Skip to main content

Appendix: Supported Mitigations and Their NIST Mapping

This appendix lists the technologies, processes, and people-based mitigations the Cye Exposure Management Platform supports in maturity assessments, and the NIST Cybersecurity Framework subcategories each one is mapped to.

Overview

The Cye Exposure Management Platform measures organizational cybersecurity maturity by linking the assets in your environment (technologies, processes, and people-based capabilities) to NIST Cybersecurity Framework (CSF) subcategories. Each supported mitigation has a predefined mapping to one or more NIST subcategories under both NIST CSF 1.1 and NIST CSF 2.0, so the platform can attribute coverage correctly during an assessment.

What is a mitigation?

  • Mitigations are the building blocks Cye uses to express security coverage. They are grouped into three categories:

    • Technologies: security tooling deployed in your environment (for example, EDR, SIEM, WAF).

    • Processes and Procedures: recurring practices and policies (for example, incident response, access reviews).

    • People: workforce-based capabilities and roles (for example, awareness programs, vCISO services).

  • Every supported mitigation appears in one of the tables below, with its ID, name, and NIST CSF mapping.

  • A single mitigation can satisfy multiple NIST subcategories. When it does, all linked subcategories receive the mitigation's contribution to their maturity score.

  • Mitigations without an equivalent mapping for a framework version are shown as a dash "—".


Technologies

Security tools and platforms that Cye recognizes as protective, detective, or response capabilities.

69 supported mitigations.

Mitigation ID & Name

NIST CSF 1.1

NIST CSF 2.0

M2 EDR or XDR (Endpoint Detection and Response)

DE.AE-2, DE.AE-3, DE.AE-5, DE.CM-3, DE.CM-4, DE.CM-7, DE.DP-2, RS.MI-1

DE.AE-02, DE.AE-04, DE.CM-03, DE.CM-09, RS.MI-01, RS.AN-03

M3 SIEM (Security Information and Event Management)

DE.AE-2, DE.AE-3, DE.AE-4, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-7, DE.DP-4

DE.AE-02, DE.AE-03, DE.AE-04, DE.AE-06, DE.AE-07, DE.AE-08, DE.CM-01, DE.CM-03, DE.CM-09

M4 MDR (Managed Detection and Response)

RS.AN-1, RS.AN-2, RS.AN-3, RS.AN-4, RS.MI-1, RS.MI-2, RS.RP-1

RS.MA-01, RS.MA-02, RS.MA-03, RS.MA-04, RS.MI-01, RS.MI-02, RS.AN-03

M7 SSO (Single Sign On)

PR.AC-1, PR.AC-7, PR.AC-6

M9 Password Management Vault

PR.AC-1, PR.AC-4

PR.AA-01, PR.AA-05, PR.AA-04

M10 EFSS (Enterprise File Sync and Share)

PR.DS-1

PR.DS-01

M11 DLP (Data Loss Prevention)

PR.DS-5, PR.PT-2

PR.DS-01, PR.DS-10

M13 SAST (Static Application Security Testing)

PR.IP-2

PR.PS-06

M14 Data Masking / Anonymization / Obfuscation

PR.DS-1

PR.DS-01

M15 Data Encryption

PR.DS-1

PR.DS-01

M16 CSPM (Cloud Security Posture Management)

RS.MI-3, PR.AC-5, PR.IP-1, ID.RA-1, DE.CM-8, PR.PT-3

ID.RA-01, PR.IR-01, PR.PS-01

M19 Firewall

PR.AC-5, RS.MI-1

PR.IR-01, RS.MI-01

M21 Firewall Analyzer

ID.AM-3

ID.IM-03

M22 Vulnerability Assessment and Network Scanning

ID.RA-1, PR.IP-12, DE.CM-8, RS.MI-1

ID.RA-01

M23 MDM (Mobile Device Management)

ID.AM-1, PR.IP-1, RS.MI-1

ID.AM-01, ID.AM-08, PR.PS-01, PR.PS-03

M25 TIP (Threat Intelligence Platform)

ID.RA-2, ID.RA-3

ID.RA-02, ID.RA-03, DE.AE-07

M26 CRQ (Cyber Risk Quantification)

ID.GV-4, ID.RA-4, ID.RA-5, ID.RA-6, ID.RM-2, ID.RM-3

GV.RM-04, ID.RA-03, ID.RA-04, ID.RA-05, ID.RA-06, GV.RM-02, GV.RM-03, GV.RM-06, GV.RM-07

M27 VM (Vulnerability Management)

