
PR.PT-3: Protective Technology
The principle of least functionality is incorporated by configuring systems to provide only essential capabilities.

PR.MA-1: Maintenance
Maintenance and repair of organizational assets are performed and logged in a timely manner, with approved and controlled tools.

PR.IP-12: Information Protection Processes and Procedures
A vulnerability management plan is developed and implemented.

PR.IP-11: Information Protection Processes and Procedures
Cybersecurity is included in human resources practices (e.g., deprovisioning, personnel screening).

PR.IP-10: Information Protection Processes and Procedures
Response and recovery plans are tested.

PR.IP-9: Information Protection Processes and Procedures
Response plans (Incident Response and Business Continuity) and recovery plans (Incident Recovery and Disaster Recovery) are in place and managed.

PR.IP-8: Information Protection Processes and Procedures
Effectiveness of protection technologies is shared and analyzed.

PR.IP-7: Information Protection Processes and Procedures
Protection processes are improved.

PR.IP-6: Information Protection Processes and Procedures
Data is destroyed according to policy.

PR.IP-5: Information Protection Processes and Procedures
Policy and regulations regarding the physical operating environment for organizational assets are met.

PR.IP-4: Information Protection Processes and Procedures
Backups of information are conducted, maintained, and tested periodically.

PR.IP-3: Information Protection Processes and Procedures
Configuration change control processes are in place.