SCF Domain
stringclasses 34
values | SCF Control
stringlengths 7
85
| SCF #
stringlengths 6
9
| Secure Controls Framework (SCF)
Control Description
stringlengths 49
657
| Methods To Comply With SCF Controls
stringlengths 6
863
⌀ | Evidence Request List (ERL) #
stringclasses 181
values | SCF Control Question
stringlengths 51
659
| Relative Control Weighting
int64 1
10
| Function Grouping
stringclasses 5
values | SCRM
Tier 1
Strategic
stringclasses 2
values | SCRM
Tier 2
Operational
stringclasses 2
values | SCRM
Tier 3
Tactical
stringclasses 2
values | SP-CMM 0
Not Performed
stringlengths 69
677
⌀ | SP-CMM 1
Performed Informally
stringlengths 43
2.02k
⌀ | SP-CMM 2
Planned & Tracked
stringlengths 43
3.33k
⌀ | SP-CMM 3
Well Defined
stringlengths 43
5.16k
⌀ | SP-CMM 4
Quantitatively Controlled
stringlengths 43
1.35k
⌀ | SP-CMM 5
Continuously Improving
stringlengths 43
725
⌀ | AICPA
TSC 2017
(Controls)
stringclasses 116
values | AICPA
TSC 2017
(Points of Focus)
stringclasses 171
values | BSI
Standard 200-1
stringclasses 18
values | CIS
CSC
v8.0
stringclasses 158
values | CIS
CSC v8.0
IG1
stringclasses 57
values | CIS
CSC v8.0
IG2
stringclasses 136
values | CIS
CSC v8.0
IG3
stringclasses 154
values | COBIT
2019
stringclasses 101
values | COSO
v2017
stringclasses 45
values | CSA
CCM
v4
stringclasses 229
values | CSA
IoT SCF
v2
stringclasses 168
values | ENISA
v2.0
stringclasses 33
values | GAPP
stringclasses 36
values | IEC 62443-4-2
stringclasses 104
values | ISO/SAE
21434
v2021
stringclasses 69
values | ISO
22301
v2019
stringclasses 25
values | ISO
27001
v2013
stringclasses 30
values | ISO
27001
v2022
stringclasses 35
values | ISO
27002
v2013
stringclasses 142
values | ISO
27002
v2022
stringclasses 166
values | ISO
27017
v2015
stringclasses 158
values | ISO
27018
v2014
stringclasses 16
values | ISO
27701
v2019
stringclasses 161
values | ISO
29100
v2011
stringclasses 15
values | ISO
31000
v2009
stringclasses 7
values | ISO
31010
v2009
stringclasses 16
values | MITRE
ATT&CK
10
stringclasses 100
values | MPA
Content Security Program
v5.1
stringclasses 98
values | NIAC
Insurance Data Security Model Law (MDL-668)
stringclasses 41
values | NIST
AI RMF
AI 100-1
v1.0
stringclasses 114
values | NIST Privacy Framework
v1.0
stringclasses 114
values | NIST
SSDF
stringclasses 29
values | NIST
800-37
rev 2
stringclasses 32
values | NIST
800-39
stringclasses 9
values | NIST
800-53
rev4
stringlengths 4
47
⌀ | NIST
800-53 rev4
(low)
stringclasses 121
values | NIST
800-53 rev4
(moderate)
stringlengths 4
22
⌀ | NIST
800-53 rev4
(high)
stringlengths 4
23
⌀ | NIST
800-53
rev5
stringlengths 4
99
⌀ | NIST
800-53B
rev5
(privacy)
stringclasses 85
values | NIST
800-53B
rev5
(low)
stringclasses 151
values | NIST
800-53B
rev5
(moderate)
stringlengths 4
40
⌀ | NIST
800-53B
rev5
(high)
stringlengths 4
40
⌀ | NIST
800-53
rev5
(NOC)
stringlengths 4
41
⌀ | NIST
800-63B
(partial mapping)
stringclasses 5
values | NIST
800-82 rev3
LOW
OT Overlay
stringclasses 162
values | NIST
800-82 rev3
MODERATE
OT Overlay
stringlengths 4
40
⌀ | NIST
800-82 rev3
HIGH
OT Overlay
stringlengths 4
40
⌀ | NIST
800-160
stringclasses 23
values | NIST
800-161
rev 1
stringlengths 4
34
⌀ | NIST
800-161
rev 1
C-SCRM Baseline
stringclasses 95
values | NIST
800-161
rev 1
Flow Down
stringclasses 71
values | NIST
800-161
rev 1
Level 1
stringclasses 69
values | NIST
800-161
rev 1
Level 2
stringclasses 218
values | NIST
800-161
rev 1
Level 3
stringclasses 234
values | NIST
800-171
rev 2
stringclasses 172
values | NIST
800-171
rev 3 FPD
stringlengths 5
141
⌀ | NIST
800-171A
stringclasses 114
values | NIST
800-171A
rev 3 IPD
stringclasses 167
values | NIST
800-172
stringclasses 46
values | NIST
800-218
v1.1
stringclasses 29
values | NIST
CSF
v1.1
stringclasses 97
values | NIST
CSF
v2.0 IPD
stringclasses 127
values | OWASP
Top 10
v2021
stringclasses 20
values | PCIDSS
v3.2
stringclasses 135
values | PCIDSS
v4.0
stringlengths 3
156
⌀ | PCIDSS
v4.0
SAQ A
stringclasses 30
values | PCIDSS
v4.0
SAQ A-EP
stringclasses 141
values | PCIDSS
v4.0
SAQ B
stringclasses 26
values | PCIDSS
v4.0
SAQ B-IP
stringclasses 55
values | PCIDSS
v4.0
SAQ C
stringclasses 132
values | PCIDSS
v4.0
SAQ C-VT
stringclasses 53
values | PCIDSS
v4.0
SAQ D Merchant
stringclasses 213
values | PCIDSS
v4.0
SAQ D Service Provider
stringclasses 231
values | PCIDSS
v4.0
SAQ P2PE
stringclasses 24
values | Shared Assessments SIG 2023
stringlengths 3
43
⌀ | SWIFT
CSF
v2023
stringclasses 55
values | TISAX
ISA v5.1.0
stringclasses 88
values | UL
2900-1
stringclasses 36
values | UN
R155
stringclasses 19
values | UN
ECE WP.29
stringclasses 19
values | US
C2M2
v2.1
stringclasses 152
values | US
CERT RMM
v1.2
stringclasses 212
values | US
CISA
CPG
v2022
stringclasses 44
values | US
CJIS Security Policy 5.9
stringclasses 99
values | US
CMMC 2.0
Level 1
stringclasses 17
values | US
CMMC 2.0
Level 2
stringclasses 110
values | US
CMMC 2.0
Level 3
stringclasses 139
values | US
CMMC 2.1 (draft)
Level 1
stringclasses 18
values | US
CMMC 2.1 (draft)
Level 2
stringclasses 110
values | US
CMMC 2.1 (draft)
Level 3
stringclasses 141
values | US
CMS
MARS-E v2.0
stringlengths 4
28
⌀ | US
COPPA
float64 6.5k
6.5k
⌀ | US
DFARS
Cybersecurity
252.204-70xx
stringclasses 19
values | US
FACTA
stringclasses 2
values | US
FAR
52.204-21
stringclasses 22
values | US
FAR
52.204-27
stringclasses 2
values | US
FAR
Section 889
stringclasses 1
value | US
FDA
21 CFR Part 11
stringclasses 27
values | US
FedRAMP
R4
stringlengths 4
24
⌀ | US
FedRAMP
R4 (low)
stringclasses 130
values | US
FedRAMP
R4 (moderate)
stringlengths 4
23
⌀ | US
FedRAMP
R4 (high)
stringlengths 4
24
⌀ | US
FedRAMP
R4 (LI-SaaS)
stringclasses 131
values | US
FedRAMP
R5
stringlengths 4
24
⌀ | US
FedRAMP
R5
(low)
stringclasses 151
values | US
FedRAMP
R5
(moderate)
stringlengths 4
23
⌀ | US
FedRAMP
R5
(high)
stringlengths 4
24
⌀ | US
FedRAMP
R5
(LI-SaaS)
stringclasses 151
values | US
FERPA
stringclasses 3
values | US
FFIEC
stringclasses 68
values | US
FINRA
stringclasses 3
values | US
FTC Act
stringclasses 1
value | US
GLBA
CFR 314
stringclasses 41
values | US
HIPAA
stringclasses 54
values | HIPAA - HICP
Small Practice
stringclasses 31
values | HIPAA - HICP
Medium Practice
stringclasses 59
values | HIPAA - HICP
Large Practice
stringclasses 112
values | US
IRS 1075
stringlengths 3
165
⌀ | US
ITAR Part 120
(limited)
stringclasses 9
values | US
NERC
CIP
stringclasses 35
values | US
NISPOM
stringclasses 72
values | US
NNPI
(unclass)
stringclasses 61
values | US
NSTC
NSPM-33
stringclasses 15
values | US
Privacy Shield
stringclasses 7
values | US
SEC
Cybersecurity Rule
stringclasses 12
values | US
SOX
stringclasses 1
value | US
SSA
EIESR
v8.0
stringclasses 22
values | US
StateRAMP
Low
Category 1
stringclasses 107
values | US
StateRAMP
Low+
Category 2
stringclasses 167
values | US
StateRAMP
Moderate
Category 3
stringlengths 4
24
⌀ | US
TSA / DHS
1580/82-2022-01
stringclasses 43
values | US - AK
PIPA
stringclasses 8
values | US - CA
SB327
stringclasses 4
values | US-CA
CPRA
(Nov 2022)
stringclasses 36
values | US - CA
SB1386
stringclasses 1
value | US - CO
Colorado Privacy Act
stringclasses 36
values | US - IL
BIPA
stringclasses 9
values | US - IL
IPA
stringclasses 4
values | US - IL
PIPA
stringclasses 6
values | US-MA
201 CMR 17.00
stringclasses 27
values | US - NV
SB220
stringclasses 3
values | US - NY
DFS
23 NYCRR500
float64 500
500
⌀ | US - NY
