SCF Domain
stringclasses
34 values
SCF Control
stringlengths
7
85
SCF #
stringlengths
6
9
Secure Controls Framework (SCF) Control Description
stringlengths
49
657
Methods To Comply With SCF Controls
stringlengths
6
863
Evidence Request List (ERL) #
stringclasses
181 values
SCF Control Question
stringlengths
51
659
Relative Control Weighting
int64
1
10
Function Grouping
stringclasses
5 values
SCRM Tier 1 Strategic
stringclasses
2 values
SCRM Tier 2 Operational
stringclasses
2 values
SCRM Tier 3 Tactical
stringclasses
2 values
SP-CMM 0 Not Performed
stringlengths
69
677
SP-CMM 1 Performed Informally
stringlengths
43
2.02k
SP-CMM 2 Planned & Tracked
stringlengths
43
3.33k
SP-CMM 3 Well Defined
stringlengths
43
5.16k
SP-CMM 4 Quantitatively Controlled
stringlengths
43
1.35k
SP-CMM 5 Continuously Improving
stringlengths
43
725
AICPA TSC 2017 (Controls)
stringclasses
116 values
AICPA TSC 2017 (Points of Focus)
stringclasses
171 values
BSI Standard 200-1
stringclasses
18 values
CIS CSC v8.0
nullclasses
158 values
CIS CSC v8.0 IG1
nullclasses
57 values
CIS CSC v8.0 IG2
nullclasses
136 values
CIS CSC v8.0 IG3
nullclasses
154 values
COBIT 2019
stringclasses
101 values
COSO v2017
stringclasses
45 values
CSA CCM v4
stringclasses
229 values
CSA IoT SCF v2
stringclasses
168 values
ENISA v2.0
stringclasses
33 values
GAPP
stringclasses
36 values
IEC 62443-4-2
nullclasses
104 values
ISO/SAE 21434 v2021
stringclasses
69 values
ISO 22301 v2019
stringclasses
25 values
ISO 27001 v2013
stringclasses
30 values
ISO 27001 v2022
stringclasses
35 values
ISO 27002 v2013
stringclasses
142 values
ISO 27002 v2022
stringclasses
166 values
ISO 27017 v2015
stringclasses
158 values
ISO 27018 v2014
nullclasses
16 values
ISO 27701 v2019
stringclasses
161 values
ISO 29100 v2011
stringclasses
15 values
ISO 31000 v2009
nullclasses
7 values
ISO 31010 v2009
nullclasses
16 values
MITRE ATT&CK 10
nullclasses
100 values
MPA Content Security Program v5.1
stringclasses
98 values
NIAC Insurance Data Security Model Law (MDL-668)
stringclasses
41 values
NIST AI RMF AI 100-1 v1.0
stringclasses
114 values
NIST Privacy Framework v1.0
stringclasses
114 values
NIST SSDF
nullclasses
29 values
NIST 800-37 rev 2
stringclasses
32 values
NIST 800-39
nullclasses
9 values
NIST 800-53 rev4
stringlengths
4
47
NIST 800-53 rev4 (low)
nullclasses
121 values
NIST 800-53 rev4 (moderate)
nulllengths
4
22
NIST 800-53 rev4 (high)
nulllengths
4
23
NIST 800-53 rev5
stringlengths
4
99
NIST 800-53B rev5 (privacy)
nullclasses
85 values
NIST 800-53B rev5 (low)
nullclasses
151 values
NIST 800-53B rev5 (moderate)
nulllengths
4
40
NIST 800-53B rev5 (high)
nulllengths
4
40
NIST 800-53 rev5 (NOC)
stringlengths
4
41
NIST 800-63B (partial mapping)
nullclasses
5 values
NIST 800-82 rev3 LOW OT Overlay
nullclasses
162 values
NIST 800-82 rev3 MODERATE OT Overlay
nulllengths
4
40
NIST 800-82 rev3 HIGH OT Overlay
nulllengths
4
40
NIST 800-160
nullclasses
23 values
NIST 800-161 rev 1
nulllengths
4
34
NIST 800-161 rev 1 C-SCRM Baseline
nullclasses
95 values
NIST 800-161 rev 1 Flow Down
nullclasses
71 values
NIST 800-161 rev 1 Level 1
nullclasses
69 values
NIST 800-161 rev 1 Level 2
nullclasses
218 values
NIST 800-161 rev 1 Level 3
nullclasses
234 values
NIST 800-171 rev 2
nullclasses
172 values
NIST 800-171 rev 3 FPD
stringlengths
5
141
NIST 800-171A
stringclasses
114 values
NIST 800-171A rev 3 IPD
stringclasses
167 values
NIST 800-172
nullclasses
46 values
NIST 800-218 v1.1
nullclasses
29 values
NIST CSF v1.1
stringclasses
97 values
NIST CSF v2.0 IPD
stringclasses
127 values
OWASP Top 10 v2021
nullclasses
20 values
PCIDSS v3.2
stringclasses
135 values
PCIDSS v4.0
stringlengths
3
156
PCIDSS v4.0 SAQ A
stringclasses
30 values
PCIDSS v4.0 SAQ A-EP
stringclasses
141 values
PCIDSS v4.0 SAQ B
stringclasses
26 values
PCIDSS v4.0 SAQ B-IP
stringclasses
55 values
PCIDSS v4.0 SAQ C
stringclasses
132 values
PCIDSS v4.0 SAQ C-VT
stringclasses
53 values
PCIDSS v4.0 SAQ D Merchant
stringclasses
213 values
PCIDSS v4.0 SAQ D Service Provider
stringclasses
231 values
PCIDSS v4.0 SAQ P2PE
stringclasses
24 values
Shared Assessments SIG 2023
stringlengths
3
43
SWIFT CSF v2023
nullclasses
55 values
TISAX ISA v5.1.0
stringclasses
88 values
UL 2900-1
nullclasses
36 values
UN R155
stringclasses
19 values
UN ECE WP.29
stringclasses
19 values
US C2M2 v2.1
stringclasses
152 values
US CERT RMM v1.2
stringclasses
212 values
US CISA CPG v2022
nullclasses
44 values
US CJIS Security Policy 5.9
stringclasses
99 values
US CMMC 2.0 Level 1
nullclasses
17 values
US CMMC 2.0 Level 2
nullclasses
110 values
US CMMC 2.0 Level 3
nullclasses
139 values
US CMMC 2.1 (draft) Level 1
nullclasses
18 values
US CMMC 2.1 (draft) Level 2
nullclasses
110 values
US CMMC 2.1 (draft) Level 3
nullclasses
141 values
US CMS MARS-E v2.0
stringlengths
4
28
US COPPA
null
6.5k
6.5k
US DFARS Cybersecurity 252.204-70xx
stringclasses
19 values
US FACTA
nullclasses
2 values
US FAR 52.204-21
nullclasses
22 values
US FAR 52.204-27
nullclasses
2 values
US FAR Section 889
nullclasses
1 value
US FDA 21 CFR Part 11
stringclasses
27 values
US FedRAMP R4
nulllengths
4
24
US FedRAMP R4 (low)
nullclasses
130 values
US FedRAMP R4 (moderate)
nulllengths
4
23
US FedRAMP R4 (high)
nulllengths
4
24
US FedRAMP R4 (LI-SaaS)
nullclasses
131 values
US FedRAMP R5
nulllengths
4
24
US FedRAMP R5 (low)
nullclasses
151 values
US FedRAMP R5 (moderate)
nulllengths
4
23
US FedRAMP R5 (high)
nulllengths
4
24
US FedRAMP R5 (LI-SaaS)
nullclasses
151 values
US FERPA
stringclasses
3 values
US FFIEC
stringclasses
68 values
US FINRA
stringclasses
3 values
US FTC Act
nullclasses
1 value
US GLBA CFR 314
stringclasses
41 values
US HIPAA
stringclasses
54 values
HIPAA - HICP Small Practice
stringclasses
31 values
HIPAA - HICP Medium Practice
stringclasses
59 values
HIPAA - HICP Large Practice
stringclasses
112 values
US IRS 1075
stringlengths
3
165
US ITAR Part 120 (limited)
nullclasses
9 values
US NERC CIP
nullclasses
35 values
US NISPOM
stringclasses
72 values
US NNPI (unclass)
nullclasses
61 values
US NSTC NSPM-33
nullclasses
15 values
US Privacy Shield
nullclasses
7 values
US SEC Cybersecurity Rule
stringclasses
12 values
US SOX
nullclasses
1 value
US SSA EIESR v8.0
stringclasses
22 values
US StateRAMP Low Category 1
nullclasses
107 values
US StateRAMP Low+ Category 2
nullclasses
167 values
US StateRAMP Moderate Category 3
nulllengths
4
24
US TSA / DHS 1580/82-2022-01
stringclasses
43 values
US - AK PIPA
stringclasses
8 values
US - CA SB327
nullclasses
4 values
US-CA CPRA (Nov 2022)
stringclasses
36 values
US - CA SB1386
nullclasses
1 value
US - CO Colorado Privacy Act
nullclasses
36 values
US - IL BIPA
nullclasses
9 values
US - IL IPA
nullclasses
4 values
US - IL PIPA
nullclasses
6 values
US-MA 201 CMR 17.00
stringclasses
27 values
US - NV SB220
nullclasses
3 values
US - NY DFS 23 NYCRR500
float64
500
500
US - NY SHIELD Act S5575B
stringclasses
15 values
US - OR 646A
nullclasses
21 values
US - SC Insurance Data Security Act
stringclasses
41 values
US - TX BC521
stringclasses
3 values
US-TX Cybersecurity Act
stringclasses
13 values
US-TX DIR Control Standards 2.0
stringclasses
155 values
US-TX TX-RAMP Level 1
nullclasses
120 values
US-TX TX-RAMP Level 2
nulllengths
4
23
US-TX SB820
stringclasses
5 values
US-VA CDPA 2023
stringclasses
24 values
US-VT Act 171 of 2018
stringclasses
32 values
EMEA EU EBA GL/2019/04
stringclasses
93 values
EMEA EU DORA
stringclasses
60 values
EMEA EU ePrivacy (draft)
nullclasses
15 values
EMEA EU GDPR
stringclasses
57 values
EMEA EU NIS2
stringclasses
21 values
EMEA EU PSD2
stringclasses
10 values
EMEA EU EU-US Data Privacy Framework
nullclasses
23 values
EMEA Austria
stringclasses
10 values
EMEA Belgium
stringclasses
9 values
EMEA Czech Republic
stringclasses
14 values
EMEA Denmark
stringclasses
11 values
EMEA Finland
stringclasses
7 values
EMEA France
stringclasses
9 values
EMEA Germany
stringclasses
11 values
EMEA Germany Banking Supervisory Requirements for IT (BAIT)
stringclasses
57 values
EMEA Germany C5-2020
stringclasses
152 values
EMEA Greece
stringclasses
9 values
EMEA Hungary
stringclasses
12 values
EMEA Ireland
stringclasses
3 values
EMEA Israel CDMO v1.0
stringlengths
3
89
EMEA Israel
stringclasses
6 values
EMEA Italy
stringclasses
15 values
EMEA Kenya DPA 2019
nullclasses
38 values
EMEA Luxembourg
stringclasses
4 values
EMEA Netherlands
stringclasses
12 values
EMEA Nigeria DPR 2019
stringclasses
24 values
EMEA Norway
stringclasses
12 values
EMEA Poland
stringclasses
11 values
EMEA Portugal
stringclasses
11 values
EMEA Qatar PDPPL
stringclasses
37 values
EMEA Russia
stringclasses
13 values
EMEA Saudi Arabia Critical Security Controls
nullclasses
105 values
EMEA Saudi Arabia SACS-002
stringclasses
96 values
EMEA Saudi Arabia SAMA CSFv1.0
stringclasses
36 values
EMEA Saudi Arabia ECC-12018
stringclasses
148 values
EMEA Saudi Arabia OTCC-1 2022
stringclasses
133 values
EMEA Serbia 87/2018
nullclasses
46 values
EMEA Slovak Republic
nullclasses
2 values
EMEA South Africa
stringclasses
45 values
EMEA Spain
nullclasses
10 values
EMEA Spain CCN-STIC 825
stringclasses
71 values
EMEA Sweden
stringclasses
11 values
EMEA Switzerland
stringclasses
8 values
EMEA Turkey
stringclasses
8 values
EMEA UAE
stringclasses
9 values
EMEA UK CAF v3.1
stringclasses
75 values
EMEA UK CAP 1850
stringclasses
16 values
EMEA UK Cyber Essentials
null
1
5
EMEA UK DPA
nullclasses
7 values
EMEA UK GDPR
nullclasses
38 values
APAC Australia Essential 8 ML 1
nullclasses
21 values
APAC Australia Essential 8 ML 2
nullclasses
30 values
APAC Australia Essential 8 ML 3
nullclasses
40 values
APAC Australia Privacy Act
stringclasses
11 values
APAC Australian Privacy Principles
stringclasses
18 values
APAC Australia ISM 2022
stringlengths
4
214
APAC Australia IoT Code of Practice
nullclasses
11 values
APAC Australia Prudential Standard CPS230
stringclasses
32 values
APAC Australia Prudential Standard CPS234
stringclasses
34 values
APAC China Data Security Law (DSL)
nullclasses
6 values
APAC China DNSIP
stringclasses
3 values
APAC China Privacy Law
stringclasses
57 values
APAC Hong Kong
stringclasses
8 values
APAC India ITR
stringclasses
4 values
APAC Indonesia
stringclasses
7 values
APAC Japan APPI
stringclasses
31 values
APAC Japan ISMAP
stringclasses
188 values
APAC Malaysia
stringclasses
8 values
APAC New Zealand Health ISF
stringclasses
22 values
APAC New Zealand NZISM 3.6
stringlengths
10
1.15k
APAC New Zealand Privacy Act of 2020
nullclasses
12 values
APAC Philippines
stringclasses
12 values
APAC Singapore
stringclasses
15 values
APAC Singapore Cyber Hygiene Practice
nullclasses
12 values
APAC Singapore MAS TRM 2021
stringclasses
166 values
APAC South Korea
stringclasses
22 values
APAC Taiwan
stringclasses
7 values
Americas Argentina
stringclasses
14 values
Americas Argentina Reg 132-2018
nullclasses
24 values
Americas Bahamas
stringclasses
6 values
Americas Bermuda BMACCC
stringclasses
36 values
Americas Brazil LGPD
nullclasses
27 values
Americas Canada CSAG
stringclasses
75 values
Americas Canada OSFI B-13
stringclasses
60 values
Americas Canada PIPEDA
stringclasses
14 values
Americas Chile
stringclasses
9 values
Americas Colombia
stringclasses
10 values
Americas Costa Rica
stringclasses
8 values
Americas Mexico
stringclasses
14 values
Americas Peru
stringclasses
14 values
Americas Uruguay
nullclasses
17 values
Minimum Security Requirements MCR + DSR
null
Identify Minimum Compliance Requirements (MCR)
null
Identify Discretionary Security Requirements (DSR)
null
SCF-B Business Mergers & Acquisitions
stringclasses
1 value
SCF-I Cyber Insurance Duty of Care
