Assessment3/7/2026
Total Controls225
Tasks: [Open/Total]2 / 2

N7GFSGCSV1

Score of Applied Controls:
9
9 out of 225
Count of Applied Controls:
151
151 out of 225
Risk Assessment
[based on applied Controls]
33
33 out of 100
225 Cntrls
Access Agreements Access Agreements
0 / 1 Answered
Access Control for Portable and Mobile Devices Access Control for Portable and Mobile Devices
0 / 3 Answered
Access Control Policy and Procedures Access Control Policy and Procedures
0 / 1 Answered
Access Enforcement Access Enforcement
0 / 1 Answered
Access Restrictions for Configuration Change Access Restrictions for Configuration Change
0 / 1 Answered
Account Management Account Management
0 / 1 Answered
Acquisitions Acquisitions
0 / 1 Answered
Addition, Removal, and Disposal of Equipment Addition, Removal, and Disposal of Equipment
0 / 1 Answered
Alternate Control Center Alternate Control Center
0 / 1 Answered
Alternate Storage Sites Alternate Storage Sites
0 / 2 Answered
Alternate Telecommunication Services Alternate Telecommunication Services
0 / 2 Answered
Alternate Work Site Alternate Work Site
0 / 1 Answered
Application Partitioning Application Partitioning
0 / 1 Answered
Audit Analysis Tools and Report Generation Audit Analysis Tools and Report Generation
0 / 1 Answered
Audit and Accountability Policy and Procedures Audit and Accountability Policy and Procedures
0 / 1 Answered
Audit Monitoring, Analysis, and Reporting Audit Monitoring, Analysis, and Reporting
0 / 1 Answered
Audit Record Generation Audit Record Generation
0 / 1 Answered
Audit Record Retention Audit Record Retention
0 / 1 Answered
Audit Storage Capacity Audit Storage Capacity
0 / 1 Answered
Audit Tools Audit Tools
0 / 1 Answered
Auditable Events Auditable Events
0 / 2 Answered
Auditor Qualification Auditor Qualification
0 / 1 Answered
Authenticator Feedback Authenticator Feedback
0 / 1 Answered
Authenticator Management Authenticator Management
0 / 1 Answered
Automated Labeling Automated Labeling
0 / 1 Answered
Awareness and Training Policy and Procedures Awareness and Training Policy and Procedures
0 / 1 Answered
Baseline Configuration Baseline Configuration
0 / 1 Answered
Boundary Protection Boundary Protection
0 / 2 Answered
Collaborative Computing Collaborative Computing
0 / 1 Answered
Communication Confidentiality Communication Confidentiality
0 / 1 Answered
Communication Integrity Communication Integrity
0 / 1 Answered
Communications Partitioning Communications Partitioning
0 / 1 Answered
Component Inventory Component Inventory
0 / 1 Answered
Concurrent Session Control Concurrent Session Control
0 / 1 Answered
Conduct and Frequency of Audits Conduct and Frequency of Audits
0 / 1 Answered
Confidentiality of Information at Rest Confidentiality of Information at Rest
0 / 1 Answered
Configuration Change Control Configuration Change Control
0 / 1 Answered
Configuration for Least Functionality Configuration for Least Functionality
0 / 1 Answered
Configuration Management Plan Configuration Management Plan
0 / 1 Answered
Configuration Management Policy and Procedures Configuration Management Policy and Procedures
0 / 1 Answered
Configuration Settings Configuration Settings
0 / 1 Answered
Contact with Security Groups and Associations Contact with Security Groups and Associations
0 / 1 Answered
Content of Audit Records Content of Audit Records
0 / 1 Answered
Continuity of Operations Plan Continuity of Operations Plan
0 / 1 Answered
Continuity of Operations Plan Testing Continuity of Operations Plan Testing
0 / 2 Answered
Continuity of Operations Plan Update Continuity of Operations Plan Update
0 / 1 Answered
Continuity of Operations Policy and Procedures Continuity of Operations Policy and Procedures
0 / 1 Answered
