment program showing scope, timing, and assigned assessor, along with the completed internal audit or assessment report, documented findings, management responses, corrective actions, and evidence the assessment results were retained.
|
DCF-166 | Business Continuity Plan | Upload your documented business continuity plan.
Example: a business continuity plan that defines continuity strategies, recovery approaches, roles and responsibilities, activation criteria, communication procedures, and steps for maintaining critical operations during a disruption.
|
DCF-167 | Business Impact Analysis | Upload your documented business impact analysis (BIA).
Example: a BIA showing critical business processes and assets, criticality ratings, business recovery order, minimum service levels, recovery assumptions or dependencies, and evidence the results are incorporated into business continuity and disaster recovery plans.
|
DCF-168 | Vendor Management Policy | Upload your documented vendor management policy.
Example: a policy that defines requirements for vendor and third-party onboarding, due diligence, risk classification, contract and security/privacy review, ongoing monitoring, periodic reassessment, service changes, and offboarding or termination activities across the full vendor lifecycle. |
DCF-173 | Employment Terms & Conditions | For one example personnel file, upload an executed employment agreement, offer letter, contractor agreement, or equivalent document showing the individual acknowledged terms and conditions of employment that include information security responsibilities.
Example: confidentiality obligations, legal or regulatory obligations, acceptable handling of company or customer data, protection of intellectual property, return of assets, and responsibilities that continue after employment ends. |
DCF-175 | Communications Plan | Upload your documented communications plan or procedure showing how relevant information is communicated internally and externally for the organization’s information security, privacy, or other programs.
Example: documented communication plan, ISMS communication procedure, incident communication matrix, stakeholder communication matrix, or policy section defining what is communicated, to whom, by whom, when, and through which communication channels. |
DCF-180 | Secure Information Transfer | Upload your documented policy or procedure for secure information transfer.
Example: data protection policy, secure transfer standard, encryption standard, file transfer procedure, or vendor/customer data exchange procedure showing how information is securely transferred internally and externally, including approved transfer methods, encryption requirements, access restrictions, and handling requirements for sensitive data. |
DCF-182 | Asset Management Policy | Upload your documented asset management policy.
Example: a policy that defines requirements for identifying, tracking, assigning ownership, classifying, maintaining, transferring, returning, and disposing of company assets, along with requirements for keeping the asset inventory accurate and up to date. |
DCF-183 | Vulnerability Management | Upload your documented vulnerability management policy.
Example: a policy that defines how vulnerabilities are identified from sources such as scans, vendor advisories, and security bulletins; how they are cataloged and risk-rated; how remediation is prioritized and tracked; and the roles, responsibilities, and timelines for review and resolution. |
DCF-185 | Threat Intelligence | Upload evidence showing the organization has defined threat intelligence objectives and implemented mechanisms to collect threat information and produce threat intelligence.
Example: documented threat intelligence plan or procedure, subscribed commercial or open-source threat feeds, vendor or security product intelligence feeds, mailing list or advisory subscriptions, internal threat summaries or reports, and evidence that collected threat information is reviewed and assessed in accordance with the defined threat intelligence objectives.
|
DCF-188 | Communication with Advisories and Special Interest Groups | Upload evidence showing the organization exchanges information with relevant security and privacy organizations, professional associations, and other specialist forums.
Example: screenshots or exports showing subscriptions to advisories or bulletin services, email alerts from sources such as CISA or CERT, participation in ISACs or professional associations, conference participation, shared threat or vulnerability updates, or internal distribution of relevant external advisories to appropriate personnel.
|
DCF-190 | Designated Security Officials | Upload evidence showing responsibility for information security has been formally assigned to a Chief Information Security Officer or another security-knowledgeable member of management.
Example: organizational chart, board or executive approval record, management appointment record, policy or governance document assigning security responsibility, or job description showing the designated individual is responsible for overseeing the organization’s information security program.
|
DCF-201 | Network Security Controls Configuration Standards | Upload your documented network security control configuration standards.