ID.RA-1, PR.IP-12, DE.CM-8, RS.MI-3

ID.RA-01, ID.RA-05, PR.PS-02

M28 Email Security

DE.CM-3

DE.CM-03

M29 IDS or IPS (Intrusion Detection and Prevention System)

DE.CM-1

DE.CM-01

M30 PAM (Privileged Access Management)

PR.AC-1, PR.AC-4, PR.AC-6, PR.AC-7, PR.MA-1, PR.MA-2, PR.PT-3, DE.CM-3, DE.CM-7

PR.AA-01, PR.AA-05, PR.AA-02, PR.AA-03, PR.AA-04, PR.PS-04, DE.CM-06

M31 IDP or IAM (Identity and Access Management)

PR.AC-1, PR.AC-4, PR.AC-6, PR.AC-7, PR.PT-3, ID.AM-6, PR.AT-2, PR.MA-2, DE.CM-3

PR.AA-01, PR.AA-05, PR.AA-02, PR.AA-03, ID.AM-08

M32 Patch Management

ID.RA-1, PR.IP-12

ID.RA-01, PR.PS-02

M33 CNAPP (Cloud Native Application Protection Platform)

ID.AM-2, ID.AM-4, PR.PT-3, DE.CM-8, DE.CM-4, ID.RA-1

ID.AM-02, ID.AM-04, PR.PS-01, ID.RA-01, DE.CM-01, DE.CM-09

M34 Safe Browsing

DE.CM-5

PR.IR-01, DE.CM-01

M35 Deception Tools

DE.CM-7

DE.CM-01, DE.CM-03, DE.CM-09

M36 WAF (Web Application Firewall)

PR.DS-2

M37 SOAR System (Security Orchestration, Automation and Response) & Automated Playbooks

RS.AN-4, RS.MI-1, RS.MI-2, RS.MI-3

RS.MI-01, RS.MI-02

M39 DAST (Dynamic Application Security Testing)

PR.IP-2

PR.PS-06

M40 URL Filtering

DE.CM-3

DE.CM-03

M42 Zero Trust Network Access (ZTNA)

PR.AC-3, PR.AC-5, DE.CM-1, DE.CM-3, PR.AC-1, PR.AC-6, PR.AC-7

PR.AA-03, PR.AA-04, DE.CM-01, DE.CM-03, PR.AA-05, PR.IR-01, PR.AA-02, PR.AA-01

M43 API Security

PR.PT-4

PR.AA-06, PR.IR-01

M44 BAS (Breach and Attack Simulation)

ID.RA-4, ID.RA-3, ID.RA-1

ID.RA-01, ID.RA-03, ID.RA-04

M45 CDR (Content Disarm and Reconstruction)

DE.CM-5

DE.CM-09

M47 Data Flow Mapping Tool

ID.AM-3, DE.AE-1

ID.AM-03

M50 Backup and Recovery Systems

PR.IP-4, RC.RP-1

PR.DS-11, RC.RP-03

M51 Digital Forensic Software

RS.AN-3

RS.AN-03, RS.AN-06

M52 Secure Web Gateway

PR.AC-5

PR.IR-01, DE.CM-03

M53 Asset Management

ID.AM-1, ID.AM-2, PR.DS-3

ID.AM-01, ID.AM-02, ID.AM-08, PR.PS-03

M54 BMS (Building Management System)

DE.CM-2

DE.CM-02

M55 CASB (Cloud Access Security Broker)

DE.CM-3, ID.AM-4, PR.DS-5, ID.AM-2

DE.CM-03, ID.AM-04, PR.DS-01, ID.AM-02, PR.DS-02, PR.DS-10

M56 NAC (Network Access Control)

PR.AC-7

PR.AA-03

M57 Reverse Proxy

PR.AC-5

PR.IR-01

M62 Database Web Application Firewall

PR.AC-5

PR.IR-01

M64 GRC Personnel and Process

ID.GV-2, ID.GV-3, ID.GV-4

GV.RR-02, GV.RM-03, GV.RM-04, GV.OV-03, GV.OC-03

M155 Database Firewall

PR.DS-1, PR.DS-5

PR.DS-01, PR.DS-10

M157 DNS Security Tools

DE.AE-1, PR.PT-4, RS.MI-1

DE.CM-01

M160 Vendor Management

ID.AM-4, ID.SC-2, ID.SC-4, ID.SC-5, DE.CM-6

ID.AM-04, DE.CM-06, GV.SC-04, GV.SC-07, GV.SC-03, ID.RA-10, GV.OC-02

M163 File Integrity Monitoring (FIM)

