1. 1. Inventory and Control of Enterprise Assets
    1. 1.1 Identify: Establish and Maintain Detailed Enterprise Asset Inventory
    2. 1.2 Respond: Address Unauthorized Assets
    3. 1.3 Detect: Utilize an Active Discovery Tool
    4. 1.4 Identify: Use Dynamic Host Configuration Protocol (DHCP) Logging to Update Enterprise Asset Inventory
    5. 1.5 Detect: Use a Passive Asset Discovery Tool
  2. 2. Inventory and Control of Software Assets
    1. 2.1 Identify: Establish and Maintain a Software Inventory
    2. 2.2 Identify: Ensure Authorized Software is Currently Supported
    3. 2.3 Respond: Address Unauthorized Software
    4. 2.4 Detect: Utilize Automated Software Inventory Tools
    5. 2.5 Protect: Allowlist Authorized Software
    6. 2.6 Protect: Allowlist Authorized Libraries
    7. 2.7 Protect: Allowlist Authorized Scripts
  3. 3. Data Protection
    1. 3.1 Identify: Establish and Maintain a Data Management Process
    2. 3.2 Identify: Establish and Maintain a Data Inventory
    3. 3.3 Protect: Configure Data Access Control Lists
    4. 3.4 Protect: Enforce Data Retention
    5. 3.5 Protect: Securely Dispose of Data
    6. 3.6 Protect: Encrypt Data on End-User Devices
    7. 3.7 Identify: Establish and Maintain a Data Classification Scheme
    8. 3.8 Identify: Document Data Flows
    9. 3.9 Protect: Encrypt Data on Removable Media
    10. 3.10 Protect: Encrypt Sensitive Data in Transit
    11. 3.11 Protect: Encrypt Sensitive Data at Rest
    12. 3.12 Protect: Segment Data Processing and Storage Based on Sensitivity
    13. 3.13 Protect: Deploy a Data Loss Prevention Solution
    14. 3.14 Detect: Log Sensitive Data Access
  4. 4. Secure Configuration of Enterprise Assets and Software
    1. 4.1 Protect: Establish and Maintain a Secure Configuration Process
    2. 4.2 Protect: Establish and Maintain a Secure Configuration Process for Network Infrastructure
    3. 4.3 Protect: Configure Automatic Session Locking on Enterprise Assets
    4. 4.4 Protect: Implement and Manage a Firewall on Servers
    5. 4.5 Protect: Implement and Manage a Firewall on End-User Devices
    6. 4.6 Protect: Securely Manage Enterprise Assets and Software
    7. 4.7 Protect: Manage Default Accounts on Enterprise Assets and Software
    8. 4.8 Protect: Uninstall or Disable Unnecessary Services on Enterprise Assets and Software
    9. 4.9 Protect: Configure Trusted DNS Servers on Enterprise Assets
    10. 4.10 Respond: Enforce Automatic Device Lockout on Portable End-User Devices
    11. 4.11 Protect: Enforce Remote Wipe Capability on Portable End-User Devices
    12. 4.12 Protect: Separate Enterprise Workspaces on Mobile End-User Devices
  5. 5. Account Management
    1. 5.1 identify: Establish and Maintain an Inventory of Accounts
    2. 5.2 Protect: Use Unique Passwords
    3. 5.3 Respond: Disable Dormant Accounts
    4. 5.4 Protect: Restrict Administrator Privileges to Dedicated Administrator Accounts
    5. 5.5 Identify: Establish and Maintain an Inventory of Service Accounts
    6. 5.6 Protect: Centralize Account Management
  6. 6. Access Control Management
    1. 6.1 Protect: Establish an Access Granting Process
    2. 6.2 Protect: Establish an Access Revoking Process
    3. 6.3 Protect: Require MFA for Externally-Exposed Applications
    4. 6.4 Protect: Require MFA for Remote Network Access
    5. 6.5 Protect: Require MFA for Administrative Access
    6. 6.6 Identify: Establish and Maintain an Inventory of Authentication and Authorization Systems
    7. 6.5 Protect: Centralize Access Control
    8. 6.8 Protect: Define and Maintain Role-Based Access Control
  7. 7. Continuous Vulnerability Management
    1. 7.1 Protect: Establish and Maintain a Vulnerability Management Process
    2. 7.2 Respond: Establish and Maintain a Remediation Process
    3. 7.3 Protect: Perform Automated Operating System Patch Management