Example: firewall, router, ACL, or cloud virtual network configuration standards showing approved rule set requirements, allowed services, protocols, and ports, required business justification for each approved connection, and evidence the standards are implemented in the environment.
|
DCF-204 | Dataflow Diagram | Upload your current dataflow diagram showing data flows across systems and networks. Include evidence that the diagram was reviewed and approved by management at least annually and updated as necessary when changes occurred.
Example: the current dataflow diagram plus approval records, review signoff, change tickets, or emails confirming the diagram’s accuracy and completeness.
|
DCF-240 | Only Necessary System Functions and Services Used | Upload evidence showing only necessary services, software programs, protocols, daemons, and functions are enabled on in-scope system components in accordance with documented configuration standards.
Example: screenshots or exports from system configuration settings, endpoint or server management tools, infrastructure-as-code baselines, or hardening checklists showing enabled services, disabled unnecessary functionality, and alignment to the approved baseline configuration. |
DCF-253 | Data Secure Disposal | Upload evidence showing data is securely disposed of upon expiration of retention periods, upon customer request, or when no longer needed for legal, regulatory, or business purposes.
Example: data deletion ticket, retention schedule execution record, customer deletion request fulfillment record, or screenshots/logs showing data was securely deleted from the relevant system. |
DCF-294 | Anti-Malware Tools Behavior | Upload evidence from your anti-malware solution showing it is configured to perform periodic scans and active or real-time scans, or to perform continuous behavioral analysis of systems or processes.
Example: screenshots or exports from the anti-malware console showing scheduled scan settings, active or real-time protection settings, behavioral analysis settings if used, and the systems or policies to which those protections are applied.
|
DCF-305 | Production Components Change Control Procedures | Upload documentation for a recent production change showing the change was implemented in accordance with established change management procedures.
Example: change ticket or change record showing the change description, business justification, evaluation of security requirements and impact, approval by authorized parties, rollback procedures, and records of testing, including acceptance testing and security impact testing.
|
DCF-312 | Secure Code Development Training | Upload evidence of secure code development training completed by a developer within the past year.
Example: training content, videos, presentations, or agenda showing coverage of secure software design, secure coding techniques relevant to the developer’s job function and development languages, and tools used to detect vulnerabilities in software, along with completion records for the developer. |
DCF-326 | Need-to-Know Principle | Upload evidence showing access to system components and data is restricted to individuals whose job requires such access.
Example: role-based access matrix, documented role definitions, permission assignments by role, and sample user access listings showing access is aligned to job responsibilities. |
DCF-330 | Access Control Model | Upload evidence showing the organization has defined and implemented an access control model for all system components. Example: documented access control standard or architecture describing the model used, such as role-based access control (RBAC), attribute-based access control (ABAC), or policy-based access control (PBAC), along with screenshots or exports from relevant systems showing the model is configured and enforced for user access based on job classification and function.
|
DCF-363 | Entry Controls in Place | Upload evidence showing entry controls are in place to restrict physical access to corporate facilities, including systems or areas that may process or store sensitive data, to authorized personnel, and that access is logged and monitored.
Example: photos or screenshots of badge readers, biometric readers, monitored reception or front desk controls, door access system settings, and sample access logs showing entries are recorded and monitored.
|
DCF-365 | Secure Physical Access Control Mechanisms | Upload evidence showing physical surveillance mechanisms are in place to deter and detect unauthorized physical access and are protected from tampering or disabling.
Example: photos or screenshots of video monitoring systems, sensors, or detectors covering relevant facility areas, along with evidence of tamper protection such as secured mounting, locked enclosures, restricted administrative access, power/network protection, or alerts for device disruption or offline status. |
DCF-366 | Physical Access Control Mechanism Periodic Data Review | Upload evidence showing data collected from video cameras and/or access control mechanisms is reviewed periodically and correlated with other entries, such as badge access logs, visitor logs, or alarm events.
Example: documented review procedure, completed periodic review records, screenshots or exports of access control or surveillance logs, investigation notes tying camera footage to badge or visitor log data, and records of ad hoc review performed in response to suspicious physical security activity. |
DCF-374 | Visitors Authorized and Escorted | Observation of a visitor being authorized before entry and escorted at all times within company facilities, including areas where sensitive data may be processed or stored.
