CRA-5.8.1
A
(a) identify internal and external cyber risks by, at a minimum, identifying the information stored on the licensee's systems, the sensitivity of such information, and how and by whom such information may be accessed;
(b) protect the licensee's electronic systems, and the information stored on those systems, from unauthorized access, use, or other malicious acts through the use of defensive infrastructure and the implementation of policies and procedures;
(c) detect systems intrusions, data breaches, unauthorized access to systems or information, malware , and other cyber security events;
(d) respond to detected cyber security events to mitigate any negative effects; and
(e) recover from cyber security events and restore normal operations and services.
Added: April 2019