PR.DS-6, DE.CM-7

DE.CM-09, PR.DS-01

M164 DNS Security

PR.IP-1, DE.CM-1, ID.AM-1

PR.AA-05, PR.DS-02, DE.CM-01, PR.PS-01

M165 DDoS Protection

ID.BE-5, PR.PT-5

PR.IR-04, DE.CM-01, RS.MI-01

M166 Micro segmentation

PR.AC-5

PR.AA-05, PR.IR-01, PR.PS-01

M167 SD-WAN

PR.AC-5

PR.AA-05, PR.PS-01

M168 Software Composition Analysis (SCA)

ID.RA-1, PR.IP-2

PR.AA-02, PR.PS-06, PR.AA-03, PR.PS-01

M169 API Security Platform

PR.AC-7, PR.AC-6

PR.AA-04, PR.DS-02, PR.AA-05, DE.CM-01

M170 Container Security

PR.IP-12, DE.CM-7

ID.RA-01, DE.CM-09, PR.PS-01, PR.PS-02

M171 Encryption Or Key Management (KMS Or HSM)

PR.DS-1, PR.DS-2, PR.DS-5, PR.AC-1

PR.DS-01, PR.DS-02, PR.DS-10, PR.AA-01

M172 Tokenization Or Data Masking

PR.DS-1, PR.DS-5

PR.DS-01, PR.DS-10

M173 User and Entity Behavior Analytics (UEBA)

DE.CM-3, DE.CM-7

DE.CM-03, DE.AE-02

M174 Incident Response Management Platform

RS.RP-1, RS.CO-2, RS.MI-1

RS.MA-01, RS.MA-04, RS.MA-05, RS.CO-02, RS.CO-03, RS.MI-01

M175 GRC Platform

ID.GV-1, ID.RM-1, ID.GV-2

GV.PO-02, GV.RM-01, GV.OV-03

M176 Risk Management Platform

ID.RA-1, ID.RM-1

GV.RM-01, GV.RM-02, GV.RM-03, GV.RM-06, GV.RM-07

M177 Phishing Simulation Platform

PR.AT-1, PR.AT-2

PR.AT-01, PR.AT-02

M178 Physical Access Control Systems (PACS)

PR.AC-3, PR.AC-2

PR.IR-02, PR.AA-06

M209 MFA Deployment

PR.AC-1, PR.AC-7

PR.AA-01, PR.AA-03, PR.AA-05

M213 CMDB Deployment

ID.AM-1, ID.AM-2

ID.AM-01, ID.AM-02

M216 Secret scanning

PR.AC-1, PR.DS-1

M220 AI security monitoring

ID.AM-2, DE.CM-8, PR.IP-1

M228 PSM (Privileged Session Monitoring & Recording)

PR.PT-1, DE.CM-7

PR.PS-04, DE.CM-06, DE.CM-03


Processes and Procedures

Documented, recurring security activities (policies, procedures, drills, reviews, and operational workflows) that contribute to maturity coverage when implemented.

130 supported mitigations.

Mitigation ID & Name

NIST CSF 1.1

NIST CSF 2.0

M1 Block network access

PR.AC-5

PR.IR-01

M6 Hash and Salt

PR.AC-1, PR.AC-7

PR.AA-01, PR.AA-03, PR.AA-05

M8 Sensitive data removal and credentials rotation

PR.AC-1, PR.AC-7, PR.AC-2

PR.AA-01, PR.AA-03, PR.AA-05, PR.AA-02

M17 Asset Removal

PR.DS-3

ID.AM-08, PR.PS-03

M18 Network segmentation and segregation

PR.AC-5

PR.IR-01

M20 Patching practice

ID.RA-1, PR.IP-12, DE.CM-8, ID.RA-2

ID.RA-01, PR.PS-02, ID.RA-06

M24 GPOs (Deploying hardened Group Policy Objects)