stringclasses
23 values
SCF-E Embedded Technology
stringclasses
1 value
SCF-R Ransomware Protection
stringclasses
1 value
Risk Threat Summary
stringlengths
13
230
Risk R-AC-1
stringclasses
1 value
Risk R-AC-2
stringclasses
1 value
Risk R-AC-3
stringclasses
1 value
Risk R-AC-4
stringclasses
1 value
Risk R-AM-1
stringclasses
1 value
Risk R-AM-2
stringclasses
2 values
Risk R-AM-3
stringclasses
1 value
Risk R-BC-1
stringclasses
2 values
Risk R-BC-2
stringclasses
2 values
Risk R-BC-3
stringclasses
2 values
Risk R-BC-4
stringclasses
2 values
Risk R-BC-5
stringclasses
2 values
Risk R-EX-1
stringclasses
2 values
Risk R-EX-2
stringclasses
2 values
Risk R-EX-3
stringclasses
2 values
Risk R-EX-4
stringclasses
2 values
Risk R-EX-5
stringclasses
2 values
Risk R-EX-6
stringclasses
2 values
Risk R-EX-7
stringclasses
2 values
Risk R-GV-1
stringclasses
2 values
Risk R-GV-2
stringclasses
2 values
Risk R-GV-3
stringclasses
2 values
Risk R-GV-4
stringclasses
2 values
Risk R-GV-5
stringclasses
2 values
Risk R-GV-6
stringclasses
2 values
Risk R-GV-7
stringclasses
2 values
Risk R-GV-8
stringclasses
2 values
Risk R-IR-1
stringclasses
2 values
Risk R-IR-2
stringclasses
2 values
Risk R-IR-3
stringclasses
2 values
Risk R-IR-4
stringclasses
1 value
Risk R-SA-1
stringclasses
2 values
Risk R-SA-2
stringclasses
2 values
Control Threat Summary
stringclasses
69 values
Threat NT-1
stringclasses
1 value
Threat NT-2
stringclasses
1 value
Threat NT-3
stringclasses
1 value
Threat NT-4
stringclasses
1 value
Threat NT-5
stringclasses
1 value
Threat NT-6
stringclasses
1 value
Threat NT-7
stringclasses
1 value
Threat NT-8
stringclasses
1 value
Threat NT-9
stringclasses
1 value
Threat NT-10
stringclasses
1 value
Threat NT-11
stringclasses
1 value
Threat NT-12
stringclasses
1 value
Threat NT-13
stringclasses
1 value
Threat NT-14
stringclasses
1 value
Threat MT-1
stringclasses
1 value
Threat MT-2
stringclasses
1 value
Threat MT-3
stringclasses
1 value
Threat MT-4
stringclasses
1 value
Threat MT-5
stringclasses
1 value
Threat MT-6
stringclasses
1 value
Threat MT-7
stringclasses
1 value
Threat MT-8
stringclasses
1 value
Threat MT-9
stringclasses
1 value
Threat MT-10
nullclasses
1 value
Threat MT-11
stringclasses
1 value
Threat MT-12
stringclasses
1 value
Threat MT-13
stringclasses
1 value
Threat MT-14
stringclasses
1 value
Threat MT-15
stringclasses
1 value
Threat MT-16
stringclasses
1 value
Errata 2023.4
nullclasses
30 values
Cybersecurity & Data Protection Governance
Cybersecurity & Data Protection Governance Program
GOV-01
Mechanisms exist to facilitate the implementation of cybersecurity & data protection governance controls.
- Steering committee - Digital Security Program (DSP) - Cybersecurity & Data Protection Program (CDPP)
E-GOV-01 E-GOV-02
Does the organization facilitate the implementation of cybersecurity & data protection governance controls?
10
Identify
X
X
X
There is no evidence of a capability to facilitate the implementation of cybersecurity & data privacy governance controls.
Cybersecurity & Privacy Governance (GOV) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist: • No formal cybersecurity and/ or data privacy principles are identified for the organization. • No formal Governance, Risk & Compliance (GRC) team exists. GRC roles are assigned to existing IT/cybersecurity personnel. • Governance efforts are narrowly-limited to certain compliance requirements. • Formal roles and responsibilities for cybersecurity and/ or data privacy may exist. • Cybersecurity and data privacy governance is informally assigned as an additional duty to existing IT/cybersecurity personnel. • Basic cybersecurity policies and standards are documented [not based on any industry framework] • Basic procedures are established for important tasks, but are ad hoc and not formally documented. • Documentation is made available to internal personnel. • Organizational leadership maintains an informal process to review and respond to observed trends. • Compliance efforts are not tied into an enterprise-wide cybersecurity and/ or data privacy program.
Cybersecurity & Privacy Governance (GOV) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Cybersecurity and data privacy governance activities are decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for cybersecurity & data privacy governance activities. • The Chief Information Officer (CIO), or similar function, analyzes the organization’s business strategy and prioritizes the objectives of the security function, based on business requirements. • A qualified individual is assigned the role and responsibilities to centrally manage, coordinate, develop, implement and maintain a cybersecurity & data privacy program (e.g., cybersecurity director or Chief Information Security Officer (CISO)). • No formal Governance, Risk & Compliance (GRC) team exists. GRC roles are assigned to existing cybersecurity personnel. • Compliance requirements for cybersecurity & data privacy are identified and documented. • Cybersecurity policies and standards exist that are aligned with a leading cybersecurity framework (e.g., SCF, NIST 800-53, ISO 27002 or NIST Cybersecurity Framework). • Controls are assigned to sensitive/regulated assets to comply with specific compliance requirements. • Procedures are established for sensitive/regulated obligations, but are not standardized across the organization. • Documentation is made available to internal personnel.
Cybersecurity & Privacy Governance (GOV) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • The Chief Information Security Officer (CISO), or similar function, analyzes the organization’s business strategy and prioritizes the objectives of the security function to determine prioritized and authoritative guidance for cybersecurity and data protection (e.g., data privacy) practices. • The CISO, or similar function, develops a security-focused Concept of Operations (CONOPS) that documents management, operational and technical measures to apply defense-in-depth techniques across the organization that includes cybersecurity & data privacy governance as part of the broader operational plan. • A Governance, Risk & Compliance (GRC) function, or similar function, provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to facilitate the implementation of secure and compliant practices to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data. • A GRC function, or similar function, provides scoping guidance to determine control applicability. • A steering committee is formally established to provide executive oversight of the cybersecurity & data privacy program. The steering committee establishes a clear and authoritative accountability structure for cybersecurity and data protection operations. • Compliance requirements for cybersecurity & data privacy controls are identified, documented and tested for adherence to internal standards or regulatory requirements. • Procedures are established for sensitive/regulated obligations and standardized across the organization. • Controls are standardized across the organization to ensure uniformity and consistent execution. • Internal policies and standards address all statutory, regulatory and contractual obligations for cybersecurity & data privacy. • Defined roles & responsibilities require data/process owners to define, implement and maintain cybersecurity & data privacy controls for each system, application and/ or service of which they have accountability.
Cybersecurity & Privacy Governance (GOV) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics are developed that provide management insight, per a quantitative understanding of process capabilities, to predict optimal performance, ensure continued operations and identify areas for improvement. ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to facilitate the implementation of cybersecurity & data privacy governance controls.
CC1.2
CC1.1-POF1 CC2.3-POF5
4 4.1 4.2 4.3 4.4 5 7 7.1 7.2 7.4 7.5 8 8.1 8.2 8.4 10 10.1 10.2 10.2.1 10.2.2
null
null
null
null
EDM01.02 APO01.09 APO04.01 APO13.01 APO13.02
Principle 2
GRC-05 GRC-07
GVN-01 GVN-02
null
8.2.1
null
RQ-05-02.a RQ-05-02.b
5.2 5.2.1 5.2.2
4.3 4.4 5.1 6.1.1
4.4 5.1 5.1(a) 5.1(b) 5.1(c) 5.1(d) 5.1(e) 5.1(f) 5.1(g) 5.1(h) 6.1 6.1.1 6.1.1(a) 6.1.1(b) 6.1.1(c) 6.1.1(d) 6.1.1(e)(1) 6.1.1(e)(2) 8.1 10.1
5.1 5.1.1
5.1 5.4 5.37
5.1 5.1.1
null
5.3.1 5.3.2 5.3.3 5.4 5.4.1 5.4.1.1 5.4.2 5.5 5.5.1 5.5.2 5.5.3 5.5.4 5.5.5 5.5.5.1 5.5.5.2 5.5.5.3 5.6.1 5.6.2 5.6.3 5.7 5.7.1 5.7.2 5.7.3 5.8 5.8.1 5.8.1 6.2 6.2.1 6.2.1.1 6.5
5.1 5.10 5.11
null
null
null
OR-1.0
Sec 4(A) Sec 4(B)(1) Sec 4(B)(2) Sec 4(B)(3) Sec 4(B)(4) Sec 4(D)(1) Sec 4(E)(1) Sec 4(G)
null
GV.PO-P1 GV.PO-P6
null
null
null
PM-1
null
null
null
PM-1
null
null
null
null
PM-1
null
null
null
null
null
null
null
null
null
null
null
null
3.15.1.a
null
null
null
null
null
GV.OC GV.RM GV.SC GV.RR GV.PO ID.RA ID.IM PR.AA PR.AT PR.DS PR.PS PR.IR DE.CM DE.AE RS.MA RS.AN RS.CO RS.MI RC.RP RC.CO
null
12.1 12.1.1
A3.1.2
null
null
null
null
null
null
null
null
null
C.7
null
1.2 1.2.1 9.1
null
7.1.2
7.1.2
PROGRAM-2.A.MIL1 PROGRAM-2.B.MIL2 PROGRAM-2.C.MIL2 PROGRAM-2.D.MIL2 PROGRAM-2.E.MIL2 PROGRAM-2.F.MIL2 PROGRAM-2.G.MIL3 PROGRAM-2.H.MIL3 PROGRAM-2.I.MIL3 PROGRAM-2.J.MIL3
EF:SG2.SP1 EF:SG2.SP2 OPF:SG1.SP1
null
5.1 5.1.1 5.1.1.1 5.1.1.2
null
null
null
null
null
null
PM-1
null
252.204-7008 252.204-7012
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
§ 1232h
null
S-P (17 CFR §248.30)
null
3.13(a) 3.13(a)(1) 3.13(a)(2) 3.13(a)(3) 314.4(a) 314.4(b) 314.4(c) 314.4(c)(2) 314.4(g)
164.306 164.306(a) 164.306(b) 164.306(c) 164.306(d) 164.306(e) 164.308(a)(1)(i) 164.530(j) 164.316 164.316(a) 164.316(b)
10.S.A
8.M.A
8.M.A 10.M.A
PM-1
null
null
8-100
null
null
null
null
null
5.1
null
null
null
null
45.48.530
null
null
null
null
null
null
null
17.03(1) 17.04 17.03(2)(b)(2)
null
500.02
Sec 4(2)(a) Sec 4(2)(b)(ii) Sec 4(2)(b)(ii)(A) Sec 4(2)(b)(ii)(A)(1) Sec 4(2)(b)(ii)(A)(2) Sec 4(2)(b)(ii)(A)(3) Sec 4(2)(b)(ii)(A)(4) Sec 4(2)(b)(ii)(A)(5) Sec 4(2)(b)(ii)(A)(6) Sec 4(2)(b)(ii)(B)(1) Sec 4(2)(b)(ii)(B)(2) Sec 4(2)(b)(ii)(B)(3) Sec 4(2)(b)(ii)(B)(4) Sec 4(2)(b)(ii)(C)(1) Sec 4(2)(b)(ii)(C)(2) Sec 4(2)(b)(ii)(C)(3) Sec 4(2)(b)(ii)(C)(4)
null
38-99-20(A) 38-99-20(B)(1) 38-99-20(B)(2) 38-99-20(B)(3) 38-99-20(B)(4) 38-99-20(D)(1) 38-99-20(E)(1) 38-99-20(G)
Sec. 521.052
Sec 10
PM-1
null
null
null
59.1-578.3
§ 2447(a) § 2447(a)(1) § 2447(a)(1)(A) § 2447(a)(1)(B) § 2447(a)(1)(C) § 2447(a)(1)(D) § 2447(a)(2) § 2447(b) § 2447(c) § 2447(c)(1) § 2447(c)(1)(A) § 2447(c)(1)(A)(i) § 2447(c)(1)(A)(ii) § 2447(c)(1)(A)(iii) § 2447(c)(1)(A)(iv) § 2447(c)(1)(A)(v)
null
Art 5.1 Art 16.1(a) Art 16.1(b) Art 16.1(c) Art 16.1(d) Art 16.1(e) Art 16.1(f) Art 16.1(g) Art 16.1(h)
null
Art 32.1 Art 32.2 Art 32.3 Art 32.4
Article 21.1 Article 21.2(a) Article 21.2(b) Article 21.2(c) Article 21.2(d) Article 21.2(e) Article 21.2(f) Article 21.2(g) Article 21.2(h) Article 21.2(i) Article 21.2(j)
Art 3
null
Sec 14 Sec 15
Art 16
Art 13
Art 41
Sec 5 Sec 32 Sec 33 Sec 34 Sec 35
Art 34
Sec 9 Sec 9a Annex
4.1
OIS-01
Art 10
Sec 7
Sec 2
3.2 4.25
Sec 16 Sec 17
Sec 31 Sec 33 Sec 34 Sec 35
null
Art 3 Art 4
Sec 12 Sec 13 Sec 14
null
Sec 13 Sec 14
Art 1 Art 36
Art 14 Art 15 Art 16 Art 17
null
Art 7 Art 19
null
TPC-25
3.1.1
1-2-1 1-3-2
1-1
null
null
Sec 19 Sec 21
null
6.1 [ORG.1]
Sec 31
Art 7
Art 12
Sec 15 Sec 16
A1.a B1.a B1.b
A1
null
null
null
null
null
null
APP Part 1 APP Part 11
null
0888
null
null
13 18 19
null
Sec 4
Article 58 Article 58(1) Article 58(2) Article 58(3) Article 58(4)
Principle 4
Sec 8