SHIELD Act
S5575B
stringclasses 15
values | US - OR
646A
stringclasses 21
values | US - SC
Insurance Data Security Act
stringclasses 41
values | US - TX
BC521
stringclasses 3
values | US-TX
Cybersecurity Act
stringclasses 13
values | US-TX DIR Control Standards 2.0
stringclasses 155
values | US-TX
TX-RAMP
Level 1
stringclasses 120
values | US-TX
TX-RAMP
Level 2
stringlengths 4
23
⌀ | US-TX
SB820
stringclasses 5
values | US-VA
CDPA
2023
stringclasses 24
values | US-VT
Act 171 of 2018
stringclasses 32
values | EMEA
EU
EBA
GL/2019/04
stringclasses 93
values | EMEA
EU
DORA
stringclasses 60
values | EMEA
EU ePrivacy
(draft)
stringclasses 15
values | EMEA
EU
GDPR
stringclasses 57
values | EMEA
EU
NIS2
stringclasses 21
values | EMEA
EU
PSD2
stringclasses 10
values | EMEA
EU
EU-US Data Privacy Framework
stringclasses 23
values | EMEA
Austria
stringclasses 10
values | EMEA
Belgium
stringclasses 9
values | EMEA
Czech Republic
stringclasses 14
values | EMEA
Denmark
stringclasses 11
values | EMEA
Finland
stringclasses 7
values | EMEA
France
stringclasses 9
values | EMEA
Germany
stringclasses 11
values | EMEA
Germany
Banking Supervisory Requirements for IT (BAIT)
stringclasses 57
values | EMEA
Germany
C5-2020
stringclasses 152
values | EMEA
Greece
stringclasses 9
values | EMEA
Hungary
stringclasses 12
values | EMEA
Ireland
stringclasses 3
values | EMEA
Israel
CDMO
v1.0
stringlengths 3
89
⌀ | EMEA
Israel
stringclasses 6
values | EMEA
Italy
stringclasses 15
values | EMEA
Kenya
DPA 2019
stringclasses 38
values | EMEA
Luxembourg
stringclasses 4
values | EMEA
Netherlands
stringclasses 12
values | EMEA
Nigeria
DPR 2019
stringclasses 24
values | EMEA
Norway
stringclasses 12
values | EMEA
Poland
stringclasses 11
values | EMEA
Portugal
stringclasses 11
values | EMEA
Qatar
PDPPL
stringclasses 37
values | EMEA
Russia
stringclasses 13
values | EMEA
Saudi Arabia
Critical Security Controls
stringclasses 105
values | EMEA
Saudi Arabia
SACS-002
stringclasses 96
values | EMEA
Saudi Arabia
SAMA CSFv1.0
stringclasses 36
values | EMEA
Saudi Arabia
ECC-12018
stringclasses 148
values | EMEA
Saudi Arabia
OTCC-1 2022
stringclasses 133
values | EMEA
Serbia
87/2018
stringclasses 46
values | EMEA
Slovak Republic
stringclasses 2
values | EMEA
South Africa
stringclasses 45
values | EMEA
Spain
stringclasses 10
values | EMEA
Spain
CCN-STIC 825
stringclasses 71
values | EMEA
Sweden
stringclasses 11
values | EMEA
Switzerland
stringclasses 8
values | EMEA
Turkey
stringclasses 8
values | EMEA
UAE
stringclasses 9
values | EMEA
UK
CAF v3.1
stringclasses 75
values | EMEA
UK
CAP 1850
stringclasses 16
values | EMEA
UK
Cyber Essentials
float64 1
5
⌀ | EMEA
UK
DPA
stringclasses 7
values | EMEA
UK
GDPR
stringclasses 38
values | APAC
Australia
Essential 8
ML 1
stringclasses 21
values | APAC
Australia
Essential 8
ML 2
stringclasses 30
values | APAC
Australia
Essential 8
ML 3
stringclasses 40
values | APAC
Australia
Privacy Act
stringclasses 11
values | APAC
Australian Privacy Principles
stringclasses 18
values | APAC
Australia
ISM 2022
stringlengths 4
214
⌀ | APAC
Australia
IoT Code of Practice
stringclasses 11
values | APAC
Australia
Prudential Standard CPS230
stringclasses 32
values | APAC
Australia
Prudential Standard CPS234
stringclasses 34
values | APAC
China
Data Security Law (DSL)
stringclasses 6
values | APAC
China
DNSIP
stringclasses 3
values | APAC
China
Privacy Law
stringclasses 57
values | APAC
Hong Kong
stringclasses 8
values | APAC
India
ITR
stringclasses 4
values | APAC
Indonesia
stringclasses 7
values | APAC
Japan
APPI
stringclasses 31
values | APAC
Japan
ISMAP
stringclasses 188
values | APAC
Malaysia
stringclasses 8
values | APAC
New Zealand Health ISF
stringclasses 22
values | APAC
New Zealand
NZISM 3.6
stringlengths 10
1.15k
⌀ | APAC
New Zealand Privacy Act of 2020
stringclasses 12
values | APAC
Philippines
stringclasses 12
values | APAC
Singapore
stringclasses 15
values | APAC
Singapore
Cyber Hygiene Practice
stringclasses 12
values | APAC
Singapore MAS
TRM 2021
stringclasses 166
values | APAC
South Korea
stringclasses 22
values | APAC
Taiwan
stringclasses 7
values | Americas
Argentina
stringclasses 14
values | Americas
Argentina
Reg 132-2018
stringclasses 24
values | Americas
Bahamas
stringclasses 6
values | Americas
Bermuda
BMACCC
stringclasses 36
values | Americas
Brazil
LGPD
stringclasses 27
values | Americas
Canada
CSAG
stringclasses 75
values | Americas
Canada
OSFI B-13
stringclasses 60
values | Americas
Canada
PIPEDA
stringclasses 14
values | Americas
Chile
stringclasses 9
values | Americas
Colombia
stringclasses 10
values | Americas
Costa Rica
stringclasses 8
values | Americas
Mexico
stringclasses 14
values | Americas
Peru
stringclasses 14
values | Americas
Uruguay
stringclasses 17
values | Minimum Security Requirements
MCR + DSR
float64 | Identify
Minimum Compliance Requirements (MCR)
float64 | Identify
Discretionary Security Requirements (DSR)
float64 | SCF-B
Business Mergers & Acquisitions
stringclasses 1
value | SCF-I
Cyber Insurance Duty of Care
stringclasses 23
values | SCF-E
Embedded
Technology
stringclasses 1
value | SCF-R
Ransomware Protection
stringclasses 1
value | Risk Threat Summary
stringlengths 13
230
⌀ | Risk
R-AC-1
stringclasses 1
value | Risk
R-AC-2
stringclasses 1
value | Risk
R-AC-3
stringclasses 1
value | Risk
R-AC-4
stringclasses 1
value | Risk
R-AM-1
stringclasses 1
value | Risk
R-AM-2
stringclasses 2
values | Risk
R-AM-3
stringclasses 1
value | Risk
R-BC-1
stringclasses 2
values | Risk
R-BC-2
stringclasses 2
values | Risk
R-BC-3
stringclasses 2
values | Risk
R-BC-4
stringclasses 2
values | Risk
R-BC-5
stringclasses 2
values | Risk
R-EX-1
stringclasses 2
values | Risk
R-EX-2
stringclasses 2
values | Risk
R-EX-3
stringclasses 2
values | Risk
R-EX-4
stringclasses 2
values | Risk
R-EX-5
stringclasses 2
values | Risk
R-EX-6
stringclasses 2
values | Risk
R-EX-7
stringclasses 2
values | Risk
R-GV-1
stringclasses 2
values | Risk
R-GV-2
stringclasses 2
values | Risk
R-GV-3
stringclasses 2
values | Risk
R-GV-4
stringclasses 2
values | Risk
R-GV-5
stringclasses 2
values | Risk
R-GV-6
stringclasses 2
values | Risk
R-GV-7
stringclasses 2
values | Risk
R-GV-8
stringclasses 2
values | Risk
R-IR-1
stringclasses 2
values | Risk
R-IR-2
stringclasses 2
values | Risk
R-IR-3
stringclasses 2
values | Risk
R-IR-4
stringclasses 1
value | Risk
R-SA-1
stringclasses 2
values | Risk
R-SA-2
stringclasses 2
values | Control Threat Summary
stringclasses 69
values | Threat
NT-1
stringclasses 1
value | Threat
NT-2
stringclasses 1
value | Threat
NT-3
stringclasses 1
value | Threat
NT-4
stringclasses 1
value | Threat
NT-5
stringclasses 1
value | Threat
NT-6
stringclasses 1
value | Threat
NT-7
stringclasses 1
value | Threat
NT-8
stringclasses 1
value | Threat
NT-9
stringclasses 1
value | Threat
NT-10
stringclasses 1
value | Threat
NT-11
stringclasses 1
value | Threat
NT-12
stringclasses 1
value | Threat
NT-13
stringclasses 1
value | Threat
NT-14
stringclasses 1
value | Threat
MT-1
stringclasses 1
value | Threat
MT-2
stringclasses 1
value | Threat
MT-3
stringclasses 1
value | Threat
MT-4
stringclasses 1
value | Threat
MT-5
stringclasses 1
value | Threat
MT-6
stringclasses 1
value | Threat
MT-7
stringclasses 1
value | Threat
MT-8
stringclasses 1
value | Threat
MT-9
stringclasses 1
value | Threat
MT-10
stringclasses 1
value | Threat
MT-11
stringclasses 1
value | Threat
MT-12
stringclasses 1
