Under active development Content is continuously updated and improved · Last updated Feb 18, 2026, 2:55 AM UTC

PR.IR-01Networks and environments are protected from unauthorized logical access and usage

>Control Description

This technology infrastructure resilience subcategory ensures that networks and environments are protected from unauthorized logical access and usage. Key activities include: Logically segment organization networks and cloud-based platforms according to trust boundaries and platform types (e; Logically segment organization networks from external networks, and permit only necessary communications to enter the organization’s networks from ...; Implement zero trust architectures to restrict network access to each resource to the minimum necessary.

>Cross-Framework Mappings

>Informative References

Official NIST mappings to external frameworks and standards. Source: NIST CSF 2.0

CCMv4.0

AIS-04
AIS-06
DCS-12
DSP-10
DSP-15
IVS-03
IVS-05
IVS-06
+3 more

CIS Controls v8.0

3.12
12.2

CIS Controls v8.1

3.12
12.2

CRI Profile v2.0

PR.IR-01
PR.IR-01.01
PR.IR-01.02
PR.IR-01.03
PR.IR-01.04
PR.IR-01.05
PR.IR-01.06
PR.IR-01.07
+1 more

CSF v1.1

PR.AC-3
PR.AC-5
PR.DS-7
PR.PT-4

ISO/IEC 27001:2022

Mandatory Clause: None
Annex A Controls: 8.20
Annex A Controls: 8.21
Annex A Controls: 8.22

NICE Framework

DD-WRL-001
DD-WRL-002
DD-WRL-004
DD-WRL-006
DD-WRL-009
IO-WRL-004
OG-WRL-001
OG-WRL-014

PCI DSS

1.2.3
1.2.4
10.2.1
5.2.1
5.2.2
5.2.3
5.2.3.1
11.2.1

SCF

NET-01
SEA-01
SEA-02

SP 800-171 Rev 3

03.01.02
03.01.03
03.13.01
03.13.04
03.13.06

SP 800-218

PO.5.1

SP 800-53 Rev 5.1.1

AC-03
AC-04
SC-04
SC-05
SC-07

SP 800-53 Rev 5.2.0

AC-03
AC-04
SC-04
SC-05
SC-07

Ask AI

Configure your API key to use AI features.