Art 9 Art 10 Art 12 Art 13 Art 14 Art 15 Art 16 Art 17 Art 18 Art 19 Art 20 Art 21 Art 22 Art 23 Art 24 Art 28
Article 20
4.1 4.2 4.3 4.4 4.4.1 4.4.2 4.4.2.1 4.4.4 4.4.5 4.4.5.3 4.5 4.5.1 4.5.1.1 4.5.1.2 4.5.2 4.6 4.6.1 4.9.1 4.9.1.1 4.9.2 4.9.2.1 4.9.2.2 5.1 5.1.1 5.1.2
Sec 9
3.1 9.1
5.1.14.C.01
null
Sec 25 Sec 27 Sec 28
Sec 12 Sec 24
null
null
Art 3 Art 29 Art 30
Art 27
Art 9 Art 30
null
Sec 6
4 5.4
null
6.5 6.6 6.7 6.23
1.1.2 1.2 3.0
Principle 7
Art 7
Art 4
Art 10
Art 19
Art 9 Art 16 Art 17
null
null
null
null
x
MA 201 CMR 17 NAIC
x
null
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-1 R-AM-2 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-GV-8 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1 R-SA-2
R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
null
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
R-SA-2
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15 MT-16
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
MT-16
null
Cybersecurity & Data Protection Governance
Steering Committee & Program Oversight
GOV-01.1
Mechanisms exist to coordinate cybersecurity, data protection and business alignment through a steering committee or advisory board, comprised of key cybersecurity, data privacy and business executives, which meets formally and on a regular basis.
- Steering committee - Digital Security Program (DSP) - Cybersecurity & Data Protection Program (CDPP)
E-GOV-03
Does the organization coordinate cybersecurity, data protection and business alignment through a steering committee or advisory board, comprised of key cybersecurity, data privacy and business executives, which meets formally and on a regular basis?
7
Identify
X
X
null
There is no evidence of a capability to coordinate cybersecurity, data privacy and business alignment through a steering committee or advisory board, comprised of key cybersecurity, data privacy and business executives, which meets formally and on a regular basis.
Cybersecurity & Privacy Governance (GOV) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist: • No formal cybersecurity and/ or data privacy principles are identified for the organization. • No formal Governance, Risk & Compliance (GRC) team exists. GRC roles are assigned to existing IT/cybersecurity personnel. • Governance efforts are narrowly-limited to certain compliance requirements. • Formal roles and responsibilities for cybersecurity and/ or data privacy may exist. • Cybersecurity and data privacy governance is informally assigned as an additional duty to existing IT/cybersecurity personnel. • Basic cybersecurity policies and standards are documented [not based on any industry framework] • Basic procedures are established for important tasks, but are ad hoc and not formally documented. • Documentation is made available to internal personnel. • Organizational leadership maintains an informal process to review and respond to observed trends.
Cybersecurity & Privacy Governance (GOV) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Cybersecurity and data privacy governance activities are decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for cybersecurity & data privacy governance activities. • The Chief Information Officer (CIO), or similar function, analyzes the organization’s business strategy and prioritizes the objectives of the security function, based on business requirements. • A qualified individual is assigned the role and responsibilities to centrally manage, coordinate, develop, implement and maintain a cybersecurity & data privacy program (e.g., cybersecurity director or Chief Information Security Officer (CISO)). • No formal Governance, Risk & Compliance (GRC) team exists. GRC roles are assigned to existing cybersecurity personnel. • Compliance requirements for cybersecurity & data privacy are identified and documented. • Cybersecurity policies and standards exist that are aligned with a leading cybersecurity framework (e.g., SCF, NIST 800-53, ISO 27002 or NIST Cybersecurity Framework). • Controls are assigned to sensitive/regulated assets to comply with specific compliance requirements. • Procedures are established for sensitive/regulated obligations, but are not standardized across the organization. • Documentation is made available to internal personnel. • Quarterly Business Review (QBR), or similar status reporting, exists to provide recurring reports on the state of the cybersecurity & data privacy program. • Organizational leadership maintains an informal process to review and respond to trends. • Procedures for important tasks are documented and assigned to individuals or teams.
Cybersecurity & Privacy Governance (GOV) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • A Governance, Risk & Compliance (GRC) function, or similar function, provides scoping guidance to determine control applicability. • Compliance requirements for cybersecurity & data privacy controls are identified, documented and tested for adherence to internal standards or regulatory requirements. • Procedures are established for sensitive/regulated obligations and standardized across the organization. • Controls are standardized across the organization to ensure uniformity and consistent execution. • Internal policies and standards address all statutory, regulatory and contractual obligations for cybersecurity & data privacy. • Defined roles & responsibilities require data/process owners to define, implement and maintain cybersecurity & data privacy controls for each system, application and/ or service of which they have accountability. • Executive leadership team (e.g., corporate-level officers, board of directors, etc.) take an active role in defining and enforcing Business As Usual (BAU) practices across the organization to operationalize cybersecurity & data privacy principles. • A GRC function, or similar function, tracks the efforts to determine if Business As Usual (BAU) reinforcement efforts impact metrics associated with cybersecurity & data privacy controls.
Cybersecurity & Privacy Governance (GOV) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics are developed that provide management insight, per a quantitative understanding of process capabilities, to predict optimal performance, ensure continued operations and identify areas for improvement. ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to coordinate cybersecurity, data privacy and business alignment through a steering committee or advisory board, comprised of key cybersecurity, data privacy and business executives, which meets formally and on a regular basis.
null
CC1.2-POF1 CC1.2-POF2 CC1.2-POF3 CC1.2-POF4 CC1.5-POF3 CC1.5-POF4 CC1.5-POF5 CC2.2-POF4 CC2.3-POF3
4.1 4.1.1 4.1.2 4.1.3 4.1.4 4.1.5 4.1.6 4.2 4.4 7.5 8.3 8.4
null
null
null
null
null
null
null
null
null
null
null
RQ-05-08
null
4.3 5.1 6.2 7.4 9.3 10.2
4.4 5.3 5.3(a) 5.3(b) 9.3 9.3.1 9.3.2(a) 9.3.2(b) 9.3.2(c) 9.3.2(d) 9.3.2(d)(1) 9.3.2(d)(2) 9.3.2(d)(3) 9.3.2(d)(4) 9.3.2(e) 9.3.2(f) 9.3.2(g) 9.3.3 10.1
null
null
5.1
null
null
null
null
null
null
null
Sec 4(B)(1) Sec 4(B)(2) Sec 4(B)(3) Sec 4(B)(4) Sec 4(D)(1) Sec 4(E)(2)(a) Sec 4(E)(2)(b)
GOVERN 2.3 MAP 3.5 MAP 5.2
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
GV.OC-02 GV.RM-03 GV.RR-03 GV.OV-01 GV.OV-02 ID.IM-01
null
null
null
null
null
null
null
null
null
null
null
null
C.6
null
null
null
null
null
ASSET-5.E.MIL3 ASSET-5.F.MIL3 THREAT-3.F.MIL3 RISK-1.E.MIL2 RISK-1.F.MIL2 RISK-1.H.MIL3 RISK-5.F.MIL3 ACCESS-4.D.MIL3 ACCESS-4.F.MIL3 SITUATION-4.D.MIL3 RESPONSE-5.D.MIL3 THIRD-PARTIES-3.D.MIL3 WORKFORCE-4.D.MIL3 ARCHITECTURE-5.D.MIL3 PROGRAM-2.C.MIL2 PROGRAM-2.D.MIL2 PROGRAM-2.E.MIL2 PROGRAM-2.F.MIL2 PROGRAM-2.G.MIL3 PROGRAM-2.H.MIL3 PROGRAM-2.I.MIL3 PROGRAM-2.J.MIL3 PROGRAM-3.D.MIL3
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
314.4(a)(2) 314.4(g)
null
null
null
null
null
null
null
null
null
null
null
17 CFR 229.106(C)(1) 17 CFR 229.106(C)(2) 17 CFR 229.106(C)(1)(i) 17 CFR 229.106(C)(1)(ii) 17 CFR 229.106(C)(1)(iii) FORM 8-K ITEM 1.05(a)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
38-99-20(B)(1) 38-99-20(B)(2) 38-99-20(B)(3) 38-99-20(B)(4) 38-99-20(D)(1) 38-99-20(E)(2)(a) 38-99-20(E)(2)(b)
null
null
null
null
null
null
null
null
3.2.1(2) 3.2.1(3) 3.2.1(4)
Art 5.2 Art 5.2(a) Art 5.2(b) Art 5.2(c) Art 5.2(d) Art 5.2(e) Art 5.2(f) Art 5.2(g) Art 5.2(h) Art 5.2(i)(i) Art 5.2(i)(ii) Art 5.2(i)(iii)
null
null
Article 21.2(f)
null
null
null
null
null
null
null
null
null
1.1 1.2 1.2(a) 1.2(b) 1.2(c) 1.2(d) 1.2(e) 1.2(f) 2.1 2.2 2.3 2.4 2.5
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
3.1.1
null
null
null
null
null
null
null
null
null
null
null
A1.a A1.c D2.a
null
null
null
null
null
null
null
null
null
0725
null
20 21 22(a) 20 21 22(a) 22(b) 22(c) 23 24 25
13 19
null
null
null
null
null
null
null
4.1 4.4.1.2 4.4.1.3 4.4.2 4.4.2.1 4.4.4 4.4.5 4.5.3 4.6 4.6 4.6.1.1 4.6.1.2 4.6.2 4.6.3 4.6.3.1 4.6.3.2 4.6.2.3 4.6.2.4 4.9 4.9.1 4.9.1.1 4.9.2 4.9.2.1 4.9.2.2
null
null
3.2.9.C.01
null
null
null
null
3.1.1 3.1.2 3.1.3 3.1.4 3.1.5 3.1.6 3.1.7(a) 3.1.7(b) 3.1.7(c) 3.1.7(d) 3.1.7(e) 3.1.7(f) 3.1.7(g) 3.1.8(a) 3.1.8(b) 3.1.8(c) 3.1.8(d) 3.1.8(e)
null
null
null
null
null
5.1 5.6
null
6.5 6.6 6.7 6.21 6.22 6.23 6.24
1.1 3.1.8
null
null
null
null
null
null
null
null
null
null
null
NAIC
null
x
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-1 R-AM-2 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-GV-8 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1 R-SA-2
R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
null
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
R-SA-2
NT-7 MT-1 MT-2 MT-3 MT-4 MT-5 MT-6 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Cybersecurity & Data Protection Governance
Status Reporting To Governing Body
GOV-01.2
Mechanisms exist to provide governance oversight reporting and recommendations to those entrusted to make executive decisions about matters considered material to the organization’s cybersecurity & data protection program.
null
E-CPL-05 E-CPL-09 E-GOV-03 E-GOV-04 E-GOV-05 E-GOV-06 E-GOV-07 E-GOV-13
Does the organization provide governance oversight reporting and recommendations to those entrusted to make executive decisions about matters considered material to the organization’s cybersecurity & data protection program?
5
Identify
X
X
null
There is no evidence of a capability to provide governance oversight reporting and recommendations to those entrusted to make executive decisions about matters considered material to the organization’s cybersecurity & data privacy program.
SP-CMM1 is N/A, since a structured process is required to provide governance oversight reporting and recommendations to those entrusted to make executive decisions about matters considered material to the organization’s cybersecurity & data privacy program.
Cybersecurity & Privacy Governance (GOV) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Cybersecurity and data privacy governance activities are decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for cybersecurity & data privacy governance activities. • The Chief Information Officer (CIO), or similar function, analyzes the organization’s business strategy and prioritizes the objectives of the security function, based on business requirements. • A qualified individual is assigned the role and responsibilities to centrally manage, coordinate, develop, implement and maintain a cybersecurity & data privacy program (e.g., cybersecurity director or Chief Information Security Officer (CISO)). • No formal Governance, Risk & Compliance (GRC) team exists. GRC roles are assigned to existing cybersecurity personnel. • Compliance requirements for cybersecurity & data privacy are identified and documented. • Cybersecurity policies and standards exist that are aligned with a leading cybersecurity framework (e.g., SCF, NIST 800-53, ISO 27002 or NIST Cybersecurity Framework). • Controls are assigned to sensitive/regulated assets to comply with specific compliance requirements. • Procedures are established for sensitive/regulated obligations, but are not standardized across the organization. • Documentation is made available to internal personnel.