Note: This observation can be performed by the auditor on-site or via live virtual meeting. |
DCF-375 | Personnel and Visitor Badges | Observation that onsite personnel wear a badge or other form of identification within company facilities and that visitors are issued a visitor badge or other form of identification that visibly distinguishes them from onsite personnel.
Example: observation of a visitor receiving a visitor badge and an example of the badge used. Note: This observation can be performed by the auditor on-site or via live virtual meeting.
|
DCF-378 | Visitor Log | Upload evidence to show that a visitor log is maintained to keep an audit trail of visitor activity to the company facilities, computer rooms or data centers where sensitive data may be stored or transmitted (e.g., scan or photograph of the visitor log for an example day, etc.). |
DCF-406 | Audit Logging | Upload evidence showing audit logging is enabled and active for all relevant system components and sensitive data in accordance with company policies.
Example: screenshots or exports from relevant systems, cloud platforms, databases, applications, or logging tools showing audit logging is enabled, the scope of systems or data covered, and the logging settings currently in effect. |
DCF-407 | Audit Logs Data Points | Upload evidence showing that audit logs have been configured to contain user or identity, type of event, date and time, success and failure indication, origination of event, affected data, and system component, resource, or service.
Example: Screenshot or export of a sample log showing the relevant attributes. |
DCF-411 | Audit Trail for Invalid Access Attempts | Upload evidence showing that audit trails or logs are implemented for system components to capture invalid access attempts.
Example: Screenshot or export of a sample log showing the relevant log contents. Multiple invalid login attempts may be an indication of an unauthorized user's attempts to "brute force" or guess a password. |
DCF-412 | Audit Trail for Identification and Authentication Mechanism Changes | Upload evidence showing that audit trails or logs are implemented for system components to capture changes to identification and authentication credentials (e.g., creation of new accounts, elevation of privileges, changes, additions, or deletions to accounts with administrative access, etc.).
Example: Screenshot or export of a sample log showing the relevant log contents. |
DCF-429 | Limited Access to Audit Trails | Upload evidence of the users with elevated access to log systems and log data.
Example: Screenshots of the users with administrative or privileged access to log systems and log data. |
DCF-430 | Audit Trail Files Protected | Upload evidence showing audit log files are protected from unauthorized modification.
Example: screenshots or exports showing access control settings for log repositories, immutable or write-restricted storage settings, physical or logical segregation of logging infrastructure, and configurations demonstrating only authorized personnel can administer or alter audit log files.
|
DCF-434 | Policies and Procedures for Logging | Upload your documented logging and monitoring policy and procedures.
Example: a policy, standard, or procedure defining logging requirements, monitoring activities, roles and responsibilities, systems or events that must be logged or monitored, alert review expectations, and related operational procedures. |
DCF-448 | Wireless Access Point Detection and Identification | Upload evidence of the most recent wireless access point detection review performed in accordance with company policy and compliance requirements.
Example: wireless scan results, rogue access point detection reports, wireless controller outputs, or other documented review results showing identified authorized and unauthorized wireless access points, along with generated alerts if automated monitoring is used and evidence the results were documented and reviewed.
|
DCF-456 | Vulnerabilities Identified and Resolved | Upload evidence showing vulnerabilities identified through vulnerability scanning are tracked and remediated in accordance with company policies and procedures.
Example: vulnerability scan report showing identified critical, high, and other applicable vulnerabilities; remediation tickets or change records; documented risk-based prioritization where applicable; and subsequent rescan results confirming critical or high vulnerabilities were resolved and other remediated findings were validated as needed. |
DCF-478 | Change Detection Mechanism | Upload evidence showing file integrity monitoring or another change-detection mechanism is enabled to detect unauthorized modification of critical system files, configuration files, audit files, or content files.
Example: screenshots or exports from the change-detection solution showing monitored file paths or objects, monitoring rules or scope, alerting configurations, and evidence that unauthorized changes, additions, or deletions would generate alerts.
|
DCF-503 | Multiple Methods for Security Awareness | Upload evidence showing the security awareness program uses multiple methods to communicate awareness and educate personnel, and that periodic security updates are provided through those methods.
