ID.RA-01.148
Does your organization regularly conduct security architecture reviews to identify and remediate design and implementation weaknesses?
Explanation
Security architecture reviews systematically evaluate network and system designs to identify potential vulnerabilities before they can be exploited. These assessments should examine network segmentation, access controls, encryption implementations, and other security controls to ensure they align with security best practices and requirements. Evidence could include documented security architecture review reports, findings from threat modeling exercises, or remediation plans addressing identified weaknesses. These documents should show regular review cadence, methodology used, weaknesses identified, and remediation status.
Implementation Example
Assess network and system architectures for design and implementation weaknesses that affect cybersecurity
ID: ID.RA-01.148
Context
- Function
- ID: IDENTIFY
- Category
- ID.RA: Risk Assessment
- Sub-Category
- Vulnerabilities in assets are identified, validated, and recorded

