CyFun BasicIdentify
Identify
Asset management, governance, and risk assessment controls
Overview
The Identify function helps develop an organisational understanding of how to manage cybersecurity risks related to systems, people, assets, data, and capabilities.
Categories
Asset Management (ID.AM)
The data, personnel, devices, systems, and facilities that enable the organisation to achieve business purposes are identified and managed.
| Control | Description | Status | Maturity |
|---|---|---|---|
| ID.AM-1 | Physical device inventory | Implemented | L2 |
| ID.AM-2 | Software inventory | Implemented | L2 |
| ID.AM-3 | Communication and data flows mapped | Implemented | L2 |
| ID.AM-4 | External information systems catalogued | Implemented | L2 |
| ID.AM-5 | Resources prioritised | Implemented | L2 |
Governance (ID.GV)
The policies and procedures to manage and monitor regulatory, legal, risk, environmental, and operational requirements.
| Control | Description | Status | Maturity |
|---|---|---|---|
| ID.GV-1 | Cybersecurity policy established | Implemented | L2 |
| ID.GV-3 | Legal requirements understood | Implemented | L2 |
| ID.GV-4 | Risk management processes | Partial | L2 |
Risk Assessment (ID.RA)
The organisation understands cybersecurity risk to operations, assets, and individuals.