Example: security awareness program schedule or curriculum, LMS training records, screenshots of newsletters or intranet posts, phishing simulation campaign records, team meeting materials or agendas, and distribution logs or attendance records showing periodic security updates were communicated through multiple channels. |
DCF-507 | Vendor Due Diligence | Upload evidence of due diligence performed before engaging a new vendor or service provider.
Example: completed security questionnaire, reviewed compliance reports or certifications, reviewed vendor-provided policies or procedures, documented analysis of delegated or shared responsibilities, identified risks or action items, and the completed review record showing the date and outcome of the due diligence.
|
DCF-516 | Incident Response Training | Upload evidence of incident response training completed by personnel based on their assigned incident response roles and responsibilities.
Example: incident response training materials or LMS records showing general incident identification and reporting training for all personnel, role-specific incident handling training for incident response team members, and completion records showing training was completed within required timelines upon receiving system access, assuming an incident response role, when required by system changes, and at periodic intervals. |
DCF-558 | Restrictions on Software Installation and Execution | Upload evidence showing the organization has identified allowed software and implemented mechanisms to restrict and monitor the installation and execution of unauthorized software.
Example: approved software inventory or allowlist, screenshots or exports from MDM, endpoint management, application control, or EDR tools showing software installation restrictions or allow-by-exception rules, records showing unauthorized software execution is blocked or monitored, and evidence the list of allowed software is reviewed and updated periodically. |
DCF-566 | Management of Nonconformities | Upload documentation for an identified nonconformity showing root-cause analysis, corrective actions, and the results of those corrective actions.
Example: incident record, audit finding, corrective action plan, root-cause analysis, remediation tickets or change records, evidence of corrective action completion, and documented verification that the nonconformity was addressed. |
DCF-567 | Change Management Policy | Upload your documented change management policy.
Example: a policy that defines requirements for requesting, reviewing, approving, testing, implementing, documenting, and tracking changes across the organization, including changes to infrastructure, systems, and applications. |
DCF-569 | Information Labeling | Upload evidence showing the organization has developed and implemented procedures for labeling assets and information in accordance with its information classification scheme.
Example: data classification policy, information labeling standard, asset labeling procedure, screenshots of labels applied within systems or repositories, sample labeled documents, or training/process materials showing how personnel apply required labels to information and assets. |
DCF-570 | Disciplinary Process | Upload your documented disciplinary process and evidence that management retains documentation when the process is enacted.
Example: employee handbook, code of conduct, HR policy, or information security policy describing the disciplinary sanctions process for policy violations or security/privacy incidents, along with a redacted example of disciplinary documentation, case record, or HR tracking record showing the process was applied. |
DCF-571 | Fire Detection and Suppression | Upload evidence showing fire detection and suppression systems are installed in critical locations to protect people and assets in the event of a disaster, and that maintenance is conducted periodically in accordance with manufacturer guidance.
Example: observation of smoke detectors, alarms, sprinkler systems, or clean agent suppression systems in critical locations such as data centers or server rooms, along with maintenance logs, inspection reports, testing records, or service reports from the responsible vendor or facilities team.
|
DCF-572 | Temperature Monitoring Systems | Upload evidence showing systems are in place to monitor and control air temperature and humidity at appropriate levels in critical areas such as server rooms or data centers, and that those environmental control systems are maintained periodically in accordance with manufacturer guidance.
Example: observation or screenshots of HVAC, environmental sensors, or building monitoring systems showing temperature and humidity monitoring and control, along with maintenance logs, calibration records, inspection records, or service reports for the related environmental control systems.
|
DCF-573 | Uninterruptible Power Supply | Upload evidence showing uninterruptible power supply (UPS) systems are in place to provide backup power in data centers or server rooms, and that maintenance is conducted periodically in accordance with manufacturer guidance.
Example: observation or photos of UPS units installed in critical locations, UPS monitoring console screenshots, equipment inventory or facility diagrams showing UPS coverage, and maintenance logs, inspection reports, battery testing records, or vendor service records for the UPS systems.
|
DCF-606 | Device Identification and Authentication | Upload evidence showing devices accessing the system are uniquely identified and that device identity is authenticated or verified before system access is granted.