    4. 7.4 Protect: Perform Automated Application Patch Management
    5. 7.5 Identify: Perform Automated Vulnerability Scans of Internal Enterprise Assets
    6. 7.6 Identify: Perform Automated Vulnerability Scans of Externally-Exposed Enterprise Assets
    7. 7.7 Respond: Remediate Detected Vulnerabilities
  8. 8. Audit Log Management
    1. 8.1 Protect: Establish and Maintain an Audit Log Management Process
    2. 8.2 Detect: Collect Audit Logs
    3. 8.3 Protect: Ensure Adequate Audit Log Storage
    4. 8.4 Protect: Standardize Time Synchronization
    5. 8.5 Detect: Collect Detailed Audit Logs
    6. 8.6 Detect: Collect DNS Query Audit Logs
    7. 8.7 Detect: Collect URL Request Audit Logs
    8. 8.8 Detect: Collect Command-Line Audit Logs
    9. 8.9 Detect: Centralize Audit Logs
    10. 8.10 Protect: Retain Audit Logs
    11. 8.11 Detect: Conduct Audit Log Reviews
    12. 8.12 Detect: Collect Service Provider Logs
  9. 9. Email and Web Browser Protections
    1. 9.1 Protect: Ensure Use of Only Fully Supported Browsers and Email Clients
    2. 9.2 Protect: Use DNS Filtering Services
    3. 9.3 Protect: Maintain and Enforce Network-Based URL Filters
    4. 9.4 Protect: Restrict Unnecessary or Unauthorized Browser and Email Client Extensions
    5. 9.5 Protect: Implement DMARC
    6. 9.6 Protect: Block Unnecessary File Types
    7. 9.7 Protect: Deploy and Maintain Email Server Anti-Malware Protections
  10. 10. Malware Defenses
    1. 10.1 Protect: Deploy and Maintain Anti-Malware Software
    2. 10.2 Protect: Configure Automatic Anti-Malware Signature Updates
    3. 10.3 Protect: Disable Autorun and Autoplay for Removable Media
    4. 10.4 Detect: Configure Automatic Anti-Malware Scanning of Removable Media
    5. 10.5 Protect: Enable Anti-Exploitation Features
    6. 10.6 Protect: Centrally Manage Anti-Malware Software
    7. 10.7 Detect: Use Behavior-Based Anti-Malware Software
  11. 11. Data Recovery
    1. 11.1 Recover: Establish and Maintain a Data Recovery Process 
    2. 11.2 Recover: Perform Automated Backups 
    3. 11.3 Protect: Protect Recovery Data
    4. 11.4 Recover: Establish and Maintain an Isolated Instance of Recovery Data 
    5. 11.5 Recover: Test Data Recovery
  12. 12. Network Infrastructure Management
    1. 12.1 Protect: Ensure Network Infrastructure is Up-to-Date
    2. 12.2 Protect: Establish and Maintain a Secure Network Architecture
    3. 12.3 Protect: Securely Manage Network Infrastructure
    4. 12.4 Identity: Establish and Maintain Architecture Diagram(s)
    5. 12.5 Protect: Centralize Network Authentication, Authorization, and Auditing (AAA)
    6. 12.6 Protect: Use of Secure Network Management and Communication Protocols 
    7. 12.7 Protect: Ensure Remote Devices Utilize a VPN and are Connecting to an Enterprise’s AAA Infrastructure
    8. 12.8 Protect: Establish and Maintain Dedicated Computing Resources for All Administrative Work
  13. 13. Network Monitoring and Defense
    1. 13.1 Detect: Centralize Security Event Alerting
    2. 13.2 Detect: Deploy a Host-Based Intrusion Detection Solution
    3. 13.3 Detect: Deploy a Network Intrusion Detection Solution
    4. 13.4 Protect: Perform Traffic Filtering Between Network Segments
    5. 13.5 Protect: Manage Access Control for Remote Assets
    6. 13.6 Detect: Collect Network Traffic Flow Logs
    7. 13.7 Protect: Deploy a Host-Based Intrusion Prevention Solution
    8. 13.8 Protect: Deploy a Network Intrusion Prevention Solution
    9. 13.9 Protect: Deploy Port-Level Access Control
    10. 13.10 Protect: Perform Application Layer Filtering
    11. 13.11 Detect: Tune Security Event Alerting Thresholds
  14. 14. Security Awareness and Skills Training
    1. 14.1 Protect: Establish and Maintain a Security Awareness Program
    2. 14.2 Protect: Train Workforce Members to Recognize Social Engineering Attacks