PR.IP-1, PR.PT-3

ID.RA-01, PR.PS-01, PR.PS-02

M38 Incident management and response

RS.CO-2, RS.AN-4

RS.CO-02, RS.MA-03

M41 Vendor management Processes

ID.AM-4, ID.SC-2, ID.SC-4, ID.SC-5, DE.CM-6

ID.AM-04, GV.SC-04, GV.SC-07, GV.SC-03, ID.RA-10

M46 Role based awareness training

PR.AT-1, PR.AT-2, PR.AT-3, PR.AT-5, PR.IP-2

PR.AT-01, PR.AT-02, PR.PS-06

M48 OT security

PR.IP-1, PR.PT-4

ID.IM-02, ID.IM-04, PR.AA-06, PR.IR-01

M58 Web asset hardening

PR.DS-6

PR.DS-01, DE.CM-09

M59 Periodic application security bug analysis

ID.RA-1, PR.IP-2

ID.RA-01, PR.PS-06

M61 Secure Software Development Life Cycle (SDLC)

PR.DS-7, PR.IP-2

PR.IR-01, PR.PS-06, ID.AM-08

M63 Periodic awareness training

PR.AT-1, PR.AT-2, PR.AT-3, PR.AT-4, PR.AT-5

PR.AT-01, PR.AT-02

M65 Implement and enforce a strong password policy

PR.AC-1, PR.AC-4

PR.AA-01, PR.AA-05

M66 Authentication enforcement

PR.AC-7

PR.AA-03

M67 Incident management procedure

DE.DP-1, RS.AN-1, RS.CO-1, RS.CO-2, RS.CO-4, RS.AN-2, RS.RP-1, RS.AN-4

RS.CO-03, RS.MA-02, RS.CO-02, RS.MA-01, RS.MA-05, RS.MA-03

M68 Device onboarding offboarding

ID.AM-1, PR.DS-3

ID.AM-01, ID.AM-08, PR.PS-03

M69 SAAS and on prem product catalog

ID.AM-2, ID.AM-4

ID.AM-02, ID.AM-04

M70 Data mapping

DE.AE-1

ID.AM-03

M71 New initiative security approval

ID.GV-1, ID.GV-2

ID.AM-08, GV.RR-02

M72 Crown jewels analysis

ID.AM-3, ID.AM-5, ID.BE-4

ID.AM-05, ID.AM-03, GV.OC-04, GV.OC-05

M73 Information security policy review and annual approval

ID.GV-1

GV.PO-02, GV.PO-01

M74 Supply chain self assessment

ID.BE-1, ID.BE-2

GV.SC-07

M75 RTO RPO policy

ID.BE-5

GV.OC-04

M76 C level management sponsorship

ID.GV-1, ID.GV-2

GV.RR-01

M77 Risk matrix annual review

ID.GV-4, ID.RA-3, ID.RA-4, ID.RA-5, ID.RA-6, ID.RM-1, ID.RM-2, ID.RM-3

ID.RA-03, ID.RA-04, ID.RA-05, ID.RA-06, GV.RM-03, GV.RM-06, GV.RM-02, GV.RM-04

M78 Vulnerability KPI tracking

ID.RA-1, PR.IP-12, RS.MI-3

ID.RA-01, ID.IM-03, GV.OV-03

M79 CTI signals handling process

ID.RA-2

ID.RA-02, DE.AE-07

M80 Risk management process

ID.RA-3, ID.RA-4, ID.RA-5, ID.RA-6, ID.RM-1, ID.RM-2, ID.RM-3

ID.RA-03, ID.RA-04, ID.RA-05, ID.RA-06, GV.RM-06, GV.RR-03, GV.RM-03, GV.RM-02, GV.RM-04, GV.RM-01

M81 Vendors onboarding procedure

ID.SC-1, ID.SC-2, ID.SC-3

ID.RA-10, GV.SC-06

M84 Employee onboarding offboarding Process

PR.AC-1, PR.AC-7, PR.IP-11

PR.AA-01, PR.AA-05, GV.RR-04

M85 User access review

PR.AC-1, PR.AC-4

PR.AA-01, PR.AA-05

M86 Visitors to physical sites procedure

PR.AC-2, PR.IP-5

PR.AA-06

M87 Vendor on site support procedure

PR.AC-2, PR.IP-5

PR.AA-06

M88 Physical security dispatch policies & procedures

PR.AC-2, PR.IP-5

PR.AA-06

M89 Vendors remote access procedure

PR.AC-3, DE.CM-6

DE.CM-06, PR.IR-01, PR.AA-03, PR.AA-05, GV.SC-07

M90 Change management procedure

PR.MA-1, PR.IP-3

ID.AM-08, PR.PS-01

M91 Inactive users review

PR.AC-1

PR.AA-01, PR.AA-05

M92 Data protection policy