Example: asset inventory or device registry showing device identifiers such as hostname, MAC address, IP address, serial number, certificate, or device ID; configuration screenshots from device management, NAC, MDM, IAM, or directory services showing device trust, certificate-based authentication, or device compliance checks; and sample authentication or access logs showing recognized devices are allowed and unrecognized or noncompliant devices are denied or challenged.
|
DCF-607 | System Identifier Management | Upload evidence showing the organization has documented policies and procedures for assigning unique identifiers to individuals, groups, roles, services, or devices, and restricting reuse of those identifiers.
Example: access management or identity lifecycle policy, username or account naming standard, service account provisioning procedure, IAM or directory service configuration showing unique account creation, and evidence that terminated or retired identifiers are disabled and not reassigned in violation of company policy.
|
DCF-616 | Remote Maintenance | Upload evidence of a recent nonlocal maintenance or diagnostic activity showing the session was approved, monitored, and properly terminated when the work was completed.
Example: remote maintenance policy or procedure, approved maintenance ticket or change record, session logs showing connection start and end times, monitoring or supervision records for the remote session, and evidence that external session and network connections were terminated promptly after completion. |
DCF-617 | Maintenance Personnel Authorization | Upload evidence showing the organization has a documented process to authorize maintenance personnel or organizations and maintains a current list of authorized parties.
Example: maintenance authorization policy or procedure, current list of authorized maintenance personnel or service providers, and records showing organizational personnel with the required access authorizations and technical competence are assigned to supervise maintenance activities performed by personnel without the required access authorizations. |
DCF-637 | Secure Development Process | Upload your documented secure software development procedures.
Example: SDLC procedure, secure development standard, engineering handbook, or internal development wiki showing how security is addressed during requirements, design, development, testing, release, and maintenance; references to industry standards or secure coding best practices; and defined security requirements such as authentication, authorization, logging, input validation, and vulnerability management.
|
DCF-677 | Software Update and Patch Management | Upload evidence showing the organization has implemented a software update and patch management process for operating systems and authorized software.
Example: screenshots or exports from patch management tools, endpoint management platforms, server management consoles, or infrastructure-as-code configurations showing automated or centrally managed deployment of critical patches and application updates; documented patching policy or procedure defining priority SLAs; recent patch status or compliance reports; and evidence that missing or failed updates are tracked and remediated.
|
DCF-678 | Network Security Policy | Upload your documented network security policy.
Example: a policy that defines requirements for deploying, managing, and operating network security controls such as firewalls, security groups, routers, access control lists, segmentation controls, remote access protections, change management expectations for network controls, and monitoring or review responsibilities. |
DCF-681 | Phishing Simulations | Upload evidence showing periodic phishing simulations or social engineering tests are conducted as part of the company’s security awareness initiatives.
Example: phishing simulation campaign configurations, example simulated phishing emails or landing pages, campaign schedules, completion or participation records, and dashboards or reports showing campaign results such as open rates, click rates, credential submission rates, and follow-up awareness or remedial training actions.
|
DCF-684 | Redundancy of Processing | Upload evidence showing redundancy strategies have been implemented for equipment, systems, and processes as necessary to meet availability requirements defined in the business continuity plan.
Example: architecture or infrastructure diagrams showing redundant network paths, load balancers, clustered or replicated production resources, RAID or redundant storage, multiple availability zones or processing sites, redundant ISP links, UPS or backup power coverage, and recent failover, testing, maintenance, or review records demonstrating those redundancy measures are in place and operational.
|
DCF-687 | Email Protection Mechanisms | Upload evidence showing the organization has implemented email protection mechanisms to maintain the integrity of email communications and detect or protect against phishing attacks, spam, and malicious emails.
Example: screenshots or exports showing SPF, DKIM, and DMARC configurations; secure email gateway or email security platform settings; anti-phishing, anti-spam, and malicious attachment/link detection rules; and sample alert, quarantine, or reporting outputs showing the protections are active.
|
DCF-688 | Return of Assets | Upload evidence for a recently terminated employee or contractor showing the return of company assets was tracked and documented as part of the offboarding process.