value | Threat
MT-13
stringclasses 1
value | Threat
MT-14
stringclasses 1
value | Threat
MT-15
stringclasses 1
value | Threat
MT-16
stringclasses 1
value | Errata
2023.4
stringclasses 30
values |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Asset Management | Approved Baseline Deviations | AST-02.4 | Mechanisms exist to document and govern instances of approved deviations from established baseline configurations. | - CimTrak Integrity Suite (https://www.cimcor.com/cimtrak/)
- NNT Change Tracker (https://www.newnettechnologies.com)
- Tripwire Enterprise (https://www.tripwire.com/products/tripwire-enterprise/)
- SCCM
- Puppet (https://puppet.com/)
- Chef (https://www.chef.io/) (https://www.chef.io/)
- Microsoft SCCM | E-RSK-03
E-TDA-14 | Does the organization document and govern instances of approved deviations from established baseline configurations? | 8 | Identify | null | null | X | There is no evidence of a capability to document and govern instances of approved deviations from established baseline configurations. | Asset Management (AST) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Asset management is informally assigned as an additional duty to existing IT/cybersecurity personnel.
• Asset inventories are performed in an ad hoc manner.
• Software licensing is tracked as part of IT asset inventories.
• Data process owners maintain limited network diagrams to document the flow of sensitive/regulated data that is specific to their initiative.
• IT personnel work with data/process owners to help ensure secure practices are implemented throughout the System Development Lifecycle (SDLC) for all high-value projects.
• System configurations loosely conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides)
• Deviations from approved baseline configurations are handled on a case-by-case basis by IT/cybersecurity personnel. Acceptance of any deviations from baselines must be informed by performance of a risk assessment. | Asset Management (AST) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Asset management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for asset management.
• Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• Asset management is formally assigned as an additional duty to existing IT/cybersecurity personnel.
• Technology assets are categorized according to data classification and business criticality.
• Inventories cover technology assets in scope for statutory, regulatory and/ or contractual compliance, which includes both physical and virtual assets.
• Software licensing is tracked as part of IT asset inventories.
• Users are educated on their responsibilities to protect technology assets assigned to them or under their supervision.
• IT/cybersecurity personnel maintain network diagrams to document the flow of sensitive/regulated data across the network.
• Documented procedures exist for requesting a deviation from approved deviations.
• Any deviations from approved baseline configurations must be formally reviewed, approved and documented (both approved and unapproved) in a repository by cybersecurity personnel.
• Deviations from approved software deployments are reviewed, approved and documented on a case-by-case basis by IT/cybersecurity personnel. | Asset Management (AST) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• An IT Asset Management (ITAM) function, or similar function, governs asset management to help ensure compliance with requirements for asset management.
• An ITAM function, or similar function, maintains an inventory of IT assets, covering both physical and virtual assets, as well as centrally managed asset ownership assignments.
• Technology assets and data are categorized according to data classification and business criticality criteria.
• A Cybersecurity Supply Chain Risk Management (C-SCRM) function oversees supply chain risks including the removal and prevention of certain technology services and/ or equipment designated as supply chain threats by a statutory or regulatory body.
• Data/process owners document where sensitive/regulated data is stored, transmitted and processed, generating Data Flow Diagrams (DFDs) and network diagrams to document the flow of data.
• Formalized steps and requirements for requesting a deviation to a standard are published.
• The request for a deviation from approved baseline configurations is centrally managed and tracked by ITAM who routes the request to cybersecurity personnel for assessment.
• Deviations to baseline configurations are required to have a risk assessment performed and the appropriate business stakeholder accept any risk(s) associated with the deviation. | Asset Management (AST) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement.
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to document and govern instances of approved deviations from established baseline configurations. | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | CM-8(6) | null | null | null | CM-8(6) | null | null | null | null | CM-8(6) | null | null | null | null | null | CM-8(6) | null | null | null | null | CM-8(6) | null | 3.4.2.b | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | C.1.6 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | SP-03 | null | null | null | 6.8 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | null | null | x | R-AM-3
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1 | null | null | null | null | null | null | R-AM-3 | null | null | null | null | null | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | R-EX-6 | null | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | null | R-IR-1 | R-IR-2 | R-IR-3 | R-IR-4 | R-SA-1 | null | NT-7
MT-1
MT-2
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | null | null | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Asset Management | Network Access Control (NAC) | AST-02.5 | Automated mechanisms exist to employ Network Access Control (NAC), or a similar technology, which is capable of detecting unauthorized devices and disable network access to those unauthorized devices. | - Cisco NAC
- Aruba Networks
- Juniper NAC
- Packet Fence
- Symantec NAC
- Sophos NAC
- Bradford Networks NAC Director
- Cisco ISE
- ForeScout | null | Does the organization use automated mechanisms to employ Network Access Control (NAC), or a similar technology, which is capable of detecting unauthorized devices and disable network access to those unauthorized devices? | 4 | Protect | null | X | X | There is no evidence of a capability to employ Network Access Control (NAC), or a similar technology, which is capable of detecting unauthorized devices and disable network access to those unauthorized devices. | SP-CMM1 is N/A, since a structured process is required to employ Network Access Control (NAC), or a similar technology, which is capable of detecting unauthorized devices and disable network access to those unauthorized devices. | SP-CMM2 is N/A, since a well-defined process is required to employ Network Access Control (NAC), or a similar technology, which is capable of detecting unauthorized devices and disable network access to those unauthorized devices. | Asset Management (AST) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• An IT Asset Management (ITAM) function, or similar function, governs asset management to help ensure compliance with requirements for asset management.