Cybersecurity & Privacy Governance (GOV) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • A Governance, Risk & Compliance (GRC) function, or similar function, provides scoping guidance to determine control applicability. • Compliance requirements for cybersecurity & data privacy controls are identified, documented and tested for adherence to internal standards or regulatory requirements. • Procedures are established for sensitive/regulated obligations and standardized across the organization. • Controls are standardized across the organization to ensure uniformity and consistent execution. • Internal policies and standards address all statutory, regulatory and contractual obligations for cybersecurity & data privacy. • Defined roles & responsibilities require data/process owners to define, implement and maintain cybersecurity & data privacy controls for each system, application and/ or service of which they have accountability.
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to provide governance oversight reporting and recommendations to those entrusted to make executive decisions about matters considered material to the organization’s cybersecurity & data privacy program.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to provide governance oversight reporting and recommendations to those entrusted to make executive decisions about matters considered material to the organization’s cybersecurity & data privacy program.
null
CC2.2-POF2 CC2.3-POF3 CC2.3-POF5 CC4.2-POF2
4.2 4.3 4.4 8.3 8.4
null
null
null
null
null
null
null
null
null
null
null
null
null
null
7.4 7.4(a) 7.4(b) 7.4(c) 7.4(d) 9.1 9.1(a) 9.1(b) 9.1(c) 9.1(d) 9.1(e) 9.1(f) 9.3 9.3.1 9.3.2(a) 9.3.2(b) 9.3.2(c) 9.3.2(d) 9.3.2(d)(1) 9.3.2(d)(2) 9.3.2(d)(3) 9.3.2(d)(4) 9.3.2(e) 9.3.2(f) 9.3.2(g) 9.3.3
null
null
null
null
null
null
null
null
null
null
null
GOVERN 2.3 MAP 3.5
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
GV.OV GV.OV-01 ID.IM-01
null
null
null
null
null
null
null
null
null
null
null
null
A.1.8
null
null
null
null
null
ASSET-5.E.MIL3 ASSET-5.F.MIL3 THREAT-3.F.MIL3 RISK-1.E.MIL2 RISK-1.F.MIL2 RISK-5.F.MIL3 ACCESS-4.F.MIL3 SITUATION-4.F.MIL3 RESPONSE-5.F.MIL3 THIRD-PARTIES-3.F.MIL3 WORKFORCE-4.F.MIL3 ARCHITECTURE-5.F.MIL3 PROGRAM-3.F.MIL3
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
314.4(i) 314.4(i)(1) 314.4(i)(2)
null
null
null
null
null
null
null
null
null
null
null
17 CFR 229.106(C)(1) 17 CFR 229.106(C)(2) 17 CFR 229.106(C)(1)(i) 17 CFR 229.106(C)(1)(ii) 17 CFR 229.106(C)(1)(iii)
null
null
null
null
null
null
null
null
7102(a)(1)(A) 7102(a)(1)(B) 7102(a)(1)(C) 7102(a)(1)(D) 7102(a)(1)(E) 7102(a)(1)(F) 7102(a)(2) 7102(b)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
3.3.1(13)(e) 3.3.5(24)
Art 13.5
null
null
null
null
null
null
null
null
null
null
null
null
3.9 3.11 4.10 7.5
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
A1.c D2.a
null
null
null
null
null
null
null
null
null
null
null
30 58(a) 58(b) 58(c)
null
null
null
null
null
null
null
null
4.4.1.2 4.6 4.6.1.1 4.6.1.2 4.6.2 4.6.3 4.6.3.1 4.6.3.2 4.6.2.3 4.6.2.4 4.7 4.9 4.9.1 4.9.1.1 4.9.2 4.9.2.1 4.9.2.2
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
3.1.8
null
null
null
null
null
null
null
null
null
null
null
null
null
null
R-AC-1 R-EX-3 R-EX-4 R-GV-1 R-GV-4 R-GV-5 R-GV-6 R-GV-7
R-AC-1
null
null
null
null
null
null
null
null
null
null
null
null
null
R-EX-3
R-EX-4
null
null
null
R-GV-1
null
null
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
null
null
null
null
null
null
NT-1 NT-2 NT-3 NT-4 NT-5 NT-6 NT-7 NT-8 NT-9 NT-10 NT-11 NT-12 NT-13 NT-14 MT-8 MT-9 MT-12 MT-13 MT-14 MT-15
NT-1
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
null
null
null
null
null
null
null
MT-8
MT-9
null
null
MT-12
MT-13
MT-14
MT-15
null
null
Cybersecurity & Data Protection Governance
Publishing Cybersecurity & Data Protection Documentation
GOV-02
Mechanisms exist to establish, maintain and disseminate cybersecurity & data protection policies, standards and procedures.
- Steering committee - Digital Security Program (DSP) - Cybersecurity & Data Protection Program (CDPP) - Governance, Risk and Compliance Solution (GRC) tool (SCFConnect, SureCloud, Ostendio, ZenGRC, Archer, RSAM, MetricStream, etc.) - Wiki - SharePoint
E-GOV-08 E-GOV-09 E-GOV-11
Does the organization establish, maintain and disseminate cybersecurity & data protection policies, standards and procedures?
10
Identify
X
X
X
There is no evidence of a capability to establish, maintain and disseminate cybersecurity & data privacy policies, standards and procedures.
Cybersecurity & Privacy Governance (GOV) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist: • No formal cybersecurity and/ or data privacy principles are identified for the organization. • No formal Governance, Risk & Compliance (GRC) team exists. GRC roles are assigned to existing IT/cybersecurity personnel. • Governance efforts are narrowly-limited to certain compliance requirements. • Formal roles and responsibilities for cybersecurity and/ or data privacy may exist. • Cybersecurity and data privacy governance is informally assigned as an additional duty to existing IT/cybersecurity personnel. • Basic cybersecurity policies and standards are documented [not based on any industry framework] • Basic procedures are established for important tasks, but are ad hoc and not formally documented. • Documentation is made available to internal personnel. • Organizational leadership maintains an informal process to review and respond to observed trends.
Cybersecurity & Privacy Governance (GOV) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Cybersecurity and data privacy governance activities are decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for cybersecurity & data privacy governance activities. • The Chief Information Officer (CIO), or similar function, analyzes the organization’s business strategy and prioritizes the objectives of the security function, based on business requirements. • A qualified individual is assigned the role and responsibilities to centrally manage, coordinate, develop, implement and maintain a cybersecurity & data privacy program (e.g., cybersecurity director or Chief Information Security Officer (CISO)). • No formal Governance, Risk & Compliance (GRC) team exists. GRC roles are assigned to existing cybersecurity personnel. • Compliance requirements for cybersecurity & data privacy are identified and documented. • Cybersecurity policies and standards exist that are aligned with a leading cybersecurity framework (e.g., SCF, NIST 800-53, ISO 27002 or NIST Cybersecurity Framework). • Controls are assigned to sensitive/regulated assets to comply with specific compliance requirements. • Procedures are established for sensitive/regulated obligations, but are not standardized across the organization. • Documentation is made available to internal personnel.
Cybersecurity & Privacy Governance (GOV) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • A Governance, Risk & Compliance (GRC) function, or similar function, provides scoping guidance to determine control applicability. • Compliance requirements for cybersecurity & data privacy controls are identified, documented and tested for adherence to internal standards or regulatory requirements. • Procedures are established for sensitive/regulated obligations and standardized across the organization. • Controls are standardized across the organization to ensure uniformity and consistent execution. • Internal policies and standards address all statutory, regulatory and contractual obligations for cybersecurity & data privacy. • Defined roles & responsibilities require data/process owners to define, implement and maintain cybersecurity & data privacy controls for each system, application and/ or service of which they have accountability.
Cybersecurity & Privacy Governance (GOV) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics are developed that provide management insight, per a quantitative understanding of process capabilities, to predict optimal performance, ensure continued operations and identify areas for improvement. ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to establish, maintain and disseminate cybersecurity & data privacy policies, standards and procedures.
CC5.3
CC1.4-POF1 CC2.2-POF1 CC2.2-POF4 CC2.2-POF7 CC5.3-POF1 CC7.2-POF1
4.2 7.3
null
null
null
null
APO01.09
Principle 12
A&A-01 AIS-01 BCR-01 CCC-01 CEK-01 DCS-01 DCS-02 DCS-03 DCS-04 DSP-01 GRC-01 GRC-02 HRS-01 HRS-02 HRS-03 HRS-04 IAM-01 IAM-02 IPY-01 IVS-01 LOG-01 SEF-01 SEF-02 STA-01 STA-12 TVM-01 TVM-02 UEM-01
GVN-01 GVN-02 POL-03
SO1
8.2.1
null
RQ-05-01.a RQ-05-01.b
5.2.1 5.2.2
4.3 5.2 7.5.1 7.5.2 7.5.3
5.1(a) 5.2 5.2(a) 5.2(b) 5.2(c) 5.2(d) 5.2(e) 5.2(f) 5.2(g) 7.5 7.5.1 7.5.1(a) 7.5.1(b) 7.5.2 7.5.2(a) 7.5.2(b) 7.5.2(c) 7.5.3 7.5.3(a) 7.5.3(b) 7.5.3(c) 7.5.3(d) 7.5.3(e) 7.5.3(f)
5.1.1 6.2.1 9.1.1
5.1 5.37
5.1.1 6.2.1 9.1.1
null
6.2 6.2.1 6.2.1.1
null
null
null
null
OR-1.0 OR-3.0 OP-2.0 PS-2.0 TS-2.4 TS-2.6 TS-2.8 TS-2.11 TS-3.0
null
GOVERN 1.0 GOVERN 1.2 GOVERN 1.4 GOVERN 2.2 GOVERN 3.2 GOVERN 4.1 GOVERN 5.1 GOVERN 6.0 GOVERN 6.1 MAP 3.5
GV.PO-P1 GV.PO-P6 GV.MT-P3 GV.MT-P4 GV.MT-P5 GV.MT-P6 GV.MT-P7 CT.PO-P1 CT.PO-P2 CT.PO-P3 CM.PO-P1 PR.PO-P4
null
P-5
null
PM-1
null
null
null
AC-1 AT-1 AU-1 CA-1 CM-1 CP-1 IA-1 IR-1 MA-1 MP-1 PE-1 PL-1 PM-1 PS-1 PT-1 RA-1 SA-1 SC-1 SI-1 SR-1
null
null
null
null
PM-1
null
null
null
null
null
null
null
null
null
null
null
null
null
3.4.9[a] 3.9.2[a]
A.03.15.01.a[01] A.03.15.01.a[02] A.03.15.01.b[01] A.03.15.01.b[02]
null
null
ID.GV-1
GV.PO-01
null
12.1 12.1.1
1.1.1 2.1.1 3.1.1 4.1.1 5.1.1 6.1.1 7.1.1 8.1.1 8.3.8 9.1.1 10.1.1 11.1.1 12.1 12.1.1 12.1.2 12.1.3
3.1.1
1.1.1 2.1.1 3.1.1 4.1.1 5.1.1 6.1.1 8.1.1 8.3.8 12.1.1 12.1.2 12.1.3
3.1.1 12.1.1 12.1.2 12.1.3
3.1.1 8.1.1 9.1.1 12.1.1 12.1.2 12.1.3
2.1.1 3.1.1 5.1.1 8.1.1 8.3.8 9.1.1 10.1.1 12.1.1 12.1.2 12.1.3
2.1.1 3.1.1 8.1.1 9.1.1 12.1.1 12.1.2
1.1.1 2.1.1 3.1.1 4.1.1 5.1.1 6.1.1 7.1.1 8.1.1 8.3.8 9.1.1 10.1.1 11.1.1 12.1.1 12.1.2 12.1.3
1.1.1 2.1.1 3.1.1 4.1.1 5.1.1 6.1.1 7.1.1 8.1.1 8.3.8 9.1.1 10.1.1 11.1.1 12.1.1 12.1.2 12.1.3
3.1.1 9.1.1 12.1.1 12.1.2 12.1.3
C.1
null
1.1 1.1.1 7.1.1
null
null
null
ASSET-5.C.MIL3 THREAT-3.C.MIL3 RISK-5.C.MIL3 ACCESS-4.C.MIL3 SITUATION-4.C.MIL3 RESPONSE-5.C.MIL3 THIRD-PARTIES-3.C.MIL3 WORKFORCE-4.C.MIL3 ARCHITECTURE-5.C.MIL3 PROGRAM-3.C.MIL3
EF:SG2.SP1 EF:SG2.SP2
null
5.8 5.9
null
null
null
null
null
null
PM-1
null
252.204-7008 252.204-7012
null
null
null
null
§ 11.10 § 11.10(j)
null
null
null
null
null
null
null
null
null
null
§ 1232h
D1.G.SP.B.4
S-P (17 CFR §248.30)
null
314.4(c) 314.4(c)(8) 314.4(e)
164.306 164.308 164.308(a)(1)(i) 164.312 164.316 164.316(a) 164.316(b) 164.316(b)(1) 164.316(b)(1)(i) 164.316(b)(1)(ii) 164.316(b)(2)(ii) 164.530(i) 164.530(i)(1) 164.530(i)(2) 164.530(i)(3) 164.530(j) 164.530(j)(1)
4.S.A 10.S.A
4.M.B
4.M.B 10.M.A
1.8.2 2.C.2 PM-1
null
null
null
null
null
null
null
null
5.1 5.2
null
null
null