    3. 14.3 Protect: Train Workforce Members on Authentication Best Practices
    4. 14.4 Protect: Train Workforce on Data Handling Best Practices
    5. 14.5 Protect: Train Workforce Members on Causes of Unintentional Data Exposure
    6. 14.6 Protect: Train Workforce Members on Recognizing and Reporting Security Incidents
    7. 14.7 Protect: Train Workforce on How to Identify and Report if Their Enterprise Assets are Missing Security Updates
    8. 14.8 Protect: Train Workforce on the Dangers of Connecting to and Transmitting Enterprise Data Over Insecure Networks
    9. 14.9 Protect: Conduct Role-Specific Security Awareness and Skills Training
  15. 15. Service Provider Management
    1. 15.1 Identify: Establish and Maintain an Inventory of Service Providers
    2. 15.2 Identify: Establish and Maintain a Service Provider Management Policy
    3. 15.3 Identify: Classify Service Providers
    4. 15.4 Protect: Ensure Service Provider Contracts Include Security Requirements
    5. 15.5 Identify: Assess Service Providers
    6. 15.6 Detect: Monitor Service Providers
    7. 15.7 Protect: Securely Decommission Service Providers
  16. 16. Application Software Security
    1. 16.1 Protect: Establish and Maintain a Secure Application Development Process
    2. 16.2 Protect: Establish and Maintain a Process to Accept and Address Software Vulnerabilities
    3. 16.3 Protect: Perform Root Cause Analysis on Security Vulnerabilities
    4. 16.4 Protect: Establish and Manage an Inventory of Third-Party Software Components
    5. 16.5 Protect: Use Up-to-Date and Trusted Third-Party Software Components
    6. 16.6 Protect: Establish and Maintain a Severity Rating System and Process for Application Vulnerabilities
    7. 16.7 Protect: Use Standard Hardening Configuration Templates for Application Infrastructure
    8. 16.8 Protect: Separate Production and Non-Production Systems
    9. 16.9 Protect: Train Developers in Application Security Concepts and Secure Coding
    10. 16.10 Protect: Apply Secure Design Principles in Application Architectures
    11. 16.11 Protect: Leverage Vetted Modules or Services for Application Security Components
    12. 16.12 Protect: Implement Code-Level Security Checks
    13. 16.13 Protect: Conduct Application Penetration Testing
    14. 16.14 Protect: Conduct Threat Modeling
  17. 17. Incident Response Management
    1. 17.1 Respond: Designate Personnel to Manage Incident Handling
    2. 17.2 Respond: Establish and Maintain Contact Information for Reporting Security Incidents
    3. 17.3 Respond: Establish and Maintain an Enterprise Process for Reporting Incidents
    4. 17.4 Respond: Establish and Maintain an Incident Response Process
    5. 17.5 Respond: Assign Key Roles and Responsibilities
    6. 17.6 Respond: Define Mechanisms for Communicating During Incident Response
    7. 17.7 Recover: Conduct Routine Incident Response Exercises
    8. 17.8 Recover: Conduct Post-Incident Reviews
    9. 17.9 Recover: Establish and Maintain Security Incident Thresholds
  18. 18. Penetration Testing
    1. 18.1 identify: Establish and Maintain a Penetration Testing Program
    2. 18.2 Identify: Perform Periodic External Penetration Tests
    3. 18.3 Protect: Remediate Penetration Test Findings
    4. 18.4 Protect: Validate Security Measures
    5. 18.5 Identify: Perform Periodic Internal Penetration Tests
  19. April 2024 V 1.0
  20. IG2 (Incluye IG1): Una empresa IG2 emplea a individuos responsables de administrar y proteger la infraestructura de TI.
  21. IG3 (Incluye IG1 e IG2): Una empresa IG3 emplea expertos en seguridad los cuales se especializan en diferentes facetas de la ciberseguridad (por ejemplo, gestión de riesgo, pruebas de penetración, seguridad en las aplicaciones).
  22. IG1: Una empresa IG1 es de tamaño pequeña a mediana con experiencia limitada en TI y ciberseguridad para dedicarse a proteger los activos y personal de TI.