Set Theory Relationship Mapping (STRM)
Starting with release 2024.1, the SCF now leverages the Set Theory Relationship Mapping (STRM) for crosswalk mapping, since STRM is generally well-suited to evaluate cybersecurity and data privacy laws, regulations and frameworks. With the publishing of NIST IR 8477, Mapping Relationships Between Documentary Standards, Regulations, Frameworks, and Guidelines: Developing Cybersecurity and Privacy Concept Mappings it establishes the US Government's playbook for how to perform crosswalk mapping between different cybersecurity and data privacy laws, regulations and frameworks. This document is part of NIST’s broader NIST OLIR Program that is an “effort to facilitate Subject Matter Experts (SMEs) in defining standardized online informative references (OLIRs) between elements of their documents, products, and services and elements of NIST documents…” The SCF currently participates in the National Online Informative References (OLIR) Program and with NIST's preference for STRM, we decided an aligned crosswalk mapping methodology makes sense.
Expert-Derived Content (EDC) vs Natural Language Processing (NLP)
What NIST IR 8477 does is provide the “gold standard” practice for how an individual can perform crosswalk mapping with no technology needed, where it can literally be performed with a pencil and piece of paper. Children learn the process of diagramming sentences in grade school (e.g., Reed–Kellogg model) with pencils and paper. This is the process of graphically identifying nouns, verbs, adjectives and modifiers to teach proper sentence structure for how various components of language work together to communicate an idea. With the advent of Artificial Intelligence (AI), the ability to diagram sentences in both computer and human-readable format is achievable through Natural Language Processing (NLP). From a cybersecurity crosswalking perspective, NLP can be used to evaluate a control statement (e.g., must have firewall) to identify the noun (e.g., firewall) and verb (e.g., must have) to determine the relative strength it maps to a different control (e.g., shall have network defense appliances). Where that becomes interesting is both in protecting the underlying content (e.g., Intellectual Property (IP)) and patentability.
While the SCF leverages expert-derived content (e.g., human subject-matter experts), other solutions use NLP to create their crosswalk mapping. One significant downside for those solutions leveraging NLP is their forfeit of IP since AI-generated content is currently prohibited from copyright protections due to the content not being the work of a human creator. Therefore, NLP-generated content could be considered free content from an IP perspective, since a copyright of AI-generated content would not be enforceable.
Where it gets even more fascinating with AI-based solutions in the compliance space is with patentability for inventions due to the "mental steps" doctrine. In 2014, the US Supreme Court ruled that inventions are ineligible for patenting if the patent claim is something a human could do in their mind or with paper and pencil (e.g., a human performing sentence diagramming on a piece of paper and comparing the results of that sentence diagram with another). That landmark case (Alice Corp. v. CLS Bank International) established a new uncertainty about patent eligibility of AI and machine learning technologies. The result of Alice is that patents issued for compliance solutions leveraging NLP to perform crosswalk mapping may not hold up to scrutiny by the Patent Trial and Appeal Board (PTAB) given NIST published a document that describes how to perform crosswalk mapping without the assistance of technology.