• An ITAM function, or similar function, maintains an inventory of IT assets, covering both physical and virtual assets, as well as centrally managed asset ownership assignments.
• Technology assets and data are categorized according to data classification and business criticality criteria.
• A Cybersecurity Supply Chain Risk Management (C-SCRM) function oversees supply chain risks including the removal and prevention of certain technology services and/ or equipment designated as supply chain threats by a statutory or regulatory body.
• Data/process owners document where sensitive/regulated data is stored, transmitted and processed, generating Data Flow Diagrams (DFDs) and network diagrams to document the flow of data.
• Network Access Control (NAC) technologies are deployed on network segments and/ or endpoint devices to prevent unauthorized network communications, as well as personal and third-party devices from connecting to internal networks.
• NAC is also configured to alert cybersecurity personnel for possible incidents (e.g., NAC logs are directed to a SIEM). | Asset Management (AST) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement.
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to employ Network Access Control (NAC), or a similar technology, which is capable of detecting unauthorized devices and disable network access to those unauthorized devices. | null | null | null | 13.9 | null | null | 13.9 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | IA-3(4) | null | null | null | IA-3(4)
SC-7(19) | null | null | null | null | null | null | null | null | null | null | SC-7(19) | null | null | null | null | SC-7(19) | null | null | null | null | 3.5.3e | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | N.2.4 | null | null | null | null | null | null | null | null | null | null | null | TBD - 3.5.3e | null | null | IA.L3-3.5.3e | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 5.L.B
6.L.E | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 23.6 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | B2.b | null | null | null | null | null | null | null | null | null | 0520
1182 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 11.2.4 | null | null | null | null | null | null | null | 4.21
4.24 | null | null | null | null | null | null | null | null | null | null | null | x | null | null | x | R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1 | R-AC-1 | R-AC-2 | R-AC-3 | R-AC-4 | R-AM-1 | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | R-BC-3 | null | null | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | R-EX-6 | null | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | null | R-IR-1 | R-IR-2 | R-IR-3 | R-IR-4 | R-SA-1 | null | NT-7
MT-1
MT-2
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | null | null | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | null | null | - wordsmithed control |
Asset Management | Dynamic Host Configuration Protocol (DHCP) Server Logging | AST-02.6 | Mechanisms exist to enable Dynamic Host Configuration Protocol (DHCP) server logging to improve asset inventories and assist in detecting unknown systems. | - Splunk
- Manual Process
- Build Automation Tools
- NNT Log Tracker (https://www.newnettechnologies.com/event-log-management.html)
- Chef (https://www.chef.io/) (https://www.chef.io/)
- Puppet (https://puppet.com/)
- Tripwire Enterprise (https://www.tripwire.com/products/tripwire-enterprise/) | E-MON-04 | Does the organization enable Dynamic Host Configuration Protocol (DHCP) server logging to improve asset inventories and assist in detecting unknown systems? | 3 | Identify | null | null | X | There is no evidence of a capability to enable Dynamic Host Configuration Protocol (DHCP) server logging to improve asset inventories and assist in detecting unknown systems. | SP-CMM1 is N/A, since a structured process is required to enable Dynamic Host Configuration Protocol (DHCP) server logging to improve asset inventories and assist in detecting unknown systems. | Asset Management (AST) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Asset management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for asset management.
• Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• Asset management is formally assigned as an additional duty to existing IT/cybersecurity personnel.
• Technology assets are categorized according to data classification and business criticality.
• Inventories cover technology assets in scope for statutory, regulatory and/ or contractual compliance, which includes both physical and virtual assets.
• Software licensing is tracked as part of IT asset inventories.
• Users are educated on their responsibilities to protect technology assets assigned to them or under their supervision.
• IT/cybersecurity personnel maintain network diagrams to document the flow of sensitive/regulated data across the network.
• DHCP logs are forwarded to a centralized log collect or (e.g., syslog server or log aggregator).
• Dynamic Host Configuration Protocol (DHCP) logging is enabled on all DHCP servers. | Asset Management (AST) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• An IT Asset Management (ITAM) function, or similar function, governs asset management to help ensure compliance with requirements for asset management.
• An ITAM function, or similar function, maintains an inventory of IT assets, covering both physical and virtual assets, as well as centrally managed asset ownership assignments.
• Technology assets and data are categorized according to data classification and business criticality criteria.
• A Cybersecurity Supply Chain Risk Management (C-SCRM) function oversees supply chain risks including the removal and prevention of certain technology services and/ or equipment designated as supply chain threats by a statutory or regulatory body.
• Data/process owners document where sensitive/regulated data is stored, transmitted and processed, generating Data Flow Diagrams (DFDs) and network diagrams to document the flow of data.
• DHCP logs are forwarded to a Security Incident Event Manager (SIEM).
• Dynamic Host Configuration Protocol (DHCP) logging is enabled on all DHCP servers. | See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to enable Dynamic Host Configuration Protocol (DHCP) server logging to improve asset inventories and assist in detecting unknown systems. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to enable Dynamic Host Configuration Protocol (DHCP) server logging to improve asset inventories and assist in detecting unknown systems. | null | null | null | 1.4
1.5 | null | 1.4 | 1.4
1.5 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | D.1.1.12 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Principle 2.1
Principle 6.1 | Principle 2.1
Principle 6.1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | null | null | null | R-AC-4
R-AM-1
R-AM-3
R-BC-1
R-BC-2
R-EX-1
R-EX-2
R-EX-5
R-EX-6
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
R-SA-2 | null | null | null | R-AC-4 | R-AM-1 | null | R-AM-3 | R-BC-1 | R-BC-2 | null | null | null | R-EX-1 | R-EX-2 | null | null | R-EX-5 | R-EX-6 | null | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | null | R-IR-1 | R-IR-2 | R-IR-3 | R-IR-4 | R-SA-1 | R-SA-2 | NT-7
MT-1
MT-2
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | null | null | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Asset Management | Software Licensing Restrictions | AST-02.7 | Mechanisms exist to protect Intellectual Property (IP) rights with software licensing restrictions.
| - Manual Process
- Tripwire Enterprise (https://www.tripwire.com/products/tripwire-enterprise/) | null | Does the organization protect Intellectual Property (IP) rights with software licensing restrictions?
| 8 | Identify | null | null | X | There is no evidence of a capability to protect Intellectual Property (IP) rights with software licensing restrictions.
| Asset Management (AST) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Asset management is informally assigned as an additional duty to existing IT/cybersecurity personnel.
• Asset inventories are performed in an ad hoc manner.
• Software licensing is tracked as part of IT asset inventories.
• Data process owners maintain limited network diagrams to document the flow of sensitive/regulated data that is specific to their initiative.
• IT personnel work with data/process owners to help ensure secure practices are implemented throughout the System Development Lifecycle (SDLC) for all high-value projects. | Asset Management (AST) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Asset management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for asset management.
• Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• Asset management is formally assigned as an additional duty to existing IT/cybersecurity personnel.
• Technology assets are categorized according to data classification and business criticality.
• Inventories cover technology assets in scope for statutory, regulatory and/ or contractual compliance, which includes both physical and virtual assets.
• Software licensing is tracked as part of IT asset inventories.
• Users are educated on their responsibilities to protect technology assets assigned to them or under their supervision.
• IT/cybersecurity personnel maintain network diagrams to document the flow of sensitive/regulated data across the network.
• Organizational policies and standards cover software licensing restrictions for users, as part of acceptable and unacceptable behaviors. | Asset Management (AST) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• An IT Asset Management (ITAM) function, or similar function, governs asset management to help ensure compliance with requirements for asset management.
• An ITAM function, or similar function, maintains an inventory of IT assets, covering both physical and virtual assets, as well as centrally managed asset ownership assignments.
• Technology assets and data are categorized according to data classification and business criticality criteria.
• A Cybersecurity Supply Chain Risk Management (C-SCRM) function oversees supply chain risks including the removal and prevention of certain technology services and/ or equipment designated as supply chain threats by a statutory or regulatory body.
