v5.1 (2023)
64
Total Best Practices controls
OR 10 · OP 9 · PS 9 · TS 36
Delta MPA Best Practices · v5.1 → v5.3.1
Summary built from official workbooks, focused on the Best Practices sheet only. Goal: provide an operational and actionable view of cross-version changes.
v5.1 (2023)
64
Total Best Practices controls
OR 10 · OP 9 · PS 9 · TS 36
v5.2 (2023)
66
Total Best Practices controls
OR 10 · OP 9 · PS 10 · TS 37
v5.3 (2025)
76
Total Best Practices controls
OR 13 · OP 9 · PS 11 · TS 43
v5.3.1 (2025)
82
Total Best Practices controls
OR 13 · OP 9 · PS 11 · TS 49
Modified controls include text updates in Best Practices, Additional Recommendations, and adjustments in title/scope.
v5.1 → v5.2
+4
Added
-2
Removed
~62
Updated
Additions
Removals
v5.2 → v5.3
+10
Added
-0
Removed
~55
Updated
Additions
v5.3 → v5.3.1
+6
Added
-0
Removed
~75
Updated
Additions
Focused comparison only on Best Practices and Additional Recommendations columns.
68 impacted IDs on transition 5.1 -> 5.2.
No results for this filter.
Information Security Management System
Best Practices
Additional Recommendations
Acceptable Use Policy
Best Practices
Additional Recommendations
Business Continuity & Disaster Recovery Plans
Best Practices
Additional Recommendations
Data & Assets
Best Practices
Additional Recommendations
Risk Management
Best Practices
Additional Recommendations
Background Screening
Best Practices
Additional Recommendations
On-boarding/Off-boarding
Best Practices
Additional Recommendations
Training & Awareness Program
Best Practices
Additional Recommendations
Contracts & Service Level Agreements
Best Practices
Additional Recommendations
Contracts & Service Level Agreements
Best Practices
Additional Recommendations
Incident Response
Best Practices
Additional Recommendations
Receiving
Best Practices
Additional Recommendations
Packaging
Best Practices
Additional Recommendations
Shipping
Best Practices
No change on this column.
Additional Recommendations
Transport Vehicles
Best Practices
Additional Recommendations
Work From Home/Remote Workers
Best Practices
Additional Recommendations
Remote Sites & Locations
Best Practices
Additional Recommendations
Tracking
Best Practices
Additional Recommendations
High Security Titles
Best Practices
Additional Recommendations
Disposal
Best Practices
Additional Recommendations
Disposal
Best Practices
Additional Recommendations
Entry/Exit Points
Best Practices
Additional Recommendations
Visitors
Best Practices
Additional Recommendations
Electronic Access Control
Best Practices
Additional Recommendations
Electronic Access Control Logging & Monitoring
Best Practices
Additional Recommendations
Alarm System
Best Practices
Additional Recommendations
Keys
Best Practices
Additional Recommendations
Replication Facilities
Best Practices
Additional Recommendations
Camera System
Best Practices
Additional Recommendations
Environmental Controls
Best Practices
Additional Recommendations
Data Centers, Co-locations & Cloud Providers
Best Practices
Additional Recommendations
Data I/O Workflows & Systems
Best Practices
Additional Recommendations
Systems Configuration
Best Practices
Additional Recommendations
Default Accounts
Best Practices
Additional Recommendations
Endpoint Protection
Best Practices
Additional Recommendations
Mobile Devices
Best Practices
Additional Recommendations
Security Information & Event Management
Best Practices
Additional Recommendations
Authentication & Authorization
Best Practices
Additional Recommendations
Identity Access Management
Best Practices
Additional Recommendations
Corporate Email Filtering
Best Practices
No change on this column.
Additional Recommendations
Web Portals
Best Practices
Additional Recommendations
Shared Security Responsibility Model
Best Practices
No change on this column.
Additional Recommendations
Cloud Misconfigurations
Best Practices
No change on this column.
Additional Recommendations
Secure Software Development Lifecycle
Best Practices
Additional Recommendations
Security by Design & Privacy by Design
Best Practices
Additional Recommendations
Code
Best Practices
Additional Recommendations
Content Transfer Systems
Best Practices
Additional Recommendations
Application Hardening Guidelines
Best Practices
Additional Recommendations
Network Configuration
Best Practices
Additional Recommendations
Connections
Best Practices
Additional Recommendations
Network Topology Diagram
Best Practices
Additional Recommendations
Network Traffic
Best Practices
No change on this column.
Additional Recommendations
Firewall Access Control List
Best Practices
Additional Recommendations
Production Networks
Best Practices
Additional Recommendations
Firewall Management
Best Practices
Additional Recommendations
Intrusion Detection & Prevention Systems
Best Practices
Additional Recommendations
Internet Access
Best Practices
No change on this column.
Additional Recommendations
Remote Access
Best Practices
Additional Recommendations
Web Filtering
Best Practices
No change on this column.
Additional Recommendations
Wireless Networks
Best Practices
Additional Recommendations
Cloud Service Provider & Cloud Service Consumer
Best Practices
Additional Recommendations
Network Connections
Best Practices
No change on this column.
Additional Recommendations
Encryption
Best Practices
Additional Recommendations
Key Delivery Messages & Trusted Devices List
Best Practices
Additional Recommendations
Vulnerability Management
Best Practices
Additional Recommendations
Penetration Testing
Best Practices
Additional Recommendations
Patching
Best Practices
Additional Recommendations
Change Control
Best Practices
Additional Recommendations
For current preparation, v5.3.1 should be the target. Earlier versions are useful as historical baselines but miss recent requirements, especially application security controls.
In the Best Practices sheet, modifications include text updates, additional recommendations, scope changes (Site/Cloud/App), and sometimes title/topic adjustments. It is not only about added or removed rows.
The main impact is stronger application security expectations and more granular evidence requirements. v5.3.1 also clarifies applicability through the App column.
CYTRUST helps you prioritize gaps, plan remediation and consolidate audit evidence.
Call us at+33 (0)2 59 60 39 27