Continuity of Operations Roles and Responsibilitie Continuity of Operations Roles and Responsibilities
0 / 1 Answered
Continuity of Operations Training Continuity of Operations Training
0 / 1 Answered
Continuous Improvement Continuous Improvement
0 / 1 Answered
Continuous Monitoring Continuous Monitoring
0 / 1 Answered
Contractor and Third Party Personnel Security Contractor and Third Party Personnel Security
0 / 1 Answered
Control System Access Restrictions Control System Access Restrictions
0 / 1 Answered
Coordination of Emergency Response Coordination of Emergency Response
0 / 1 Answered
Corrective Action Corrective Action
0 / 1 Answered
Cryptographic Key Establishment and Management Cryptographic Key Establishment and Management
0 / 2 Answered
Delivery and Removal Delivery and Removal
0 / 1 Answered
Denial-of-Service Protection Denial-of-Service Protection
0 / 1 Answered
Developer Configuration Management Developer Configuration Management
0 / 1 Answered
Developer Security Testing Developer Security Testing
0 / 1 Answered
Device Identification and Authentication Device Identification and Authentication
0 / 1 Answered
Emergency Power Emergency Power
0 / 2 Answered
Emergency Shutoff Protection Emergency Shutoff Protection
0 / 1 Answered
Error Handling Error Handling
0 / 1 Answered
Factory Default Settings Management Factory Default Settings Management
0 / 1 Answered
Fail in Known State Fail in Known State
0 / 1 Answered
Fail-Safe Response Fail-Safe Response
0 / 1 Answered
Flaw Remediation Flaw Remediation
0 / 1 Answered
Heterogeneity Heterogeneity
0 / 1 Answered
Honeypots Honeypots
0 / 1 Answered
Identification and Authentication Policy and Proce Identification and Authentication Policy and Procedures
0 / 1 Answered
Identifier Management Identifier Management
0 / 1 Answered
Incident Handling Incident Handling
0 / 1 Answered
Incident Monitoring Incident Monitoring
0 / 1 Answered
Incident Reporting Incident Reporting
0 / 1 Answered
Incident Response Investigation and Analysis Incident Response Investigation and Analysis
0 / 1 Answered
Incident Response Policy and Procedures Incident Response Policy and Procedures
0 / 1 Answered
Incident Response Roles and Responsibilities Incident Response Roles and Responsibilities
0 / 1 Answered
Incident Response Testing and Exercises Incident Response Testing and Exercises
0 / 1 Answered
Incident Response Training Incident Response Training
0 / 1 Answered
Information and Document Management Policy and Pro Information and Document Management Policy and Procedures
0 / 1 Answered
Information and Document Retention Information and Document Retention
0 / 1 Answered
Information Exchange Information Exchange
0 / 1 Answered
Information Flow Enforcement Information Flow Enforcement
0 / 1 Answered
Information Handling Information Handling
0 / 1 Answered
Information Input Validation Information Input Validation
0 / 1 Answered
Information Remnants Information Remnants
0 / 1 Answered
Least Privilege Least Privilege
0 / 1 Answered
Legacy Smart Grid Information System Upgrades Legacy Smart Grid Information System Upgrades
0 / 1 Answered
Life-Cycle Support Life-Cycle Support
0 / 1 Answered
Location of Smart Grid Information System Assets Location of Smart Grid Information System Assets
0 / 2 Answered
Maintenance Personnel Maintenance Personnel
0 / 1 Answered
Maintenance Tools Maintenance Tools
0 / 1 Answered
Malicious Code and Spam Protection Malicious Code and Spam Protection
0 / 1 Answered
Management Accountability Management Accountability
0 / 1 Answered
Media Marking Media Marking
0 / 1 Answered
Media Protection Policy and Procedures Media Protection Policy and Procedures
0 / 1 Answered
Media Sanitization and Disposal Media Sanitization and Disposal
0 / 2 Answered