• Data/process owners document where sensitive/regulated data is stored, transmitted and processed, generating Data Flow Diagrams (DFDs) and network diagrams to document the flow of data.
• Organizational policies and standards cover software licensing restrictions for users, as part of acceptable and unacceptable behaviors.
• Software license violations are investigated by the ITAM team, in coordination with cybersecurity personnel, whenever necessary. | Asset Management (AST) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement.
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to protect Intellectual Property (IP) rights with software licensing restrictions.
| null | null | null | 2.2 | 2.2 | 2.2 | 2.2 | BAI09.05 | null | null | null | null | null | null | null | null | null | null | 18.1.2 | 5.32
6.2 | 18.1.2 | null | 6.15.1.2 | null | null | null | null | null | null | null | null | null | null | null | SC-18(2) | null | null | null | SC-18(2) | null | null | null | null | SC-18(2) | null | null | null | null | null | SC-18(2) | null | null | null | null | SC-18(2) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | L.25
| null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | SC-18(2) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 3.1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 3 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 18.1.2
18.1.2.13.PB | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | null | null | x | R-AC-3
R-AM-1
R-AM-3
R-BC-4
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-4
R-GV-6
R-IR-3
R-SA-1 | null | null | R-AC-3 | null | R-AM-1 | null | R-AM-3 | null | null | null | R-BC-4 | null | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | R-EX-6 | R-EX-7 | R-GV-1 | R-GV-2 | null | R-GV-4 | null | R-GV-6 | null | null | null | null | R-IR-3 | null | R-SA-1 | null | NT-7
MT-1
MT-2
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | null | null | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Asset Management | Data Action Mapping | AST-02.8 | Mechanisms exist to create and maintain a map of technology assets where sensitive/regulated data is stored, transmitted or processed. | - Visio
- Lucid Chart | E-DCH-05 | Does the organization create and maintain a map of technology assets where sensitive/regulated data is stored, transmitted or processed? | 9 | Identify | null | X | X | There is no evidence of a capability to create and maintain a map of technology assets where sensitive/regulated data is stored, transmitted or processed. | Asset Management (AST) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Asset management is informally assigned as an additional duty to existing IT/cybersecurity personnel.
• Asset inventories are performed in an ad hoc manner.
• Software licensing is tracked as part of IT asset inventories.
• Data process owners maintain limited network diagrams to document the flow of sensitive/regulated data that is specific to their initiative.
• IT personnel work with data/process owners to help ensure secure practices are implemented throughout the System Development Lifecycle (SDLC) for all high-value projects. | Asset Management (AST) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Asset management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for asset management.
• Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• Asset management is formally assigned as an additional duty to existing IT/cybersecurity personnel.
• Technology assets are categorized according to data classification and business criticality.
• Inventories cover technology assets in scope for statutory, regulatory and/ or contractual compliance, which includes both physical and virtual assets.
• Software licensing is tracked as part of IT asset inventories.
• Users are educated on their responsibilities to protect technology assets assigned to them or under their supervision.
• IT/cybersecurity personnel maintain network diagrams to document the flow of sensitive/regulated data across the network.
• on at least an annual basis, or after any major technology or process change, the data/process owner updates the data mapping documentation. | Asset Management (AST) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• An IT Asset Management (ITAM) function, or similar function, governs asset management to help ensure compliance with requirements for asset management.
• An ITAM function, or similar function, maintains an inventory of IT assets, covering both physical and virtual assets, as well as centrally managed asset ownership assignments.
• Technology assets and data are categorized according to data classification and business criticality criteria.
• A Cybersecurity Supply Chain Risk Management (C-SCRM) function oversees supply chain risks including the removal and prevention of certain technology services and/ or equipment designated as supply chain threats by a statutory or regulatory body.
• Data/process owners document where sensitive/regulated data is stored, transmitted and processed, generating Data Flow Diagrams (DFDs) and network diagrams to document the flow of data.
• on at least an annual basis, or after any major technology or process change, the data/process owner updates any data mapping documentation.
• A Data Protection Officer (DPO) maintains a centralized repository of personal data mapping, as well as sensitive/regulated data flows. | Asset Management (AST) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement.
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to create and maintain a map of technology assets where sensitive/regulated data is stored, transmitted or processed. | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 5.9 | null | null | null | null | null | null | null | null | null | null | ID.IM-P1
ID.IM-P4
ID.IM-P5
ID.IM-P8 | null | null | null | null | null | null | null | CM-13 | null | null | null | null | CM-13 | null | null | null | null | null | CM-13 | null | null | null | CM-13 | CM-13 | null | 3.4.11.a
3.4.11.c
3.15.2.a.5 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | P.2.3 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | CM-13 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 2-4-1-16 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Lockton | null | null | R-AC-4
R-AM-2
R-AM-3
R-BC-2
R-BC-4
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-4
R-GV-5
R-IR-1
R-IR-2
R-IR-3
R-SA-1 | null | null | null | R-AC-4 | null | R-AM-2 | R-AM-3 | null | R-BC-2 | null | R-BC-4 | null | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | R-EX-6 | R-EX-7 | R-GV-1 | R-GV-2 | null | R-GV-4 | R-GV-5 | null | null | null | R-IR-1 | R-IR-2 | R-IR-3 | null | R-SA-1 | null | NT-7
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | MT-3 | MT-4 | MT-5 | MT-6 | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Asset Management | Configuration Management Database (CMDB) | AST-02.9 | Mechanisms exist to implement and manage a Configuration Management Database (CMDB), or similar technology, to monitor and govern technology asset-specific information. | - Configuration Management Database (CMDB) | null | Does the organization implement and manage a Configuration Management Database (CMDB), or similar technology, to monitor and govern technology asset-specific information? | 5 | Identify | null | null | X | There is no evidence of a capability to implement and manage a Configuration Management Database (CMDB), or similar technology, to monitor and govern technology asset-specific information. | SP-CMM1 is N/A, since a structured process is required to implement and manage a Configuration Management Database (CMDB), or similar technology, to monitor and govern technology asset-specific information. | SP-CMM2 is N/A, since a well-defined process is required to implement and manage a Configuration Management Database (CMDB), or similar technology, to monitor and govern technology asset-specific information. | Asset Management (AST) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• An IT Asset Management (ITAM) function, or similar function, governs asset management to help ensure compliance with requirements for asset management.
• An ITAM function, or similar function, maintains an inventory of IT assets, covering both physical and virtual assets, as well as centrally managed asset ownership assignments.
• Technology assets and data are categorized according to data classification and business criticality criteria.
• A Cybersecurity Supply Chain Risk Management (C-SCRM) function oversees supply chain risks including the removal and prevention of certain technology services and/ or equipment designated as supply chain threats by a statutory or regulatory body.
• Data/process owners document where sensitive/regulated data is stored, transmitted and processed, generating Data Flow Diagrams (DFDs) and network diagrams to document the flow of data.
• ITAM leverages an established Configuration Management Database (CMDB), or similar tool, as the authoritative source of IT assets and user assignment.
• An IT infrastructure team, or similar function, ensures that statutory, regulatory and contractual cybersecurity & data privacy controls are addressed to ensure secure configurations are designed, built and maintained.
• Configurations conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides) for test, development, staging and production environments. | Asset Management (AST) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement.