III.B III.B.1.d III.C III.C.1 III.C.1.a III.C.1.b III.C.3 III.D
45.48.530
null
null
null
null
null
null
null
17.03(1) 17.04 17.03(2)(b)(2)
null
500.03
null
null
null
null
Sec 10
PM-1
null
null
Sec 11.175(b)
null
§ 2447(b)(3)
3.4.1(28) 3.4.1(29) 3.4.5(38)
Art 6.2 Art 9.4(a) Art 9.4(d) Art 9.4(e) Art 9.4(f)
null
Art 32.1 Art 32.2 Art 32.3 Art 32.4
Article 21.1 Article 21.2(a) Article 21.2(b) Article 21.2(c) Article 21.2(d) Article 21.2(e) Article 21.2(f) Article 21.2(g) Article 21.2(h) Article 21.2(i) Article 21.2(j)
Art 3
null
Sec 14 Sec 15
Art 16
null
null
null
null
null
4.2 4.3 4.8
OIS-01 OIS-02 SP-01
null
null
null
1.1 4.1 4.25 5.2 5.3 9.1 10.1 11.2 12.1 13.1 14.1 15.1 17.1 18.1 20.1 21.1 22.1 24.1 25.1
null
null
null
null
null
4.1(1)
null
null
null
Article 8.4
null
null
TPC-25
3.1.3
1-3-1 1-3-3
1-1 1-1-1
null
null
null
null
6.1 [ORG.1] 6.2 [ORG.2]
null
null
null
null
A1.a B1.a B1.b
A1 A5
null
null
null
null
null
null
null
APP 1
0047 0888 1478 1602 1784 1785 1551
null
null
18 19
null
null
null
null
null
null
null
4.4.1 4.4.4 4.4.5 4.4.5.1 4.4.5.3 4.5.1 4.5.2 4.5.3 4.5.3.1 4.6 4.6.1 4.8.1 4.8.1.1 4.8.2 4.8.2.1 4.8.2.2 5.1.1
null
1.4.2 1.5 3.2 4.1 4.2 5.2 6.2 7.2 8.2 9.2 10.2 11.2 12.2 13.2 14.2 15.2 16.2 17.2 18.2 19.2
5.1.7.C.01 5.1.14.C.01 5.1.16.C.01 5.1.16.C.02 5.1.17.C.01 5.1.18.C.01 5.1.19.C.01 5.1.20.C.01 5.1.20.C.02 5.2.3.C.01 5.2.3.C.02
null
null
null
null
3.2.1
null
null
null
null
null
null
null
6.1 6.3
1.1.2
null
null
null
null
null
null
null
null
null
null
x
MA 201 CMR 17
null
x
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-1 R-AM-2 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-GV-8 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1 R-SA-2
R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
null
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
R-SA-2
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Cybersecurity & Data Protection Governance
Exception Management
GOV-02.1
Mechanisms exist to prohibit exceptions to standards, except when the exception has been formally assessed for risk impact, approved and recorded.
null
null
Does the organization prohibit exceptions to standards, except when the exception has been formally assessed for risk impact, approved and recorded?
8
Protect
X
X
X
There is no evidence of a capability to prohibit exceptions to standards, except when the exception has been formally assessed for risk impact, approved and recorded.
Cybersecurity & Privacy Governance (GOV) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist: • No formal cybersecurity and/ or data privacy principles are identified for the organization. • No formal Governance, Risk & Compliance (GRC) team exists. GRC roles are assigned to existing IT/cybersecurity personnel. • Governance efforts are narrowly-limited to certain compliance requirements. • Formal roles and responsibilities for cybersecurity and/ or data privacy may exist. • Cybersecurity and data privacy governance is informally assigned as an additional duty to existing IT/cybersecurity personnel. • Basic cybersecurity policies and standards are documented [not based on any industry framework] • Basic procedures are established for important tasks, but are ad hoc and not formally documented. • Documentation is made available to internal personnel. • Organizational leadership maintains an informal process to review and respond to observed trends.
Cybersecurity & Privacy Governance (GOV) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Cybersecurity and data privacy governance activities are decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for cybersecurity & data privacy governance activities. • The Chief Information Officer (CIO), or similar function, analyzes the organization’s business strategy and prioritizes the objectives of the security function, based on business requirements. • A qualified individual is assigned the role and responsibilities to centrally manage, coordinate, develop, implement and maintain a cybersecurity & data privacy program (e.g., cybersecurity director or Chief Information Security Officer (CISO)). • No formal Governance, Risk & Compliance (GRC) team exists. GRC roles are assigned to existing cybersecurity personnel. • Compliance requirements for cybersecurity & data privacy are identified and documented. • Cybersecurity policies and standards exist that are aligned with a leading cybersecurity framework (e.g., SCF, NIST 800-53, ISO 27002 or NIST Cybersecurity Framework). • Controls are assigned to sensitive/regulated assets to comply with specific compliance requirements. • Procedures are established for sensitive/regulated obligations, but are not standardized across the organization. • Documentation is made available to internal personnel.
Cybersecurity & Privacy Governance (GOV) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • A Governance, Risk & Compliance (GRC) function, or similar function, provides scoping guidance to determine control applicability. • Compliance requirements for cybersecurity & data privacy controls are identified, documented and tested for adherence to internal standards or regulatory requirements. • Procedures are established for sensitive/regulated obligations and standardized across the organization. • Controls are standardized across the organization to ensure uniformity and consistent execution. • Internal policies and standards address all statutory, regulatory and contractual obligations for cybersecurity & data privacy. • Defined roles & responsibilities require data/process owners to define, implement and maintain cybersecurity & data privacy controls for each system, application and/ or service of which they have accountability.
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to prohibit exceptions to standards, except when the exception has been formally assessed for risk impact, approved and recorded.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to prohibit exceptions to standards, except when the exception has been formally assessed for risk impact, approved and recorded.
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
ID.RA-07
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-1 R-AM-2 R-AM-3 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-GV-8 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1 R-SA-2
R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
R-SA-2
NT-7 MT-1 MT-2 MT-3 MT-4 MT-6 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
MT-3
MT-4
null
MT-6
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Cybersecurity & Data Protection Governance
Periodic Review & Update of Cybersecurity & Data Protection Program
GOV-03
Mechanisms exist to review the cybersecurity & data privacy program, including policies, standards and procedures, at planned intervals or if significant changes occur to ensure their continuing suitability, adequacy and effectiveness.
- Governance, Risk and Compliance Solution (GRC) tool (SCFConnect, SureCloud, Ostendio, ZenGRC, Archer, RSAM, MetricStream, etc.) - Steering committee
E-GOV-12
Does the organization review the cybersecurity & data privacy program, including policies, standards and procedures, at planned intervals or if significant changes occur to ensure their continuing suitability, adequacy and effectiveness?
7
Identify
X
X
X
There is no evidence of a capability to review the cybersecurity & data privacy program, including policies, standards and procedures, at planned intervals or if significant changes occur to ensure their continuing suitability, adequacy and effectiveness.
Cybersecurity & Privacy Governance (GOV) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist: • No formal cybersecurity and/ or data privacy principles are identified for the organization. • No formal Governance, Risk & Compliance (GRC) team exists. GRC roles are assigned to existing IT/cybersecurity personnel. • Governance efforts are narrowly-limited to certain compliance requirements. • Formal roles and responsibilities for cybersecurity and/ or data privacy may exist. • Cybersecurity and data privacy governance is informally assigned as an additional duty to existing IT/cybersecurity personnel. • Basic cybersecurity policies and standards are documented [not based on any industry framework] • Basic procedures are established for important tasks, but are ad hoc and not formally documented. • Documentation is made available to internal personnel. • Organizational leadership maintains an informal process to review and respond to observed trends. • Documentation change control processes do not exist or are not formal. • People affected by documentation changes are provided notification of the policy and standard changes. • Informal recommendations are leveraged to update existing policies and standards. • Unstructured review of the cybersecurity and/ or data privacy program is performed on an annual basis.
Cybersecurity & Privacy Governance (GOV) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Cybersecurity and data privacy governance activities are decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for cybersecurity & data privacy governance activities. • The Chief Information Officer (CIO), or similar function, analyzes the organization’s business strategy and prioritizes the objectives of the security function, based on business requirements. • A qualified individual is assigned the role and responsibilities to centrally manage, coordinate, develop, implement and maintain a cybersecurity & data privacy program (e.g., cybersecurity director or Chief Information Security Officer (CISO)). • No formal Governance, Risk & Compliance (GRC) team exists. GRC roles are assigned to existing cybersecurity personnel. • Compliance requirements for cybersecurity & data privacy are identified and documented. • Cybersecurity policies and standards exist that are aligned with a leading cybersecurity framework (e.g., SCF, NIST 800-53, ISO 27002 or NIST Cybersecurity Framework). • Controls are assigned to sensitive/regulated assets to comply with specific compliance requirements. • Procedures are established for sensitive/regulated obligations, but are not standardized across the organization. • Documentation is made available to internal personnel. • Formal documentation review process is performed on an annual basis. • Documentation review process includes the scope of applicable statutory, regulatory and contractual obligations. • Recommendations for documentation edits are submitted for review and are handled in accordance with documentation change control processes. • Updated documentation versions are published at least annually, based on the review process. • People affected by documentation changes are provided notification of the policy and standard changes.
