NCP Data Mappings

The NCP Control Mapping to Checklist report is intended to assist IT security administrators/mangers to determine what controls are related to a checklist and specifically which check within the checklist is mapped to the control. While there has been no determination that a check fully satisfies the requirements of the control, these mappings will facilitate the answer to the question “How is this control being met within my security domain?”.


Focal Document: A source document that is used as the basis for comparing an element with an element from another document. Within this report, the focal documents listed have been submitted with a mapping to a checklist using CCEs.

Checklist: Once a focal document has been selected, the checklist that have been mapped to the selected focal document will be available for selection. These checklists have been submitted with a mapping to the focal document.

Intersect: A filter, that when selected will include elements of the focal document that are attached to specific CCEs.

Does not intersect: A filter, that when selected will include elements of the focal document that are not attached to a CCE.

Search Results: The Search Results sections displays the mapping of the controls within the focal document and the CCEs within the checklist that are related to that control.

Show only results: In situations where the control is within a hierarchy, the complete hierarchy tree is shown by default regardless of whether a CCE is mapped to it or not. Check this box to turn off the hierarchy view.