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to implement and manage a Configuration Management Database (CMDB), or similar technology, to monitor and govern technology asset-specific information. | null | null | null | 2.4 | null | 2.4 | 2.4 | EDM05.01
EDM05.02
EDM05.03
APO01.06 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | TS-5.0 | null | null | null | null | null | null | CM-8(2) | null | null | CM-8(2) | CM-8(2)
CM-8(7) | null | null | null | CM-8(2) | CM-8(7) | null | null | null | CM-8(2) | null | CM-8(2)
CM-8(7) | null | null | null | null | CM-8(2)
CM-8(7) | null | 3.4.8.a
3.4.8.b
3.4.8.c
3.4.10.a
3.4.10.b
3.4.10.c | null | null | 3.4.2e
3.4.3e | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | D.1.1 | null | null | null | null | null | ASSET-1.D.MIL2
ASSET-1.H.MIL3
ASSET-2.D.MIL2
ASSET-2.E.MIL2
ASSET-2.F.MIL3
ASSET-2.G.MIL3 | ADM:SG3.SP2
SC:SG7.SP1 | null | null | null | null | TBD - 3.4.3e | null | null | CM.L3-3.4.2e
CM.L3-3.4.3e | null | null | null | null | null | null | null | null | CM-8(2) | null | null | CM-8(2) | null | CM-8(2) | null | null | CM-8(2) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 2-1-1
2-1-1-2
2-1-1-3 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Principle 2.1
Principle 6.1 | Principle 2.1
Principle 6.1 | null | null | null | 1493 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 2.2.2
2.2.3 | null | null | null | null | null | null | null | null | null | null | null | null | null | x | R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1 | R-AC-1 | R-AC-2 | R-AC-3 | R-AC-4 | R-AM-1 | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | null | null | null | null | R-EX-6 | R-EX-7 | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | null | R-IR-1 | R-IR-2 | R-IR-3 | R-IR-4 | R-SA-1 | null | NT-7
MT-1
MT-2
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | null | null | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Asset Management | Automated Location
Tracking | AST-02.10 | Mechanisms exist to track the geographic location of system components. | null | null | Does the organization track the geographic location of system components? | 5 | Identify | null | X | X | There is no evidence of a capability to track the geographic location of system components. | SP-CMM1 is N/A, since a structured process is required to track the geographic location of system components. | SP-CMM2 is N/A, since a well-defined process is required to track the geographic location of system components. | Asset Management (AST) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• An IT Asset Management (ITAM) function, or similar function, governs asset management to help ensure compliance with requirements for asset management.
• An ITAM function, or similar function, maintains an inventory of IT assets, covering both physical and virtual assets, as well as centrally managed asset ownership assignments.
• Technology assets and data are categorized according to data classification and business criticality criteria.
• A Cybersecurity Supply Chain Risk Management (C-SCRM) function oversees supply chain risks including the removal and prevention of certain technology services and/ or equipment designated as supply chain threats by a statutory or regulatory body.
• Data/process owners document where sensitive/regulated data is stored, transmitted and processed, generating Data Flow Diagrams (DFDs) and network diagrams to document the flow of data.
• ITAM, or a supporting system, has the capability to bind components to a specific IT assets and track the real-time GPS location of the device. | Asset Management (AST) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement.
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | Asset Management (AST) efforts are “world-class” capabilities that leverage predictive analysis (e.g., machine learning, AI, etc.). In addition to CMM Level 4 criteria, CMM Level 5 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Stakeholders make time-sensitive decisions to support operational efficiency, which may include automated remediation actions.
▪ Based on predictive analysis, process improvements are implemented according to “continuous improvement” practices that affect process changes. | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | CM-8(8) | null | null | null | null | null | null | null | null | null | null | CM-8(8) | null | null | null | CM-8(8) | CM-8(8) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | D.1.1.10 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | R-AM-1
R-AM-2
R-AM-3
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1 | null | null | null | null | R-AM-1 | R-AM-2 | R-AM-3 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | R-IR-1 | R-IR-2 | R-IR-3 | R-IR-4 | R-SA-1 | null | MT-2
MT-8
MT-9
MT-12
MT-13
MT-14 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | MT-2 | null | null | null | null | null | MT-8 | MT-9 | null | null | MT-12 | MT-13 | MT-14 | null | null | null |
Asset Management | Component Assignment | AST-02.11 | Mechanisms exist to bind components to a specific system. | null | null | Does the organization bind components to a specific system? | 3 | Identify | null | null | X | There is no evidence of a capability to bind components to a specific system. | SP-CMM1 is N/A, since a structured process is required to bind components to a specific system. | SP-CMM2 is N/A, since a well-defined process is required to bind components to a specific system. | Asset Management (AST) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• An IT Asset Management (ITAM) function, or similar function, governs asset management to help ensure compliance with requirements for asset management.
• An ITAM function, or similar function, maintains an inventory of IT assets, covering both physical and virtual assets, as well as centrally managed asset ownership assignments.
• Technology assets and data are categorized according to data classification and business criticality criteria.
• A Cybersecurity Supply Chain Risk Management (C-SCRM) function oversees supply chain risks including the removal and prevention of certain technology services and/ or equipment designated as supply chain threats by a statutory or regulatory body.
• Data/process owners document where sensitive/regulated data is stored, transmitted and processed, generating Data Flow Diagrams (DFDs) and network diagrams to document the flow of data. | See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to bind components to a specific system. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to bind components to a specific system. | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | CM-8(9) | null | null | null | null | null | null | null | null | null | null | CM-8(9) | null | null | null | null | CM-8(9) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | G.3 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | R-AC-3
R-AM-1
R-AM-2
R-AM-3
R-IR-1
R-IR-2
R-IR-3
R-IR-4 | null | null | R-AC-3 | null | R-AM-1 | R-AM-2 | R-AM-3 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | R-IR-1 | R-IR-2 | R-IR-3 | R-IR-4 | null | null | MT-2
MT-8
MT-9
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | MT-2 | null | null | null | null | null | MT-8 | MT-9 | null | null | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Asset Management | Asset Ownership Assignment | AST-03 | Mechanisms exist to ensure asset ownership responsibilities are assigned, tracked and managed at a team, individual, or responsible organization level to establish a common understanding of requirements for asset protection. | null | E-AST-01
E-CPL-03 | Does the organization ensure asset ownership responsibilities are assigned, tracked and managed at a team, individual, or responsible organization level to establish a common understanding of requirements for asset protection? | 8 | Identify | null | X | null | There is no evidence of a capability to ensure asset ownership responsibilities are assigned, tracked and managed at a team, individual, or responsible organization level to establish a common understanding of requirements for asset protection. | Asset Management (AST) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Asset management is informally assigned as an additional duty to existing IT/cybersecurity personnel.
• Asset inventories are performed in an ad hoc manner.
• Software licensing is tracked as part of IT asset inventories.
• Data process owners maintain limited network diagrams to document the flow of sensitive/regulated data that is specific to their initiative.
• IT personnel work with data/process owners to help ensure secure practices are implemented throughout the System Development Lifecycle (SDLC) for all high-value projects.
• Inventory of physical technology assets are assigned to individual users or teams and covers common devices (e.g., laptops, workstations and servers).
• Organizational policies and standards cover:
o Enhanced security requirements for unattended systems (e.g., kiosks, ATMs, etc.) and point of sale devices.
o Media handling requirements for users.
o Requirements for approving assets from entering or existing facilities.
o Requirements for users to dispose of, destroy or repurpose system components when it is no longer needed for business or legal reasons.
o Requirements for users to secure laptops while traveling.
o Software licensing restrictions for users, as part of acceptable and unacceptable behaviors.
o Use of personal devices (e.g., Bring Your Own Device (BYOD), as part of acceptable and unacceptable behaviors.
o Use of third-party devices, as part of acceptable and unacceptable behaviors. | Asset Management (AST) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Asset management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for asset management.
• Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• Asset management is formally assigned as an additional duty to existing IT/cybersecurity personnel.
• Technology assets are categorized according to data classification and business criticality.
• Inventories cover technology assets in scope for statutory, regulatory and/ or contractual compliance, which includes both physical and virtual assets.
• Software licensing is tracked as part of IT asset inventories.
• Users are educated on their responsibilities to protect technology assets assigned to them or under their supervision.
• IT/cybersecurity personnel maintain network diagrams to document the flow of sensitive/regulated data across the network.
• Data/process owners for business-critical assets are documented and are reviewed as part of the annual asset inventories. | Asset Management (AST) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• An IT Asset Management (ITAM) function, or similar function, governs asset management to help ensure compliance with requirements for asset management.
• An ITAM function, or similar function, maintains an inventory of IT assets, covering both physical and virtual assets, as well as centrally managed asset ownership assignments.
• Technology assets and data are categorized according to data classification and business criticality criteria.
• A Cybersecurity Supply Chain Risk Management (C-SCRM) function oversees supply chain risks including the removal and prevention of certain technology services and/ or equipment designated as supply chain threats by a statutory or regulatory body.
• Data/process owners document where sensitive/regulated data is stored, transmitted and processed, generating Data Flow Diagrams (DFDs) and network diagrams to document the flow of data.
• Stakeholders leverage ITAM tools to create and maintain an inventory of systems, applications and services, that need to adhere to statutory, regulatory and/ or contractual requirements, with sufficient detail to determine control applicability.