Example: offboarding checklist, HR or IT ticket, asset return log, shipping record or prepaid return label for remote personnel, and records showing return or collection of laptops, mobile devices, badges, keys, MFA tokens, and other issued assets, along with evidence that access mechanisms not physically returned were disabled by IT or HR.
|
DCF-689 | On-call Team | Upload evidence showing specific personnel are designated to be available on a 24/7 basis to respond to suspected or confirmed security incidents and operational issues.
Example: on-call rotation schedules, PagerDuty or equivalent alerting platform screenshots, escalation policies, incident response contact rosters, and records showing assigned primary and secondary on-call coverage for relevant teams.
|
DCF-698 | Automated Mechanisms for Audit Log Reviews | Upload evidence showing automated mechanisms are implemented for audit record reduction and correlated audit log review and analysis.
Example: screenshots or exports from a SIEM, centralized log management platform, or event log analyzer showing correlation rules, log aggregation or normalization settings, alerting logic, dashboards or reports for correlated event analysis, and documentation identifying the audit sources feeding the platform.
|
DCF-707 | Credentials for System Accounts Not Hard-Coded | Upload evidence showing the organization has implemented mechanisms to validate that authentication credentials for application and system accounts are not hard coded in scripts, configuration/property files, or bespoke and custom source code.
Example: screenshots or exports from secret scanning tools, SAST rules, CI/CD pipeline checks, pre-commit hooks, repository scanning results, or code review requirements showing detection of hard-coded secrets, along with a sample finding or remediation record demonstrating hard-coded credentials are identified and removed before release.
|
DCF-708 | Software and Third Party Libraries Inventory | Upload evidence showing the organization maintains an up-to-date inventory of bespoke/custom software and third-party software components.
Example: software bill of materials (SBOM), software composition analysis (SCA) tool outputs, application inventory records, or repository/dependency management exports showing software components, libraries, versions, and update status, along with evidence the inventory is reviewed and updated as changes occur.
|
DCF-712 | Static Application Security Testing | Upload evidence showing static application security testing (SAST) or an equivalent tool is used as part of the CI/CD pipeline to detect vulnerabilities in the codebase.
Example: screenshots or exports from CI/CD pipelines, repository protections, or SAST tools showing scans execute during development or build workflows, along with sample scan results, remediation tickets or pull requests, and evidence that identified vulnerabilities are corrected prior to release as appropriate based on the nature of the vulnerability.
|
DCF-741 | Logging and Monitoring Policy | Upload your documented logging and monitoring policy.
Example: a policy that defines requirements for audit logging, monitoring of system activity, roles and responsibilities, systems or events that must be logged or monitored, alerting expectations, log review expectations, and related operational requirements. |
DCF-744 | Contact with Authorities | Upload evidence of incident response procedures, playbooks, or documented communication plans showing the organization has identified relevant authorities to contact and defined the events or circumstances that require communication, the methods of communication, and the personnel responsible for that communication.
Example: incident response plan, breach notification procedure, regulatory communication matrix, supervisory authority or law enforcement contact list, or escalation procedure showing when authorities must be contacted, who is responsible, and how communication is performed. |
DCF-745 | Segregation of Duties | Upload evidence showing the organization has identified conflicting duties and areas of responsibility and implemented segregation of duties controls.
Example: segregation of duties matrix, RACI, role definition document, access control design, approval workflow documentation, or review records showing incompatible duties are assigned to different individuals. Where full segregation is not possible, include documented compensating or mitigating controls such as secondary approval, management review, monitoring, or periodic independent review. |
DCF-748 | Segmentation of Networks | Upload evidence showing network segmentation or other techniques are used to isolate portions of the environment into defined security boundaries and to control traffic between them based on business and security needs.
Example: network or security zone diagrams, firewall rules, VLAN or subnet configurations, security group rules, ACLs, router configurations, or segmentation standards showing separate zones such as office, production, guest, admin, or other sensitive environments, along with evidence that only approved traffic is permitted between zones. |
DCF-749 | Leak Detection System | Upload evidence showing critical facilities are equipped with leak detection systems to detect water in the event of a flood or leakage.
Example: observation, photos, facility diagrams, or screenshots showing leak detection sensors, alarms, or building monitoring systems installed in critical locations such as data centers, server rooms, or other sensitive facility areas. Note: This observation can be performed by the auditor on-site or via live virtual meeting.
|
DCF-761 | Incident Management Procedures for Collection of Evidence | Upload evidence of documented incident management procedures for the identification, collection, acquisition, and preservation of incident-related evidence and metadata.
