User Training

Train users to be aware of access or manipulation attempts by a threat actor to reduce the risk of successful spear phishing, social engineering, and other techniques that involve user interaction. Ensure that role-based security-related training is provided to personnel with assigned security roles and responsibilities: (i) before authorizing access to the information system or performing assigned duties; (ii) when required by information system changes; and (iii) at least annually if not otherwise defined.

Sources

NIST Rev5 Controls

D3FEND Techniques

D3FEND Artifacts

None

ISO 27001

NASA Best Practice Guide

ESA Space Shield Mitigation

Related MITRE EMB3D Mitigations

Related CSF 2.0

Related BSI Security Measures

ID: CM0041
Tier: I
Onboard SV CM 
Created: 2022/10/19
Last Modified: 2025/04/15