How The SCF Is Utilizing STRM
You can click on the image below to see a PDF version of how the SCF is utilizing STRM, as well as an example for what that looks like with a few NIST CSF 2.0 controls:
STRM Examples
You can purchase Excel versions of the Set Theory Relationship Mappings (STRM) mappings at the SCF Store. The list of Set Theory Relationship Mappings (STRM) for 2024.3 include the following:
- AICPA Trust Services Criteria (TSC) (e.g.) SOC2 (2022 points of focus) - https://securecontrolsframework.com/content/strm/scf-2024-3-tsc-2017.pdf
- CIS Critical Security Controls (CSC) v8.0 - https://securecontrolsframework.com/content/strm/scf-2024-3-cis-csc-8-0.pdf
- IEC TR 60601-4-5:2021 - https://securecontrolsframework.com/content/strm/scf-2024-3-iec-tr-60601-4-5.pdf
- ISO/IEC 27001:2022 - Information Security Management Systems (ISMS) - Requirements - https://securecontrolsframework.com/content/strm/scf-2024-3-iso-27001-2022.pdf
- ISO/IEC 27002:2022 - Information security, cybersecurity and privacy protection - Information security controls - https://securecontrolsframework.com/content/strm/scf-2024-3-iso-27002-2022.pdf
- ISO/IEC 42001:2023 - Information technology - Artificial intelligence - Management system - https://securecontrolsframework.com/content/strm/scf-2024-3-iso-42001-2023.pdf
- NIST SP 800-53 R5.1.1 - Security and Privacy Controls for Information Systems and Organizations - https://securecontrolsframework.com/content/strm/scf-2024-3-nist-800-53-r5-1-1.pdf
- NIST SP 800-66 R2 - Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule: A Cybersecurity Resource Guide - https://securecontrolsframework.com/content/strm/scf-2024-3-nist-800-66-r2.pdf
- NIST SP 800-161 R1 - Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations - https://securecontrolsframework.com/content/strm/scf-2024-3-nist-800-161-r1.pdf
- NIST SP 800-171 R2 - Protecting CUI in Nonfederal Systems and Organizations - https://securecontrolsframework.com/content/strm/scf-2024-3-nist-800-171-r2.pdf
- NIST SP 800-171 R3 - https://securecontrolsframework.com/content/strm/scf-2024-3-nist-800-171-r3.pdf
- NIST SP 800-171A - Assessing Security Requirements for Controlled Unclassified Information - https://securecontrolsframework.com/content/strm/scf-2024-3-nist-800-171a.pdf
- NIST SP 800-171A R3 - https://securecontrolsframework.com/content/strm/scf-2024-3-nist-800-171a-r3.pdf
- NIST SP 800-207 - Zero Trust Architecture - https://securecontrolsframework.com/content/strm/scf-2024-3-nist-800-207.pdf
- NIST SP 800-218 - Secure Software Development Framework (SSDF) Version 1.1: - https://securecontrolsframework.com/content/strm/scf-2024-3-nist-800-218.pdf
- NIST Cybersecurity Framework (NIST CSF 2.0) - https://securecontrolsframework.com/content/strm/scf-2024-3-nist-csf-2-0.pdf
- Payment Card Industry Data Security Standard (PCI DSS) - https://securecontrolsframework.com/content/strm/scf-2024-3-pci-dss-4-0.pdf
- Space Attack Research & Tactic Analysis (SPARTA) Countermeasures - https://securecontrolsframework.com/content/strm/scf-2024-3-sparta.pdf
- Trusted Information Security Assessment Exchange (TISAX) Information Security Assessment (ISA) - https://securecontrolsframework.com/content/strm/scf-2024-3-tisax-6-0-3.pdf
- US DOJ / FBI - Criminal Justice Information Services (CJIS) Security Policy - https://securecontrolsframework.com/content/strm/scf-2024-3-cjis-5-9-3.pdf
- Cybersecurity Maturity Model Certification (CMMC) - https://securecontrolsframework.com/content/strm/scf-2024-3-cmmc-2-level-1.pdf
- DoD Zero Trust Reference Architecture v2 - https://securecontrolsframework.com/content/strm/scf-2024-3-dod-zta-reference-architecture-2-0.pdf
- Department of Homeland Security (DHS) Cybersecurity and Infrastructure Security Agency (CISA) Trusted Internet Connections 3.0 Security Capabilities Catalog - https://securecontrolsframework.com/content/strm/scf-2024-3-dhs-cis-tic-3-0.pdf
- Department of Homeland Security (DHS) Zero Trust Capability Framework (ZTCF) - https://securecontrolsframework.com/content/strm/scf-2024-3-dhs-ztcf.pdf
- Federal Acquisition Regulation (FAR) 52.204.21- https://securecontrolsframework.com/content/strm/scf-2024-3-cmmc-2-level-1.pdf
- Gramm Leach Bliley Act (GLBA) - CFR 314 - https://securecontrolsframework.com/content/strm/scf-2024-3-glba-cfr-314.pdf
- SEC Cybersecurity Final Rule (Cybersecurity Risk Management, Strategy, Governance, and Incident Disclosure) - 17 CFR Parts 229, 232, 239, 240, and 249 - https://securecontrolsframework.com/content/strm/scf-2024-3-sec-cybersecurity-rule.pdf