Example: incident response policy or forensic evidence handling procedure, incident records or post-incident reports showing the evidence handling process was followed during an actual or test incident, and training records or periodic review records showing relevant personnel are aware of and follow the evidence preservation requirements. |
DCF-762 | Managing Changes to Supplier Services | Upload evidence for a recent change to a supplier or vendor service showing the change was reviewed, due diligence was performed, and the change was authorized by management before implementation or continued use.
Example: updated vendor risk review, change request, security review record, revised contract or order form, assessment of the impact of a service expansion or supplier change, identified risks or action items, and retained evidence of management approval for the change. |
DCF-776 | Principle of Least Privilege | Upload evidence showing permissions are assigned through groups or roles based on the principle of least privilege and that wild-card permissions or other broad-access patterns are limited.
Example: role-based access matrix, IAM group or role definitions, permission set configurations, sample user-to-role assignments for in-scope systems, and screenshots or exports showing overly broad permissions such as wildcard access are restricted, prohibited, or tightly controlled by documented exception. |
DCF-780 | Web Filtering | Upload evidence showing the organization has implemented web filtering mechanisms to enforce the company’s internet usage policies.
Example: screenshots or exports from a secure web gateway, DNS filter, proxy, browser security control, or endpoint web filtering tool showing blocked categories or destinations, policies restricting access to prohibited or high-risk web resources, threat-intelligence or reputation-based filtering settings, and sample logs or reports showing access to known malicious or disallowed sites is blocked and recorded.
|
DCF-784 | Software Composition Analysis (SCA) | Upload evidence showing the organization checks software components and libraries for policy and license compliance, security risks, and supported versions using software composition analysis (SCA) or equivalent mechanisms.
Example: screenshots or exports from SCA tools, CI/CD pipeline checks, dependency management tools, or SBOM platforms showing identified third-party components, license and policy compliance checks, vulnerability findings, supported version status, and remediation records demonstrating identified issues are addressed in accordance with the company’s vulnerability management policies. |
DCF-785 | Supported System Components | Upload evidence showing the organization maintains secure and supported configuration standards and supported versions for system components.
Example: baseline configuration standards, supported software or hardware standards, approved version inventories, end-of-life tracking records, vulnerability or asset management reports identifying unsupported components, replacement plans for components no longer supported by the vendor or manufacturer, and documented compensating or risk mitigation strategies for any unsupported components that cannot yet be replaced.
|
DCF-786 | Defined Company Objectives | Upload evidence showing management has defined company objectives and communicated them to personnel.
Example: company mission and vision statements, strategic plan, annual operating plan, OKRs, departmental goals, board or leadership materials, or company-wide communications showing operational objectives, financial performance goals, security or compliance objectives, and other business objectives that serve as a basis for risk assessment activities, along with evidence those objectives and any updates are communicated internally.
|
DCF-789 | Expectations of Interested Parties | Upload documentation showing the organization has identified interested parties relevant to information security and documented their requirements and expectations, along with how those requirements and expectations will be addressed.
Example: interested parties register, stakeholder analysis, ISMS scope or management system scope documentation, contractual requirements register, legal or regulatory requirements register, customer security requirements tracker, or governance records showing internal and external stakeholders, their expectations, and the related controls, obligations, or actions used to address them. |
DCF-795 | Transferred Personnel Access Validation | Upload evidence for a recently transferred or reassigned employee showing logical and physical access were reviewed and updated to align with the individual’s new job responsibilities.
Example: role change ticket, HR transfer record, access review record, IAM workflow, physical access change request, updated group or role assignments, removed permissions no longer needed, and retained documentation showing the review and resulting access modifications were completed and approved. |
DCF-814 | Security Impact Assessment for Changes | Upload evidence showing system changes are evaluated for security impact prior to implementation and that security requirements are validated after implementation.
Example: change management policy or procedure describing security impact assessment requirements, a completed change impact assessment or change ticket showing identified security implications and required controls, and post-implementation validation records showing security requirements were tested or confirmed after the change was deployed.
|
DCF-817 | Cloud Security Configuration Monitoring | Upload evidence showing the organization uses automated tools to continuously monitor cloud security configurations and risks.