Cybersecurity & Privacy Governance (GOV) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • A Governance, Risk & Compliance (GRC) function, or similar function, provides scoping guidance to determine control applicability. • Compliance requirements for cybersecurity & data privacy controls are identified, documented and tested for adherence to internal standards or regulatory requirements. • Procedures are established for sensitive/regulated obligations and standardized across the organization. • Controls are standardized across the organization to ensure uniformity and consistent execution. • Internal policies and standards address all statutory, regulatory and contractual obligations for cybersecurity & data privacy. • Defined roles & responsibilities require data/process owners to define, implement and maintain cybersecurity & data privacy controls for each system, application and/ or service of which they have accountability. • Quarterly Business Review (QBR), or similar status reporting, exists to provide recurring reports on the state of the cybersecurity & data privacy program to the organization's Board of Directors. • Formal documentation review process is performed on an annual basis. • Documentation review process includes the scope of applicable statutory, regulatory and contractual obligations. • Recommendations for documentation edits are submitted for review and are handled in accordance with documentation change control processes. • Updated documentation versions are published at least annually, based on the review process. • People affected by documentation changes are provided notification of the policy and standard changes.
Cybersecurity & Privacy Governance (GOV) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics are developed that provide management insight, per a quantitative understanding of process capabilities, to predict optimal performance, ensure continued operations and identify areas for improvement. ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to review the cybersecurity & data privacy program, including policies, standards and procedures, at planned intervals or if significant changes occur to ensure their continuing suitability, adequacy and effectiveness.
CC5.3
CC2.2-POF4 CC2.2-POF7 CC5.3-POF6
4.3 4.4 8.3 8.4
null
null
null
null
EDM01.01 EDM01.03 EDM05.01 APO02.02 APO13.03
Principle 12
A&A-01 AIS-01 BCR-01 CCC-01 CEK-01 DCS-01 DCS-02 DCS-03 DCS-04 DSP-01 GRC-01 GRC-02 GRC-03 HRS-01 HRS-02 HRS-03 HRS-04 IAM-01 IAM-02 IPY-01 IVS-01 LOG-01 SEF-01 SEF-02 STA-01 TVM-01 TVM-02 UEM-01
null
SO1
8.2.1
null
RQ-05-08
null
6.1.1 7.4
7.5.2 7.5.2(a) 7.5.2(b) 7.5.2(c)
5.1.2
5.1 5.37
5.1.2
null
6.2.1.2
null
null
null
null
OP-2.0
Sec 4(G)
null
GV.MT-P2
null
null
null
PM-1
null
null
null
AC-1 AT-1 AU-1 CA-1 CM-1 CP-1 IA-1 IR-1 MA-1 MP-1 PE-1 PL-1 PM-1 PS-1 PT-1 RA-1 SA-1 SC-1 SI-1 SR-1
null
null
null
null
PM-1
null
null
null
null
null
null
null
null
null
null
null
null
3.15.1.b
null
A.03.15.01.b[01]
null
null
null
GV.PO-02
null
null
1.1.1 2.1.1 3.1.1 4.1.1 5.1.1 6.1.1 7.1.1 8.1.1 9.1.1 10.1.1 11.1.1 12.1 12.1.1 12.1.2
3.1.1
1.1.1 2.1.1 3.1.1 4.1.1 5.1.1 6.1.1 8.1.1 8.3.8 12.1.1 12.1.2 12.1.3
3.1.1 12.1.1 12.1.2 12.1.3
3.1.1 8.1.1 9.1.1 12.1.1 12.1.2 12.1.3
2.1.1 3.1.1 5.1.1 8.1.1 8.3.8 9.1.1 10.1.1 12.1.1 12.1.2 12.1.3
2.1.1 3.1.1 8.1.1 9.1.1 12.1.1 12.1.2
1.1.1 2.1.1 3.1.1 4.1.1 5.1.1 6.1.1 7.1.1 8.1.1 8.3.8 9.1.1 10.1.1 11.1.1 12.1.1 12.1.2 12.1.3
1.1.1 2.1.1 3.1.1 4.1.1 5.1.1 6.1.1 7.1.1 8.1.1 8.3.8 9.1.1 10.1.1 11.1.1 12.1.1 12.1.2 12.1.3
3.1.1 9.1.1 12.1.1 12.1.2
P.2.4
null
null
null
null
null
null
EF:SG2.SP1 EF:SG2.SP2 OPF:SG1.SP2 OPF:SG1.SP3 OPF:SG2.SP1
null
null
null
null
null
null
null
null
PM-1
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
§ 1232h
null
null
null
314.4(b) 314.4(g)
164.306(e) 164.316(b) 164.316(b)(1) 164.316(b)(1)(i) 164.316(b)(1)(ii) 164.316(b)(2)(iii) 164.530(i)(2)
10.S.A
null
10.M.A
PM-1
null
null
null
null
null
null
null
null
null
null
null
null
null
45.48.530
null
null
null
null
null
null
null
null
null
null
Sec 4(2)(b)(ii)(A)(6)
null
38-99-20(G)
null
Sec 10
PM-1
null
null
null
null
§ 2447(b)(8)(B) § 2447(b)(9) § 2447(b)(9)(A) § 2447(b)(9)(B)
3.3.1(14)
null
null
Art 32.1 Art 32.2 Art 32.3 Art 32.4
null
Art 3
null
Sec 14 Sec 15
Art 16
null
null
null
null
null
4.2 4.8
OIS-01 SP-02
null
null
null
1.1 5.2 9.1 10.1 11.2 13.1 14.1 15.1 17.1 18.1 21.1 22.1 24.1 25.1
null
null
null
null
null
null
null
null
null
null
null
null
null
null
1-1-3 1-3-4 1-6-4 1-9-6 1-10-5 2-2-4 2-3-4 2-4-4 2-5-4 2-6-4 2-7-4 2-8-4 2-9-4 2-10-4 2-11-4 2-12-4 2-13-4 2-14-4 2-15-4 3-1-4 4-1-4 4-2-4 5-1-4
1-1-3
null
null
null
null
null
null
null
null
null
B1.a B1.b
null
null
null
null
null
null
null
null
null
1617
null
null
19
null
null
null
null
null
null
null
4.5.3 4.5.3.1 4.6 4.6.2 4.6.2.1 4.7 4.8.2 4.8.2.1 4.8.2.2 5.1.2
null
null
5.1.14.C.01 5.1.21.C.01 5.1.21.C.02
null
null
null
null
3.2.2
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
x
NAIC
null
x
R-AC-1 R-BC-4 R-BC-5 R-EX-2 R-EX-5 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-GV-8 R-IR-3 R-SA-1 R-SA-2
R-AC-1
null
null
null
null
null
null
null
null
null
R-BC-4
R-BC-5
null
R-EX-2
null
null
R-EX-5
null
null
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
null
null
R-IR-3
null
R-SA-1
R-SA-2
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Cybersecurity & Data Protection Governance
Assigned Cybersecurity & Data Protection Responsibilities
GOV-04
Mechanisms exist to assign one or more qualified individuals with the mission and resources to centrally-manage, coordinate, develop, implement and maintain an enterprise-wide cybersecurity & data protection program.
- NIST NICE Framework - Chief Information Security Officer (CISO)
E-HRS-01 E-HRS-05 E-HRS-06 E-HRS-07 E-HRS-08 E-HRS-09 E-HRS-10 E-HRS-13 E-HRS-15
Does the organization assign one or more qualified individuals with the mission and resources to centrally-manage, coordinate, develop, implement and maintain an enterprise-wide cybersecurity & data protection program?
10
Identify
X
X
X
There is no evidence of a capability to assign a qualified individual with the mission and resources to centrally-manage, coordinate, develop, implement and maintain an enterprise-wide cybersecurity & data privacy program.
SP-CMM1 is N/A, since a structured process is required to assign a qualified individual with the mission and resources to centrally-manage, coordinate, develop, implement and maintain an enterprise-wide cybersecurity & data privacy program.
Cybersecurity & Privacy Governance (GOV) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Cybersecurity and data privacy governance activities are decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for cybersecurity & data privacy governance activities. • The Chief Information Officer (CIO), or similar function, analyzes the organization’s business strategy and prioritizes the objectives of the security function, based on business requirements. • A qualified individual is assigned the role and responsibilities to centrally manage, coordinate, develop, implement and maintain a cybersecurity & data privacy program (e.g., cybersecurity director or Chief Information Security Officer (CISO)). • No formal Governance, Risk & Compliance (GRC) team exists. GRC roles are assigned to existing cybersecurity personnel. • Compliance requirements for cybersecurity & data privacy are identified and documented. • Cybersecurity policies and standards exist that are aligned with a leading cybersecurity framework (e.g., SCF, NIST 800-53, ISO 27002 or NIST Cybersecurity Framework). • Controls are assigned to sensitive/regulated assets to comply with specific compliance requirements. • Procedures are established for sensitive/regulated obligations, but are not standardized across the organization. • Documentation is made available to internal personnel.
Cybersecurity & Privacy Governance (GOV) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • A Governance, Risk & Compliance (GRC) function, or similar function, provides scoping guidance to determine control applicability. • Compliance requirements for cybersecurity & data privacy controls are identified, documented and tested for adherence to internal standards or regulatory requirements. • Procedures are established for sensitive/regulated obligations and standardized across the organization. • Controls are standardized across the organization to ensure uniformity and consistent execution. • Internal policies and standards address all statutory, regulatory and contractual obligations for cybersecurity & data privacy. • Defined roles & responsibilities require data/process owners to define, implement and maintain cybersecurity & data privacy controls for each system, application and/ or service of which they have accountability.
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to assign a qualified individual with the mission and resources to centrally-manage, coordinate, develop, implement and maintain an enterprise-wide cybersecurity & data privacy program.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to assign a qualified individual with the mission and resources to centrally-manage, coordinate, develop, implement and maintain an enterprise-wide cybersecurity & data privacy program.
CC1.1 CC1.3
CC5.3-POF2
4.1 4.1.1 4.1.2 4.1.3 4.1.4 4.1.5 4.1.6
null
null
null
null
APO01.05
Principle 1 Principle 3
GRC-06 STA-04
null
null
8.2.7
null
RQ-05-03 RQ-06-04
5.1 5.3
5.3
5.1(f) 5.1(h) 5.3 5.3(a) 5.3(b)
null
5.2
6.1.1
null
null
null
null
null
null
null
Sec 4(C)(1)
GOVERN 2.3 GOVERN 5.0
ID.IM-P2 GV.PO-P3 CM.PO-P2
null
P-1
null
PL-9 PM-2 PM-6
null
null
null
PL-9 PM-2 PM-6 PM-29
null
null
null
null
PM-2 PM-6 PM-29
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
ID.AM-6
GV.RR-01
null
12.5 12.5.1 12.5.2 12.5.3 12.5.4 12.5.5
1.1.2 2.1.2 3.1.2 4.1.2 5.1.2 6.1.2 7.1.2 8.1.2 9.1.2 10.1.2 11.1.2 12.1.3 12.1.4 A3.1.1 A3.1.3
null
12.1.3 12.1.4
12.1.3
null
12.1.3
null
1.1.2 2.1.2 3.1.2 4.1.2 5.1.2 6.1.2 7.1.2 8.1.2 9.1.2 10.1.2 11.1.2 12.1.3 12.1.4 A3.1.1 A3.1.3
1.1.2 2.1.2 3.1.2 4.1.2 5.1.2 6.1.2 7.1.2 8.1.2 9.1.2 10.1.2 11.1.2 12.1.3 12.1.4 A3.1.1 A3.1.3
12.1.3
C.7
null
1.2.2
null
null
null
ASSET-5.D.MIL3 THREAT-3.D.MIL3 RISK-1.E.MIL2 RISK-1.F.MIL2 RISK-5.D.MIL3 ACCESS-4.D.MIL3 SITUATION-4.D.MIL3 RESPONSE-5.D.MIL3 THIRD-PARTIES-3.D.MIL3 WORKFORCE-4.D.MIL3 ARCHITECTURE-5.D.MIL3 PROGRAM-3.D.MIL3
EF:SG2.SP2 EF:SG4.SP2 GG2.GP1 MA:SG1.SP1 MON:SG1.SP1 MON:SG1.SP3
null
null
null
null
null
null
null
null
PM-2 PM-6
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
D1.R.St.B.1 D1.TC.Cu.B.1
null
null
314.4(a) 314.4(a)(1) 314.4(a)(2) 314.4(a)(3)
164.308(a)(2)
5.S.B 10.S.A
5.M.B 8.M.A
5.M.B 8.M.A 10.M.A
1.5 PM-2 PM-29
null
null
8-101 8-311
null
null
null
17 CFR 229.106(B)(1)(i) 17 CFR 229.106(B)(1)(ii) 17 CFR 229.106(B)(1)(iii) 17 CFR 229.106(B)(2) 17 CFR 229.106(C)(1) 17 CFR 229.106(C)(2) 17 CFR 229.106(C)(1)(i) 17 CFR 229.106(C)(1)(ii) 17 CFR 229.106(C)(1)(iii) FORM 8-K ITEM 1.05(a)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
17.03(2)(a)
null
500.04
Sec 4(2)(b)(ii)(A)(1)
null
38-99-20(C)(1)
null
Sec 9
PM-2 PM-6
null
null
Sec 11.175(d)
null
§ 2447(b)(1)
3.3.1(11) 3.3.1(12) 3.7.5(91)
Art 5.2 Art 5.2(a) Art 5.2(b) Art 5.2(c) Art 5.2(d) Art 5.2(e) Art 5.2(f) Art 5.2(g) Art 5.2(h) Art 5.2(i)(i) Art 5.2(i)(ii) Art 5.2(i)(iii) Art 5.3
null
null
null
null
null
Sec 14 Sec 15
Art 16
null
null
null
null
null
4.4 4.5 4.6
OIS-03
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
3.1.4
1-2-2 1-4-1 1-4-2 1-5-2
1-2 1-2-1-2
null
null
null
null
null
null
null
null
null
A1.b A1.c
null
null
null
null
null
null
null
null
null
0714 0717 0718 0735
null
21 24
14 19
null
null
Article 52
null
null
null
null
4.3.1 4.3.1.1 4.4.1.2 6.1.1.13.PB 6.1.3.13.PB
null
1.8
3.1.8.C.01 3.1.8.C.02 3.1.8.C.03 3.1.9.C.01 3.2.8.C.01 3.2.8.C.02 3.2.8.C.03 3.2.8.C.04 3.2.8.C.05 3.2.9.C.01 3.2.10.C.01 3.2.10.C.02 3.2.10.C.03 3.2.10.C.04 3.2.11.C.01 3.2.11.C.02 3.2.11.C.03 3.2.12.C.01 3.2.12.C.02 3.2.12.C.03 3.2.13.C.01 3.2.13.C.02 3.2.14.C.01 3.2.15.C.01 3.2.16.C.01 3.2.17.C.01 3.2.18.C.01 3.2.19.C.01
null
null
null
null
3.1.7(a) 3.1.7(b) 3.1.7(c) 3.1.7(d) 3.1.7(e) 3.1.7(f) 3.1.7(g) 3.1.8(a) 3.1.8(b) 3.1.8(c) 3.1.8(d) 3.1.8(e)
null
null
null
null
null
5.2
null
1.1 1.2 6.2
1.1
null
null
null
null
null
null
null
null
null
null
x
MA 201 CMR 17 OR 6464A NAIC
null
x