Media Sensitivity Level Media Sensitivity Level
0 / 1 Answered
Media Storage Media Storage
0 / 1 Answered
Media Transport Media Transport
0 / 1 Answered
Message Authenticity Message Authenticity
0 / 1 Answered
Mission/Business Process Definition Mission/Business Process Definition
0 / 1 Answered
Mobile Code Mobile Code
0 / 1 Answered
Monitoring Configuration Changes Monitoring Configuration Changes
0 / 1 Answered
Monitoring Physical Access Monitoring Physical Access
0 / 1 Answered
Non-Repudiation Non-Repudiation
0 / 1 Answered
Operating System-Independent Applications Operating System-Independent Applications
0 / 1 Answered
Passwords Passwords
0 / 1 Answered
Permitted Actions without Identification or Authen Permitted Actions without Identification or Authentication
0 / 2 Answered
Personnel Accountability Personnel Accountability
0 / 1 Answered
Personnel Roles Personnel Roles
0 / 1 Answered
Personnel Screening Personnel Screening
0 / 1 Answered
Personnel Security Policy and Procedures Personnel Security Policy and Procedures
0 / 1 Answered
Personnel Termination Personnel Termination
0 / 1 Answered
Personnel Transfer Personnel Transfer
0 / 1 Answered
Physical Access Physical Access
0 / 3 Answered
Physical Access Authorizations Physical Access Authorizations
0 / 1 Answered
Physical Access Log Retention Physical Access Log Retention
0 / 1 Answered
Physical and Environmental Security Policy and Pro Physical and Environmental Security Policy and Procedures
0 / 1 Answered
Planning Process Training Planning Process Training
0 / 1 Answered
Position Categorization Position Categorization
0 / 1 Answered
Previous Logon Notification Previous Logon Notification
0 / 1 Answered
Privacy Impact Assessment Privacy Impact Assessment
0 / 1 Answered
Protection of Audit Information Protection of Audit Information
0 / 1 Answered
Public Key Infrastructure Certificates Public Key Infrastructure Certificates
0 / 1 Answered
Publicly Accessible Content Publicly Accessible Content
0 / 1 Answered
Remote Access Remote Access
0 / 2 Answered
Remote Access Policy and Procedures Remote Access Policy and Procedures
0 / 1 Answered
Remote Maintenance Remote Maintenance
0 / 3 Answered
Remote Session Termination Remote Session Termination
0 / 1 Answered
Resource Priority Resource Priority
0 / 1 Answered
Response to Audit Processing Failures Response to Audit Processing Failures
0 / 2 Answered
Risk Assessment Risk Assessment
0 / 1 Answered
Risk Assessment Policy and Procedures Risk Assessment Policy and Procedures
0 / 1 Answered
Risk Assessment Update Risk Assessment Update
0 / 1 Answered
Risk Management Plan Risk Management Plan
0 / 1 Answered
Risk Management Strategy Risk Management Strategy
0 / 1 Answered
Rules of Behavior Rules of Behavior
0 / 1 Answered
Secure Name/Address Resolution Service Secure Name/Address Resolution Service
0 / 1 Answered
Security Alerts and Advisories Security Alerts and Advisories
0 / 1 Answered
Security Architecture Security Architecture
0 / 1 Answered
Security Assessment and Authorization Policy and P Security Assessment and Authorization Policy and Procedures
0 / 1 Answered
Security Assessments Security Assessments
0 / 1 Answered
Security Authorization to Operate Security Authorization to Operate
0 / 1 Answered
Security Authorization to Operate Process Security Authorization to Operate Process
0 / 1 Answered
Security Awareness Security Awareness
0 / 1 Answered
Security Awareness and Training Records Security Awareness and Training Records
0 / 1 Answered
Security Engineering Principles Security Engineering Principles
0 / 1 Answered
Security Function Isolation Security Function Isolation
0 / 1 Answered
Security Functionality Verification Security Functionality Verification
0 / 1 Answered
Security Impact Level Security Impact Level