Example: cloud security posture management (CSPM) or cloud configuration monitoring tool settings showing enabled policies or rules, monitored cloud accounts or subscriptions, recent scan or monitoring reports identifying misconfigurations, vulnerabilities, or security risks, and remediation or incident tickets showing findings were reviewed, tracked, and resolved.
|
DCF-818 | Physical Access Devices Controlled | Upload evidence showing physical access devices are identified, controlled so they are only available to authorized personnel, and managed through their lifecycle.
Example: physical access control policy or procedure; inventory or register of keys, badges, fobs, access cards, lock combinations, and card readers; assignment records showing authorized personnel; issuance and return logs; deactivation or rekeying records; and periodic review records showing physical access devices are tracked, updated, and controlled. |
DCF-819 | Control of Removable Media | Upload evidence showing the organization restricts the use of removable media to authorized media types with documented business justification and prohibits all other types through policy and/or technical mechanisms.
Example: removable media policy or acceptable use policy defining allowed media types and approval requirements; documented exception or business justification records for approved use; endpoint, MDM, EDR, or device control settings showing unauthorized removable media is blocked or restricted; and personnel acknowledgments or training records showing workforce members were informed of the rules governing removable media use.
|
DCF-826 | Role-Based Security Training | Upload evidence showing the organization has defined security-related roles and responsibilities and assigned specialized information security training for those roles.
Example: role descriptions or responsibility matrix identifying security-related duties; role-based training curriculum or training content covering the specific security topics, skills, processes, or methodologies required for each role; and completion records showing personnel completed the required training before being granted access to systems or sensitive data or performing assigned duties, with periodic refresher training completed thereafter. |
DCF-827 | Role-Based Security Training Program Updates | Upload evidence showing the organization reviews and updates its role-based security training program and training content at defined periodic intervals and after significant events.
Example: documented policy or procedure requiring scheduled training program reviews; completed review records or meeting notes for recent training program evaluations; updated training materials, curriculum, or role-based training matrices showing revisions; and records showing updates were made in response to incidents, assessment findings, regulatory changes, or the introduction of new tools, technologies, or processes. |
DCF-828 | Incident Handling Capability | Upload evidence showing the organization has implemented an incident-handling capability consistent with its incident response plan across the full incident lifecycle.
Example: formally approved incident response plan; incident detection and triage procedures or tooling; recent incident records showing analysis, containment, eradication, recovery, and user response activities; incident response team roles or on-call assignments; and training or exercise records demonstrating personnel are prepared to execute the plan. |
DCF-829 | Network Traffic Monitoring | Upload evidence showing the organization monitors and logs inbound and outbound network communications traffic to detect unusual or unauthorized activities or events.
Example: network monitoring or network detection and response tool configurations, firewall or IDS/IPS monitoring settings, NetFlow or traffic analysis dashboards, sample network traffic logs, and alert records or investigation tickets showing unusual or unauthorized traffic was detected, reviewed, and acted upon.
|
DCF-868 | Cybersecurity Supply Chain Risk Management Program | Upload evidence of your documented cybersecurity supply chain risk management (C-SCRM) program.
Example: C-SCRM program plan or strategy document defining program objectives, scope, roles and responsibilities, implementation milestones, and governance; supporting policies and procedures for supplier risk management, due diligence, ongoing monitoring, incident response, and contract management; stakeholder or management approval records; and evidence of periodic review, updates, and program improvement activities.
|
DCF-870 | Integrated Cybersecurity Supply Chain Risk Management | Upload evidence showing cybersecurity supply chain risk management activities and outcomes are integrated into enterprise risk management processes and managed alongside other enterprise risks.
Example: enterprise risk register entries for supplier or supply chain risks; C-SCRM risk assessments linked to enterprise risk treatment plans; governance or risk committee materials showing supply chain risks are reviewed with other enterprise risks; contractual requirements or supplier security clauses supporting risk treatment; ongoing supplier monitoring records; and incident response or issue management records showing supply chain-related incidents feed into the broader enterprise risk management process.
|