R-AC-1 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-GV-8 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1 R-SA-2
R-AC-1
null
null
null
null
null
null
null
null
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
R-SA-2
NT-7 MT-1 MT-2 MT-3 MT-4 MT-5 MT-6 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Cybersecurity & Data Protection Governance
Stakeholder Accountability Structure
GOV-04.1
Mechanisms exist to enforce an accountability structure so that appropriate teams and individuals are empowered, responsible and trained for mapping, measuring and managing data and technology-related risks.
- Documented roles and responsibilities
E-HRS-15
Does the organization enforce an accountability structure so that appropriate teams and individuals are empowered, responsible and trained for mapping, measuring and managing data and technology-related risks?
8
Identify
X
X
X
There is no evidence of a capability to enforce an accountability structure so that appropriate teams and individuals are empowered, responsible and trained for mapping, measuring and managing data and technology-related risks.
SP-CMM1 is N/A, since a structured process is required to enforce an accountability structure so that appropriate teams and individuals are empowered, responsible and trained for mapping, measuring and managing data and technology-related risks.
SP-CMM2 is N/A, since a well-defined process is required to enforce an accountability structure so that appropriate teams and individuals are empowered, responsible and trained for mapping, measuring and managing data and technology-related risks.
Cybersecurity & Privacy Governance (GOV) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • A Governance, Risk & Compliance (GRC) function, or similar function, provides scoping guidance to determine control applicability. • Compliance requirements for cybersecurity & data privacy controls are identified, documented and tested for adherence to internal standards or regulatory requirements. • Procedures are established for sensitive/regulated obligations and standardized across the organization. • Controls are standardized across the organization to ensure uniformity and consistent execution. • Internal policies and standards address all statutory, regulatory and contractual obligations for cybersecurity & data privacy. • Defined roles & responsibilities require data/process owners to define, implement and maintain cybersecurity & data privacy controls for each system, application and/ or service of which they have accountability.
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to enforce an accountability structure so that appropriate teams and individuals are empowered, responsible and trained for mapping, measuring and managing data and technology-related risks.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to enforce an accountability structure so that appropriate teams and individuals are empowered, responsible and trained for mapping, measuring and managing data and technology-related risks.
null
CC1.2-POF1 CC1.3-POF1 CC1.3-POF2 CC1.3-POF3 CC1.3-POF4 CC1.3-POF5 CC1.5-POF1 CC5.3-POF2
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
GOVERN 2.0 MANAGE 2.4
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
GV.OC-02 GV.RM-05 GV.RR-02
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
17 CFR 229.106(C)(1) 17 CFR 229.106(C)(2) 17 CFR 229.106(C)(1)(i) 17 CFR 229.106(C)(1)(ii) 17 CFR 229.106(C)(1)(iii)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
3.3.1(11) 3.7.5(91)
null
null
null
null
null
null
null
null
null
null
null
null
null
4.5 4.6 4.10
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
A1.b A1.c B1.b
null
null
null
null
null
null
null
null
null
null
null
21
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-1 R-AM-2 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-GV-8 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1 R-SA-2
R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
null
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
R-SA-2
NT-1 NT-2 NT-3 NT-4 NT-5 NT-6 NT-7 NT-8 NT-9 NT-10 NT-11 NT-12 NT-13 NT-14 MT-1 MT-2 MT-3 MT-6 MT-9 MT-12 MT-13 MT-14 MT-15
NT-1
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
null
null
MT-6
null
null
MT-9
null
null
MT-12
MT-13
MT-14
MT-15
null
null
Cybersecurity & Data Protection Governance
Authoritative Chain of Command
GOV-04.2
Mechanisms exist to establish an authoritative chain of command with clear lines of communication to remove ambiguity from individuals and teams related to managing data and technology-related risks.
- Organization chart
E-HRS-15
Does the organization establish an authoritative chain of command with clear lines of communication to remove ambiguity from individuals and teams related to managing data and technology-related risks?
7
Identify
X
X
X
There is no evidence of a capability to establish an authoritative chain of command with clear lines of communication to remove ambiguity from individuals and teams related to managing data and technology-related risks.
SP-CMM1 is N/A, since a structured process is required to establish an authoritative chain of command with clear lines of communication to remove ambiguity from individuals and teams related to managing data and technology-related risks.
SP-CMM2 is N/A, since a well-defined process is required to establish an authoritative chain of command with clear lines of communication to remove ambiguity from individuals and teams related to managing data and technology-related risks.
Cybersecurity & Privacy Governance (GOV) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • A Governance, Risk & Compliance (GRC) function, or similar function, provides scoping guidance to determine control applicability. • Compliance requirements for cybersecurity & data privacy controls are identified, documented and tested for adherence to internal standards or regulatory requirements. • Procedures are established for sensitive/regulated obligations and standardized across the organization. • Controls are standardized across the organization to ensure uniformity and consistent execution. • Internal policies and standards address all statutory, regulatory and contractual obligations for cybersecurity & data privacy. • Defined roles & responsibilities require data/process owners to define, implement and maintain cybersecurity & data privacy controls for each system, application and/ or service of which they have accountability.
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to establish an authoritative chain of command with clear lines of communication to remove ambiguity from individuals and teams related to managing data and technology-related risks.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to establish an authoritative chain of command with clear lines of communication to remove ambiguity from individuals and teams related to managing data and technology-related risks.
null
CC1.2-POF1 CC1.3-POF1 CC1.3-POF2 CC1.3-POF3 CC1.3-POF4 CC1.3-POF5 CC1.5-POF1
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
GOVERN 2.1
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
GV.RM-05 GV.RR-02
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
17 CFR 229.106(C)(1) 17 CFR 229.106(C)(2) 17 CFR 229.106(C)(1)(i) 17 CFR 229.106(C)(1)(ii) 17 CFR 229.106(C)(1)(iii)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
3.7.5(91)
null
null
null
null
null
null
null
null
null
null
null
null
null
4.5 4.6 4.10
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
A1.b A1.c
null
null
null
null
null
null
null
null
null
null
null
21
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-1 R-AM-2 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-GV-8 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1 R-SA-2
R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
null
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
R-SA-2
NT-1 NT-2 NT-3 NT-4 NT-5 NT-6 NT-7 NT-8 NT-9 NT-10 NT-11 NT-12 NT-13 NT-14 MT-1 MT-2 MT-3 MT-6 MT-9 MT-12 MT-13 MT-14 MT-15
NT-1
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
null
null
MT-6
null
null
MT-9
null
null
MT-12
MT-13
MT-14
MT-15
null
null
Cybersecurity & Data Protection Governance
Measures of Performance
GOV-05
"Mechanisms exist to develop, report and monitor cybersecurity & data privacy program measures of pe(...TRUNCATED)
"- Metrics\n- Governance, Risk and Compliance Solution (GRC) tool (SCFConnect, SureCloud, Ostendio, (...TRUNCATED)
E-GOV-13
"Does the organization develop, report and monitor cybersecurity & data privacy program measures of (...TRUNCATED)
6
Protect
X
X
null
"There is no evidence of a capability to develop, report and monitor cybersecurity & data privacy pr(...TRUNCATED)
"Cybersecurity & Privacy Governance (GOV) efforts are ad hoc and inconsistent. CMM Level 1 control m(...TRUNCATED)
"Cybersecurity & Privacy Governance (GOV) efforts are requirements-driven and formally governed at a(...TRUNCATED)
"Cybersecurity & Privacy Governance (GOV) efforts are standardized across the organization and centr(...TRUNCATED)
"Cybersecurity & Privacy Governance (GOV) efforts are metrics driven and provide sufficient manageme(...TRUNCATED)
"Cybersecurity & Privacy Governance (GOV) efforts are “world-class” capabilities that leverage p(...TRUNCATED)
CC1.2 CC1.5 CC2.2 CC4.1
CC1.5-POF2
4.3 7.5 8.3 8.4
null
null
null
null
EDM01.03 EDM05.01 EDM05.03 APO02.02 MEA01.04
Principle 2 Principle 5 Principle 14 Principle 16 Principle 19 Principle 20
AIS-03 SEF-05 TVM-09 TVM-10
null
SO11 S12 S13 S14 S15
null
null
RQ-05-08
9.1
9.1
9.1 9.1(a) 9.1(b) 9.1(c) 9.1(d) 9.1(e) 9.1(f)
null
null
null
null
null
null
null
null
null
null
Sec 4(E)(1)
GOVERN 1.5 MAP 5.2 MEASURE 1.0 MEASURE 1.1 MEASURE 1.2 MEASURE 4.0 MEASURE 4.3
GV.MT-P4 PR.PO-P5 PR.PO-P6
null
M-5
null
PM-6
null
null
null
PM-6
null
null
null
null
PM-6
null
null
null
null
null
null
null
null
null
null
null
null
3.12.3
null
null
null
null
PR.IP-8
GV.RM-07 GV.OV-03
null
null
null
null
null
null
null
null
null
null
null
null
A.4.2
null
null
null
null
null
"ASSET-5.E.MIL3\nASSET-5.F.MIL3\nTHREAT-3.F.MIL3\nRISK-1.E.MIL2\nRISK-5.F.MIL3\nACCESS-4.F.MIL3\nSIT(...TRUNCATED)
"EF:SG4.SP2\nEF:SG4.SP3\nGG2.GP8\nGG3.GP2\nHRM:SG3.SP2\nMA:SG1.SP1\nMA:SG1.SP3\nMA:SG1.SP4\nMA:SG2.S(...TRUNCATED)
null
null
null
null
null
null
null
null
PM-6
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
D2.IS.Is.B.1 D2.IS.Is.E.2
null
null
null
null
10.S.A
null
10.M.A
null
null
null
8-311
null
null
null
null
null
5.7
null
null
null
null
null
null
"7102(a)(1)(A)\n7102(a)(1)(B)\n7102(a)(1)(C)\n7102(a)(1)(D)\n7102(a)(1)(E)\n7102(a)(1)(F)\n7102(a)(2(...TRUNCATED)
null
null
null
null
null
17.03(2)(j)
null
null
null
null
38-99-20(E)(1)
null
Sec 10 Sec 11
PM-6
null
null
null
null
null
null
Art 13.4
null
null
Article 21.2(f)
Art 3
null
null
null
null
null
null
null
null
null
COM-04
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
7.6.2 [OP.MON.2]
null
null
null
null
null
null
null
null
null
null
null
null
null
null
0724
null
null
null
null
null
null
null
null
null
null
4.6 4.6.1 4.6.2.1
null
null
null
null
null
null
null
4.5.3 7.8.3
null
null
null
null
null
5.7
null
6.9
2.8 2.8.1 2.8.2
null
null
null
null
null
null
null
null
null
null
x
MA 201 CMR 17 OR 6464A NAIC
null
null
R-AC-1 R-GV-1 R-GV-2 R-GV-6 R-GV-7 R-SA-1 R-SA-2
R-AC-1
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
R-GV-1
R-GV-2
null
null
null
R-GV-6
R-GV-7
null
null
null
null
null
R-SA-1
R-SA-2
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-10 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
null
null