• Users are educated on their responsibilities to protect technology assets assigned to them or under their supervision.
• Data/process owners for business-critical assets are documented and are reviewed as part of the annual asset inventories. | Asset Management (AST) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement.
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | Asset Management (AST) efforts are “world-class” capabilities that leverage predictive analysis (e.g., machine learning, AI, etc.). In addition to CMM Level 4 criteria, CMM Level 5 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Stakeholders make time-sensitive decisions to support operational efficiency, which may include automated remediation actions.
▪ Based on predictive analysis, process improvements are implemented according to “continuous improvement” practices that affect process changes. | null | null | null | null | null | null | null | APO01.06 | null | null | null | null | null | null | null | null | null | null | 8.1.2 | 5.9 | 8.1.2 | null | 6.5.1.2 | null | null | null | null | null | null | null | ID.IM-P2 | null | null | null | null | null | null | null | SA-4(12) | null | null | null | null | SA-4(12) | null | SA-4(12) | SA-4(12) | SA-4(12) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 2.5 | 2.2.2
2.2.4
2.2.5
6.5.2 | 2.2.2 | 2.2.2
2.2.4
2.2.5
6.5.2 | null | 2.2.2 | 2.2.2
2.2.4
2.2.5
6.5.2 | 2.2.2
2.2.4
2.2.5 | 2.2.2
2.2.4
2.2.5
6.5.2 | 2.2.2
2.2.4
2.2.5
6.5.2 | null | D.8 | null | null | null | null | null | null | ADM:SG1.SP3 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | SA-4(12) | null | null | null | null | null | null | null | null | null | null | null | null | III.A | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Sec 14
Sec 15 | Art 16 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 2-1-1-2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 1071 | null | null | null | null | null | null | null | null | null | null | 8.1.2
8.1.2.7.PB | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | null | null | x | R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-4
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
R-SA-2 | R-AC-1 | R-AC-2 | R-AC-3 | R-AC-4 | R-AM-1 | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | null | R-EX-4 | null | R-EX-6 | R-EX-7 | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | null | R-IR-1 | R-IR-2 | R-IR-3 | R-IR-4 | R-SA-1 | R-SA-2 | NT-7
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | MT-3 | MT-4 | MT-5 | MT-6 | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | - Added NIST 800-53 R5 mapping for SA-4(12) |
Asset Management | Accountability Information | AST-03.1 | Mechanisms exist to include capturing the name, position and/or role of individuals responsible/accountable for administering assets as part of the technology asset inventory process. | null | E-AST-01 | Does the organization include capturing the name, position and/or role of individuals responsible/accountable for administering assets as part of the technology asset inventory process? | 5 | Identify | null | null | X | There is no evidence of a capability to include capturing the name, position and/ or role of individuals responsible/accountable for administering assets as part of the technology asset inventory process. | SP-CMM1 is N/A, since a structured process is required to include capturing the name, position and/ or role of individuals responsible/accountable for administering assets as part of the technology asset inventory process. | Asset Management (AST) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Asset management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for asset management.
• Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• Asset management is formally assigned as an additional duty to existing IT/cybersecurity personnel.
• Technology assets are categorized according to data classification and business criticality.
• Inventories cover technology assets in scope for statutory, regulatory and/ or contractual compliance, which includes both physical and virtual assets.
• Software licensing is tracked as part of IT asset inventories.
• Users are educated on their responsibilities to protect technology assets assigned to them or under their supervision.
• IT/cybersecurity personnel maintain network diagrams to document the flow of sensitive/regulated data across the network. | Asset Management (AST) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• An IT Asset Management (ITAM) function, or similar function, governs asset management to help ensure compliance with requirements for asset management.
• An ITAM function, or similar function, maintains an inventory of IT assets, covering both physical and virtual assets, as well as centrally managed asset ownership assignments.
• Technology assets and data are categorized according to data classification and business criticality criteria.
• A Cybersecurity Supply Chain Risk Management (C-SCRM) function oversees supply chain risks including the removal and prevention of certain technology services and/ or equipment designated as supply chain threats by a statutory or regulatory body.
• Data/process owners document where sensitive/regulated data is stored, transmitted and processed, generating Data Flow Diagrams (DFDs) and network diagrams to document the flow of data.
• Stakeholders leverage ITAM tools to create and maintain an inventory of systems, applications and services, that need to adhere to statutory, regulatory and/ or contractual requirements, with sufficient detail to determine control applicability. | Asset Management (AST) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement.
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to include capturing the name, position and/ or role of individuals responsible/accountable for administering assets as part of the technology asset inventory process. | null | null | null | null | null | null | null | EDM05.01
EDM05.02
EDM05.03
APO01.06 | null | null | null | null | null | null | null | null | null | null | null | 5.9 | null | null | null | null | null | null | null | null | null | null | ID.IM-P2 | null | null | null | CM-8(4) | null | null | CM-8(4) | CM-8(4) | null | null | null | CM-8(4) | null | null | null | null | CM-8(4) | null | CM-8(4) | null | null | null | null | CM-8(4) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | D.1.1.2 | null | null | null | null | null | null | ADM:SG1.SP3 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | CM-8(4) | null | null | CM-8(4) | null | CM-8(4) | null | null | CM-8(4) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1 | R-AC-1 | R-AC-2 | R-AC-3 | R-AC-4 | R-AM-1 | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | null | null | null | null | R-EX-6 | R-EX-7 | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | null | R-IR-1 | R-IR-2 | R-IR-3 | R-IR-4 | R-SA-1 | null | NT-7
MT-1
MT-2
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | null | null | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Asset Management | Provenance | AST-03.2 | Mechanisms exist to track the origin, development, ownership, location and changes to systems, system components and associated data. | null | E-AST-22 | Does the organization track the origin, development, ownership, location and changes to systems, system components and associated data? | 8 | Identify | null | X | X | There is no evidence of a capability to track the origin, development, ownership, location and changes to systems, system components and associated data. | SP-CMM1 is N/A, since a structured process is required to track the origin, development, ownership, location and changes to systems, system components and associated data. | SP-CMM2 is N/A, since a well-defined process is required to track the origin, development, ownership, location and changes to systems, system components and associated data. | Asset Management (AST) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• An IT Asset Management (ITAM) function, or similar function, governs asset management to help ensure compliance with requirements for asset management.
• An ITAM function, or similar function, maintains an inventory of IT assets, covering both physical and virtual assets, as well as centrally managed asset ownership assignments.
• Technology assets and data are categorized according to data classification and business criticality criteria.
• A Cybersecurity Supply Chain Risk Management (C-SCRM) function oversees supply chain risks including the removal and prevention of certain technology services and/ or equipment designated as supply chain threats by a statutory or regulatory body.
• Data/process owners document where sensitive/regulated data is stored, transmitted and processed, generating Data Flow Diagrams (DFDs) and network diagrams to document the flow of data.
• ITAM tracks the origin, development, ownership, location and changes to a system, system components and associated data. | See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to track the origin, development, ownership, location and changes to systems, system components and associated data. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to track the origin, development, ownership, location and changes to systems, system components and associated data. | null | null | null | null | null | null | null | null | null | null | null | null | null | CR 3.13 (7.15)
EDR 3.12 (13.7.1) | null | null | null | null | null | 5.21 | null | null | null | null | null | null | T1041, T1048, T1048.002, T1048.003, T1052, T1052.001, T1059.002, T1204.003, T1505, T1505.001, T1505.002, T1505.004, T1546.006, T1554, T1567, T1601, T1601.001, T1601.002 | null | null | null | null | PW.4
PW.4.1 | null | null | null | null | null | null | SR-4
SR-4(1)
SR-4(2) | null | null | null | null | SR-4
SR-4(1)
SR-4(2) | null | null | null | null | null | SR-4 | null | null | null | SR-4 | SR-4 | null | null | null | null | null | null | null | ID.RA-09 | null | null | null | null | null | null | null | null | null | null | null | null | P.2.3.7
| null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 1790
1791
1792 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1 | R-AC-1 | R-AC-2 | R-AC-3 | R-AC-4 | R-AM-1 | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | null | null | null | null | R-EX-6 | R-EX-7 | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | null | R-IR-1 | R-IR-2 | R-IR-3 | R-IR-4 | R-SA-1 | null | NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
MT-1
MT-2
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | NT-9 | NT-10 | NT-11 | NT-12 | NT-13 | null | MT-1 | MT-2 | null | null | null | null | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Asset Management | Network Diagrams & Data Flow Diagrams (DFDs) | AST-04 | Mechanisms exist to maintain network architecture diagrams that:
▪ Contain sufficient detail to assess the security of the network's architecture;
▪ Reflect the current architecture of the network environment; and
▪ Document all sensitive/regulated data flows. | - High-Level Diagram (HLD)
- Low-Level Diagram (LLD)
- Data Flow Diagram (DFD)
- SolarWinds (https://www.solarwinds.com/)
- Paessler
- PRTG | E-DCH-03
E-DCH-04
E-DCH-05 | Does the organization maintain network architecture diagrams that:
▪ Contain sufficient detail to assess the security of the network's architecture;
▪ Reflect the current architecture of the network environment; and
▪ Document all sensitive/regulated data flows? | 10 | Identify | null | X | X | There is no evidence of a capability to maintain network architecture diagrams that:
▪ Contain sufficient detail to assess the security of the network's architecture;
▪ Reflect the current architecture of the network environment; and
▪ Document all sensitive/regulated data flows. | Asset Management (AST) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Asset management is informally assigned as an additional duty to existing IT/cybersecurity personnel.