- NY Cybersecurity Requirements for Financial Services Companies (NY DFS 23 NYCRR500) - 2023 Amendment 2 - https://securecontrolsframework.com/content/strm/scf-2024-3-ny-dfs-23-nycrr500-amd2.pdf
- Tennessee Information Protection Act - https://securecontrolsframework.com/content/strm/scf-2024-3-tn-information-protection-act.pdf
- Canada B-13 - https://securecontrolsframework.com/content/strm/scf-2024-3-canada-OSFI-B13.pdf
- EU Digital Operational Resilience Act (DORA) - https://securecontrolsframework.com/content/strm/scf-2024-3-dora.pdf
- ENISA NIS2 (Directive (EU) 2022/2555) - https://securecontrolsframework.com/content/strm/scf-2024-3-nis2.pdf
- Spain Royal Decree 311/2022 - https://securecontrolsframework.com/content/strm/scf-2024-3-spain-boe-a-2022-7191.pdf
- Australia Essential Eight - https://securecontrolsframework.com/content/strm/scf-2024-3-australia-essential-8.pdf
- Australian Government Information Security Manual (ISM) June 2024 - https://securecontrolsframework.com/content/strm/scf-2024-3-australia-ism-june-2024.pdf
- China Cybersecurity Law of the People's Republic of China (China Cybersecurity Law) - https://securecontrolsframework.com/content/strm/scf-2024-3-china-cybersecurity-law-2017.pdf
- New Zealand Health Information Security Framework 2022 - https://securecontrolsframework.com/content/strm/scf-2024-3-nz-hisf-2022.pdf
STRM Community Participation
The SCF welcomes community involvement and we provide the ability for community-suggested mapping. The SCF Council provides a downloadable SCF Community STRM Template, that SCF Practitioners can then use to perform their own STRM and submit it to the SCF Council, where it can be evaluated for the possible inclusion in a future SCF release.
Step 1. Define The Focal Document To Be Mapped
We are not here to teach you STRM, so if you want to participate in any community mapping, it is expected that you (1) are very familiar the practices described in NIST IR 8477 and (2) possess the professional competence to conduct crosswalk mapping in accordance with those principles.
The first tab on the STRM template is called "STRM Overview" and there are two highlighted cells near the top of the sheet: the focal document cell and the focal document URL cell.
- In the focal document cell, you must provide the official name of the law, regulation, or framework you are providing mapping for.
- In the focal document URL cell, you must provide a valid hyperlink where the focal document can be downloaded.
Without either of these two pieces of information, the SCF Council will not review your STRM submission.
Step 2. Perform STRM
The second tab of the STRM template is called "Community STRM submission." This is purposely left as a blank template for you to perform your crosswalk mapping:
- Column A is the Focal Document Element #. This is the specific law, regulation, or framework control number. This is a mandatory field. Without a unique FDE value, there is no granularity and means there is nothing that can be mapped to.
- Column B is the Focal Document Element Name. Most laws, regulations and frameworks do not have FDE names, so this is required only if it is available.
- Column C is the Focal Document Element Description. This is the actual text of the law, regulation, or framework. Essentially, it is a cut & paste effort to populate this cell.
- Column D is the proposed SCF Control Name that you feel maps to the Focal Document Element.
- Column E is tied to Column D. This is the SCF control number.
- Column F is tied to Column D. This is the SCF control description.
- Column G is the proposed STRM relationship. There are only 5 options. The relationship can be (1) a Subset Of, (2) Intersects With, (3) Equal to, (4) a Superset Of, or (5) there is No Relationship.
- Column H is the proposed strength of the STRM relationship that has a 1 to 10 rating. A rating of 1 indicates a nominal relationship, a rating of 5 indicates a moderately strong relationship, and a rating of 10 indicates a strong relationship. Realistically, a rating of 10 is going to be given if the STRM relationship is either equal to or where the F-D-E is a subset of the SCF control.
- Column I is an optional notes section where you can provide textual justification for your recommendations.
Step 3. Submit To SCF Council
Once you complete your STRM exercise, you can then email it to the SCF Council for review. Just email the Excel spreadsheet as an attachment to support@securecontrolsframework.com.