PR.DS-1, PR.DS-2, PR.DS-5, PR.DS-8, PR.IP-6, PR.PT-2

PR.DS-01, PR.DS-02, PR.DS-10

M93 System capacity testing

PR.DS-4

PR.IR-04

M94 OT environment security strategy

PR.PT-4

PR.PS-01, PR.IR-01

M95 Restore process

RC.RP-1, PR.IP-4

RC.RP-01, RC.RP-03, RC.RP-05, RC.RP-02, PR.DS-11

M96 Restore drills

PR.IP-4, RC.RP-1, PR.IP-11

PR.DS-11, RC.RP-01, RC.RP-03, ID.IM-04

M97 Data disposal procedure

PR.IP-6

ID.AM-08

M98 Conditional access policy review

PR.AC-7

PR.AA-03, PR.AA-05

M99 DRP (Digital risk protection) annual review

PR.IP-9

ID.IM-04

M100 Screening procedure

PR.IP-11

GV.RR-04

M101 Security monitoring policy

PR.PT-1, DE.AE-2, DE.AE-4, DE.DP-1, DE.DP-2, DE.DP-4, DE.DP-5

PR.PS-04, DE.AE-02, DE.AE-06, DE.AE-08

M102 Alert handling process

DE.AE-2, DE.AE-3, DE.AE-4, DE.AE-5

DE.AE-02, DE.AE-03, DE.AE-04, DE.AE-08

M103 Cloud governance policy

PR.PT-3

PR.PS-01

M104 DR (Disaster Recovery) procedure

PR.PT-5

PR.IR-03, RC.RP-02, RC.RP-05

M105 Event handling process

RS.AN-2, DE.DP-1, DE.DP-2, DE.DP-4, RS.AN-1, RS.AN-3, RS.AN-4

GV.RR-02, DE.AE-02, DE.AE-04, RS.AN-06, DE.AE-06, RS.MA-02, RS.AN-03, DE.AE-08

M106 Escalation procedure

DE.AE-2, DE.AE-4

DE.AE-02, DE.AE-04, RS.MA-04, RS.CO-02

M107 Data source health verification process

DE.AE-3, DE.DP-2, PR.PT-1

DE.AE-03, PR.PS-04

M108 Severity criteria

DE.AE-4, DE.AE-5

DE.AE-04, DE.AE-08, RS.MA-05

M109 Alert improvement process

DE.DP-3, DE.DP-5

ID.IM-01, ID.IM-03

M110 Physical security policy and procedure

DE.CM-2, PR.AC-2

DE.CM-02, PR.AA-06

M111 Network agent review process

DE.CM-4, DE.DP-3

DE.AE-04

M112 Forensics package collection process

RS.AN-3

RS.AN-06, RS.AN-07

M114 SOC tiering structure

DE.DP-1

GV.RR-02, DE.AE-06

M115 SIEM change management process

DE.AE-5, DE.DP-2, DE.DP-3, DE.DP-5

ID.IM-02

M116 IRP (Incident Response Plan) annual update and approval

RS.IM-1, RS.IM-2, PR.IP-9

ID.IM-04, ID.IM-03

M117 IRP Communication Process

RS.CO-4

ID.IM-04, RS.CO-02, RS.CO-03

M118 Incident reporting procedure

RS.CO-2

RS.CO-02

M119 Information sharing procedure

RS.CO-5, RS.AN-5, ID.RA-2

RS.CO-03, ID.RA-08, ID.RA-02

M120 Host and network isolation process

RS.MI-1

RS.MI-01

M121 DDOS response process

RS.MI-1, PR.PT-5

RS.MI-01, PR.IR-03

M122 Forensics and mitigation planning

RS.AN-3, RS.MI-1

RS.AN-03, RS.AN-06

M123 Post mortem process

RS.IM-1, RS.IM-2

ID.IM-03, ID.IM-04

M124 BCP annual update and approval

RC.RP-1, PR.IP-9, RC.CO-3

RC.RP-01, ID.IM-04, ID.IM-03, RC.CO-03

M125 BCP is communicated

RC.CO-3

ID.IM-04

M126 Maintenance procedures

PR.MA-1, PR.MA-2

ID.AM-08, PR.PS-03, PR.PS-02

M127 Privileged accounts hardening

PR.MA-1, PR.AC-4

ID.AM-08, PR.PS-03, PR.AA-05

M128 Remote support procedure

PR.MA-2, PR.AC-3

ID.AM-08, PR.PS-02, PR.AA-03, PR.AA-05, PR.IR-01

M129 Security controls roles and responsibilities

ID.AM-4

GV.RR-02, GV.RR-03, PR.AT-02

M130 Central management (centralized security management)