0 / 1 Answered
Security Policies for Contractors and Third Partie Security Policies for Contractors and Third Parties
0 / 1 Answered
Security Policy and Procedures Security Policy and Procedures
0 / 1 Answered
Security Policy Compliance Security Policy Compliance
0 / 1 Answered
Security Program Plan Security Program Plan
0 / 1 Answered
Security Responsibility Testing Security Responsibility Testing
0 / 1 Answered
Security Roles Security Roles
0 / 1 Answered
Security Training Security Training
0 / 1 Answered
Security-Related Activity Planning Security-Related Activity Planning
0 / 1 Answered
Senior Management Authority Senior Management Authority
0 / 1 Answered
Separation of Duties Separation of Duties
0 / 1 Answered
Session Lock Session Lock
0 / 1 Answered
Smart Grid Information System and Communication Pr Smart Grid Information System and Communication Protection Policy and Procedures
0 / 1 Answered
Smart Grid Information System and Information Inte Smart Grid Information System and Information Integrity Policy and Procedures
0 / 1 Answered
Smart Grid Information System and Services Acquisi Smart Grid Information System and Services Acquisition Policy and Procedures
0 / 1 Answered
Smart Grid Information System Backup Smart Grid Information System Backup
0 / 3 Answered
Smart Grid Information System Connections Smart Grid Information System Connections
0 / 1 Answered
Smart Grid Information System Documentation Smart Grid Information System Documentation
0 / 1 Answered
Smart Grid Information System Maintenance Smart Grid Information System Maintenance
0 / 2 Answered
Smart Grid Information System Maintenance Policy a Smart Grid Information System Maintenance Policy and Procedures
0 / 1 Answered
Smart Grid Information System Monitoring Tools and Smart Grid Information System Monitoring Tools and Techniques
0 / 1 Answered
Smart Grid Information System Partitioning Smart Grid Information System Partitioning
0 / 1 Answered
Smart Grid Information System Recovery and Reconst Smart Grid Information System Recovery and Reconstitution
0 / 3 Answered
Smart Grid Information System Security Plan Smart Grid Information System Security Plan
0 / 1 Answered
Smart Grid Information System Use Notification Smart Grid Information System Use Notification
0 / 1 Answered
Software and Information Integrity Software and Information Integrity
0 / 1 Answered
Software License Usage Restrictions Software License Usage Restrictions
0 / 1 Answered
Strategic Planning Policy and Procedures Strategic Planning Policy and Procedures
0 / 1 Answered
Supply Chain Protection Supply Chain Protection
0 / 1 Answered
System Connections System Connections
0 / 1 Answered
Thin Nodes Thin Nodes
0 / 1 Answered
Time Stamps Time Stamps
0 / 2 Answered
Timely Maintenance Timely Maintenance
0 / 1 Answered
Transmission of Security Parameters Transmission of Security Parameters
0 / 1 Answered
Trusted Path Trusted Path
0 / 1 Answered
Unsuccessful Login Attempts Unsuccessful Login Attempts
0 / 1 Answered
Use of External Information Control Systems Use of External Information Control Systems
0 / 2 Answered
Use of NIST Approved Cryptography Use of NIST Approved Cryptography
0 / 1 Answered
User Identification and Authentication User Identification and Authentication
0 / 1 Answered
User-Installed Software User-Installed Software
0 / 1 Answered
Virtualization Techniques Virtualization Techniques
0 / 1 Answered
Visitor Control Visitor Control
0 / 2 Answered
Visitor Records Visitor Records
0 / 1 Answered
Voice-Over Internet Protocol Voice-Over Internet Protocol
0 / 1 Answered
Vulnerability Assessment and Awareness Vulnerability Assessment and Awareness
0 / 3 Answered
Wireless Access Restrictions Wireless Access Restrictions
0 / 1 Answered