Dataset Card for Dataset Name

This dataset card aims to be a base template for new datasets. It has been generated using this raw template.

Dataset Details

Dataset Description

  • Curated by: Black Aether
  • Funded by [optional]: The gracious and charitable Jefe
  • Shared by [optional]: The Aether we call "Internet"
  • Language(s) (NLP): [More Information Needed]
  • License: [More Information Needed]

Dataset Sources [optional]

  • Repository: [More Information Needed]
  • Paper [optional]: [More Information Needed]
  • Demo [optional]: [More Information Needed]

Uses

  • Usage: CSF-based Risk & Compliance Assessments, Risk Register, Findings & Issues Management, Risk & Recommendation Generation, Plan & Task Creation

Direct Use

[More Information Needed]

Out-of-Scope Use

[More Information Needed]

Dataset Structure

[More Information Needed]

Dataset Creation

Curation Rationale

[More Information Needed]

Source Data

Data Collection and Processing

[More Information Needed]

Who are the source data producers?

[More Information Needed]

Annotations [optional]

Annotation process

[More Information Needed]

Who are the annotators?

[More Information Needed]

Personal and Sensitive Information

[More Information Needed]

Bias, Risks, and Limitations

[More Information Needed]

Recommendations

Users should be made aware of the risks, biases and limitations of the dataset. More information needed for further recommendations.

Citation [optional]

BibTeX:

[More Information Needed]

APA:

[More Information Needed]

Glossary [optional]

[More Information Needed]

More Information [optional]

[More Information Needed]

Dataset Card Authors [optional]

[More Information Needed]

Dataset Card Contact

[More Information Needed]

Downloads last month
0
Edit dataset card