ID.AM-1, ID.AM-2

ID.AM-01, ID.AM-02

M131 Security steering committee

ID.BE-3

GV.OV-01, GV.OV-02, GV.RR-01

M132 KPIs are defined

ID.BE-3

GV.OV-01, GV.OV-03

M134 Annual risk management review committee

ID.RM-1, ID.RM-2, ID.RM-3, ID.GV-4, ID.RA-3, ID.RA-4, ID.RA-5, ID.RA-6

GV.RM-02, GV.RM-04, GV.RM-03, GV.RM-01, GV.OV-02, GV.RR-01, GV.OV-03, GV.OV-01

M135 Policy communication to the organization

ID.GV-1

GV.PO-01, GV.PO-02

M136 IR (Incident response) drills

ID.SC-5

GV.SC-08, ID.IM-02

M137 Legal security communication process

ID.GV-3

GV.OC-03

M138 KPIs communication policy

PR.IP-7, PR.IP-8

ID.IM-03

M139 Phishing campaigns program

PR.AT-1

PR.AT-01

M141 New security initiative approval

PR.PT-3

PR.PS-01, ID.AM-08

M142 Red team drills

DE.DP-3, DE.DP-5, PR.IP-10

ID.IM-02, ID.IM-04

M143 Purple team drills

DE.AE-5, DE.DP-3, RS.AN-2, RS.AN-4, DE.AE-2, DE.DP-5

ID.IM-02, ID.IM-04

M144 BCP (Business Continuity Plan) drills

PR.IP-10, RC.RP-1

ID.IM-02, ID.IM-04, RC.RP-01

M146 Response plan drills

RS.IM-1, RS.RP-1, RS.CO-1, RS.CO-3, RS.CO-4, PR.IP-10, RS.IM-2

ID.IM-04

M148 BCP (Business Continuity Planning) policy

RC.RP-1

RC.RP-01, RC.RP-02, RC.RP-06

M150 C level tabletop drills

RS.MI-1, RS.MI-2, PR.AT-4

PR.AT-02, RS.MI-02

M151 SOD (Segregation of duties)

ID.GV-2, ID.AM-6

GV.RR-02, GV.SC-02

M152 Roles and responsibilities definition

ID.GV-2, ID.AM-6

GV.RR-02, GV.RR-03, GV.SC-02, PR.AT-02

M153 Information sharing policy

PR.DS-5

PR.DS-02, PR.DS-10, PR.DS-01

M154 DAM (Database activity monitoring)

