↓ Skip to Main Content
CSC Logo

Cyber Security Center

Main Navigation

  • Home
  • NIST CSF
    • What is NIST CSF ?
    • Govern (GV)
      • Organizational Context (GV.OC)
      • Risk Management Strategy (GV.RM)
      • Cybersecurity Supply Chain Risk Management (GV.SC)
      • Roles, Responsibilities, and Authorities (GV.RR)
      • Policies, Processes, and Procedures (GV.PO)
      • Oversight (GV.OV)
    • Identify (ID)
      • Asset Management (ID.AM)
      • Risk Assessment (ID.RA)
      • Improvement (ID.IM)
    • Protect (PR)
      • Identity Management, Authentication, and Access Control (PR.AA)
      • Awareness and Training (PR.AT)
      • Data Security (PR.DS)
      • Platform Security (PR.PS)
      • Technology Infrastructure Resilience (PR.IR)
    • Detect (DE)
      • Continuous Monitoring (DE.CM)
      • Adverse Event Analysis (DE.AE)
    • Respond (RS)
      • Incident Management (RS.MA)
      • Incident Analysis (RS.AN)
      • Incident Response Reporting and Communication (RS.CO)
      • Incident Mitigation (RS.MI)
    • Recover (RC)
      • Incident Recovery Plan Execution (RC.RP)
      • Incident Recovery Communication (RC.CO)
  • Memorable Images
  • Does and Don’ts
  • Security Awareness

Category: Organizational Context (GV.OC)

The circumstances — mission, stakeholder expectations, and legal, regulatory, and contractual requirements — surrounding the organization’s cybersecurity risk management decisions are understood.

GV.OC-05: Do you have a record of external resources that could affect your organization ?

GV.OC-05: Do you have a record of external resources that could affect your organization ?

GV.OC-05: Outcomes, capabilities, and services that the organization depends on are determined and communicated Implementation Examples Example 1: Create …

GV.OC-05: Do you have a record of external resources that could affect your organization ? Read more »

Share this Post
Posted on December 28, 2023

GV.OC-04: Do you know and share what stakeholders expect from the organization ?

GV.OC-04: Do you know and share what stakeholders expect from the organization ?

GV.OC-04: Critical objectives, capabilities, and services that stakeholders depend on or expect from the organization are determined and …

GV.OC-04: Do you know and share what stakeholders expect from the organization ? Read more »

Share this Post
Posted on December 28, 2023

GV.OC-03: How to manage legal, regulatory, and cybersecurity obligations ?

GV.OC-03: How to manage legal, regulatory, and cybersecurity obligations ?

GV.OC-03: Legal, regulatory, and contractual requirements regarding cybersecurity – including privacy and civil liberties obligations – are understood …

GV.OC-03: How to manage legal, regulatory, and cybersecurity obligations ? Read more »

Share this Post
Posted on December 23, 2023

GV.OC-02: How to determine stakeholders for cybersecurity risk management ?

GV.OC-02: How to determine stakeholders for  cybersecurity risk management ?

GV.OC-02: Internal and external stakeholders are determined, and their needs and expectations regarding cybersecurity risk management are understood. …

GV.OC-02: How to determine stakeholders for cybersecurity risk management ? Read more »

Share this Post
Posted on December 23, 2023

GV.OC-01: How does your organization should share its mission to identify cybersecurity risks ?

GV.OC-01: How does your organization should share its mission to identify cybersecurity risks ?

GV.OC-01: The organizational mission is understood and informs cybersecurity risk management. Example 1: Share the organization’s mission (e.g., …

GV.OC-01: How does your organization should share its mission to identify cybersecurity risks ? Read more »

Share this Post
Posted on December 22, 2023

Search

Recent Posts

  • GV.RM-01: Do you know the cybersecurity risk objectives for your organization ?
  • GV.OC-05: Do you have a record of external resources that could affect your organization ?
  • GV.OC-04: Do you know and share what stakeholders expect from the organization ?

Footer Menu

  • Home
  • Authorization
  • Least Privilege
  • Authentication
  • Zero Trust
  • Unauthorized Access
  • Password
  • Multi Factor Authentication (MFA)
  • Artificial intelligence (AI)
  • Social Media
  • Secure Software Development Life Cycle (SSDLC)
  • Phishing Attack
  • Need to Know Principal
  • Permission Matrix
© 2025 Cyber Security Center | Powered by Responsive Theme
Top