PR.DS-1, PR.DS-5

PR.DS-01, PR.DS-10

M156 Employee internal mobility procedure

PR.AC-4, PR.IP-11

PR.AA-05, GV.RR-04

M158 System hardening procedure

PR.IP-1, PR.PT-3

PR.PS-01, PR.PS-05

M159 SOC playbooks and investigation procedure

DE.CM-1, DE.CM-3, DE.CM-4, DE.CM-5, DE.CM-7, DE.DP-2, RS.MI-2

DE.CM-01, DE.CM-09, DE.CM-03, DE.CM-06, RS.MI-02

M179 Threat Modeling Process

ID.RA-3, ID.RA-4, ID.RA-5

ID.RA-03, ID.RA-04, ID.RA-05

M180 Security Architecture Review Process

PR.PT-3

PR.PS-01, ID.AM-08

M181 Security Exception Or Risk Acceptance Process

ID.RM-1, ID.RA-1

GV.RM-01, GV.RM-02, GV.RM-03, GV.RM-06, GV.RM-07

M182 Data Retention Process

PR.IP-6, PR.DS-1, PR.DS-5

PR.DS-01, PR.DS-02, PR.DS-10

M183 Application Security Deployment Review

PR.IP-2, PR.DS-1, PR.IP-12

ID.RA-01, DE.CM-09, PR.PS-06

M184 Mobile Device Security Process

PR.PT-3, PR.IP-1

PR.PS-01

M186 Insider Threat Detection Process

DE.CM-3, DE.CM-7

DE.AE-02, DE.CM-03

M187 Security Awareness Effectiveness Measurement Process

PR.AT-1, PR.AT-2, PR.AT-4

PR.AT-01, PR.AT-02

M193 Threat hunting

DE.AE-2, DE.AE-5, DE.CM-1, DE.CM-2, DE.CM-3, DE.CM-6, DE.CM-7, DE.DP-4

DE.AE-02, DE.AE-06, DE.AE-08, DE.CM-01, DE.CM-02, DE.CM-03, DE.CM-06, DE.CM-09

M194 Exposure Management

ID.RA-1, ID.RA-2, ID.RA-5

ID.RA-01, ID.RA-02, ID.RA-05

M195 Security Governance

ID.GV-1

GV.PO-01

M198 SSDLC Improvement

PR.IP-2

PR.PS-06

M200 Incident Readiness

ID.GV-1, PR.IP-9, RS.CO-2, RS.CO-3, RS.RP-1

GV.PO-02, ID.IM-04, RS.MA-01, RS.CO-02, RS.CO-03

M201 Data Classification and protection

PR.DS-1

PR.DS-01

M204 Internet Perimeter

PR.IP-1, PR.AC-5

M205 IR Tabletop Exercises

PR.IP-9, ID.SC-5, PR.IP-10, PR.AT-2, PR.AT-3, PR.AT-4

ID.IM-04, GV.SC-08, ID.IM-02, PR.AT-01

M206 Third-Party Risk Management

ID.SC-1, ID.SC-2, ID.SC-3, ID.SC-4, ID.SC-5

GV.SC-01, GV.SC-03, GV.SC-04, GV.SC-05, GV.SC-06, GV.SC-07, GV.SC-08, GV.SC-09, GV.SC-10, GV.RM-05, ID.RA-10

M210 IdP & Email Hardening

ID.AM-3, DE.AE-3, DE.CM-1

M211 Backup Protection

PR.IP-4

PR.DS-11

M212 SOC Uplift

DE.CM-1, DE.CM-3, DE.CM-6, DE.CM-7

DE.CM-01, DE.CM-03, DE.CM-06, DE.CM-09

M214 Application Assessments program

PR.IP-3, PR.IP-1

M215 Cloud Risk Assessment program

ID.RA-1, ID.RA-3, ID.RA-5, ID.RA-6

ID.RA-01, ID.RA-05, ID.RA-06, ID.IM-01

M217 Architecture mapping

ID.AM-3

ID.AM-03

M218 Application Threat Modeling Procedure

ID.RA-3, ID.RA-5

ID.RA-03, ID.RA-05

M221 AI Policy implementation

PR.IP-12, DE.CM-8

M222 AI secure development procedure

PR.IP-2, PR.DS-6

PR.PS-06

M223 Vulnerability Management Process

ID.RA-1, ID.RA-5, ID.RA-6, RS.AN-5

ID.RA-01, ID.RA-05, ID.RA-06, ID.RA-08

M224 Cyber Insurance

ID.GV-3, ID.GV-4

GV.OC-03, GV.RM-04

M225 Cyber Intelligence Service

ID.RA-2

ID.RA-02

M226 Executive Cyber Risk & Security Reporting

ID.GV-4

GV.OV-01, GV.OV-03


People

Workforce-driven mitigations covering awareness, security roles, and advisory services.

4 supported mitigations.

Mitigation ID & Name

NIST CSF 1.1

NIST CSF 2.0

M203 Awareness Program

PR.AT-1, PR.AT-2

PR.AT-01, PR.AT-02

M207 Security Personnel

ID.GV-2, ID.RM-1

GV.RR-03, GV.RR-02

M208 vCISO Services

ID.GV-2, ID.RM-1

GV.RR-03, GV.RR-02

M219 Developers secure training program

PR.AT-2

PR.AT-02


Wrap-up / Next Steps

  • Open the Assets page in the Cye Platform to see which of these mitigations are linked to your environment.

  • Use the Unmapped Framework filter to find technologies and processes that haven't yet been associated with a NIST subcategory.

  • Review the Technologies and Processes maturity articles to understand how each linked mitigation contributes to your score.

  • Create a finding when a mitigation provides only partial coverage. See Understanding Maturity — How Progress Drives Your Score.

Did this answer your question?