• Asset inventories are performed in an ad hoc manner.
• Software licensing is tracked as part of IT asset inventories.
• Data process owners maintain limited network diagrams to document the flow of sensitive/regulated data that is specific to their initiative.
• IT personnel work with data/process owners to help ensure secure practices are implemented throughout the System Development Lifecycle (SDLC) for all high-value projects.
• on at least an annual basis, or after any major technology or process change, network diagrams are updated to reflect the current topology. | Asset Management (AST) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Asset management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for asset management.
• Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• Asset management is formally assigned as an additional duty to existing IT/cybersecurity personnel.
• Technology assets are categorized according to data classification and business criticality.
• Inventories cover technology assets in scope for statutory, regulatory and/ or contractual compliance, which includes both physical and virtual assets.
• Software licensing is tracked as part of IT asset inventories.
• Users are educated on their responsibilities to protect technology assets assigned to them or under their supervision.
• IT/cybersecurity personnel maintain network diagrams to document the flow of sensitive/regulated data across the network.
• Data/process owners generate Data Flow Diagrams (DFDs) and network diagrams to document the flow of data to create and maintain a map of systems where sensitive/regulated data is stored, transmitted or processed.
• Data/process owners document where personal data is stored, transmitted and/ or processed. | Asset Management (AST) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• An IT Asset Management (ITAM) function, or similar function, governs asset management to help ensure compliance with requirements for asset management.
• An ITAM function, or similar function, maintains an inventory of IT assets, covering both physical and virtual assets, as well as centrally managed asset ownership assignments.
• Technology assets and data are categorized according to data classification and business criticality criteria.
• A Cybersecurity Supply Chain Risk Management (C-SCRM) function oversees supply chain risks including the removal and prevention of certain technology services and/ or equipment designated as supply chain threats by a statutory or regulatory body.
• Data/process owners document where sensitive/regulated data is stored, transmitted and processed, generating Data Flow Diagrams (DFDs) and network diagrams to document the flow of data.
• Stakeholders create network diagrams that graphically represent compliance boundaries (e.g., in-scope vs out-of-scope).
• Data/process owners document where personal data is stored, transmitted and/ or processed. | Asset Management (AST) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement.
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to maintain network architecture diagrams that:
▪ Contain sufficient detail to assess the security of the network's architecture;
▪ Reflect the current architecture of the network environment; and
▪ Document all sensitive/regulated data flows. | CC2.1 | C1.1-POF1 | null | 3.8
12.4 | null | 3.8
12.4 | 3.8
12.4 | null | Principle 13 | DSP-05
IVS-08 | DAT-03 | null | null | null | null | null | null | null | null | 5.9
8.20 | null | null | null | null | null | null | null | TS-2.2 | null | null | ID.IM-P1 | null | P-11 | null | PL-2
SA-5(1)
SA-5(2)
SA-5(3)
SA-5(4) | PL-2 | PL-2 | PL-2 | PL-2
SA-4(1)
SA-4(2) | PL-2 | PL-2 | PL-2
SA-4(1)
SA-4(2) | PL-2
SA-4(1)
SA-4(2) | null | null | PL-2 | PL-2
SA-4(1)
SA-4(2) | PL-2
SA-4(1)
SA-4(2) | null | PL-2 | PL-2 | PL-2 | null | null | PL-2 | null | 3.1.3
3.4.11.a
3.4.11.c
3.15.2.a.5 | null | null | 3.11.4e | null | ID.AM-3 | ID.AM-03 | null | 1.1.2
1.1.3 | 1.2.3
1.2.4 | null | 1.2.3
1.2.4 | null | 1.2.3 | null | null | 1.2.3
1.2.4 | 1.2.3
1.2.4 | null | N.1.1 | null | null | 4.1
5.1
6.1
6.2
6.3
6.4
6.5
6.6
6.7
6.8
6.9 | null | null | null | AM:SG1.SP1
EF:SG2.SP1
TM:SG1.SP1
TM:SG2.SP1
TM:SG2.SP2 | 7.4 | 5.7.1.2 | null | null | TBD - 3.11.4e | null | null | RA.L3-3.11.4e | PL-2 | null | null | null | null | null | null | null | PL-2 | PL-2 | PL-2 | PL-2 | PL-2 | PL-2 | PL-2 | PL-2 | PL-2 | PL-2 | null | D4.C.Co.B.4
D4.C.Co.Int.1 | null | null | null | null | null | null | 4.L.B
8.L.D | PL-2
SA-4(1)
SA-4(2) | null | null | null | null | null | null | null | null | null | PL-2 | PL-2 | PL-2 | III.B.1.c | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | PL-2 | PL-2 | PL-2 | null | null | null | null | Art 8.4 | Art 9 | Art 30.1
Art 30.2
Art 30.3
Art 30.4
Art 30.5 | null | null | null | Sec 14
Sec 15 | Art 16 | null | null | null | null | null | null | COS-07 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 2-4-1-16 | null | null | null | null | null | null | null | null | null | B3.a
B4.c | null | null | null | null | null | null | null | null | null | 0516
0518
1645
1646 | null | null | null | null | null | null | null | null | null | null | null | null | null | 18.1.9.C.02
18.1.11.C.01
18.1.12.C.01
18.1.12.C.02 | null | null | null | null | null | null | null | null | null | null | null | null | 3.1 | null | null | null | null | null | null | null | null | null | null | null | x | null | null | x | R-AC-1
R-AC-2
R-AC-4
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
R-SA-2 | R-AC-1 | R-AC-2 | null | R-AC-4 | null | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | null | R-EX-4 | R-EX-5 | R-EX-6 | R-EX-7 | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | null | R-IR-1 | R-IR-2 | R-IR-3 | R-IR-4 | R-SA-1 | R-SA-2 | NT-7
MT-1
MT-2
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | null | null | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Asset Management | Asset Scope Classification | AST-04.1 | Mechanisms exist to determine cybersecurity & data privacy control applicability by identifying, assigning and documenting the appropriate asset scope categorization for all systems, applications, services and personnel (internal and third-parties). | null | E-AST-02
E-CPL-02
E-DCH-01
E-DCH-02 | Does the organization determine cybersecurity & data privacy control applicability by identifying, assigning and documenting the appropriate asset scope categorization for all systems, applications, services and personnel (internal and third-parties)? | 8 | Identify | null | null | X | There is no evidence of a capability to determine cybersecurity & data privacy control applicability by identifying, assigning and documenting the appropriate asset scope categorization for all systems, applications, services and personnel (internal and third-parties). | SP-CMM1 is N/A, since a structured process is required to determine cybersecurity & data privacy control applicability by identifying, assigning and documenting the appropriate asset scope categorization for all systems, applications, services and personnel (internal and third-parties). | SP-CMM2 is N/A, since a well-defined process is required to determine cybersecurity & data privacy control applicability by identifying, assigning and documenting the appropriate asset scope categorization for all systems, applications, services and personnel (internal and third-parties). | Asset Management (AST) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• An IT Asset Management (ITAM) function, or similar function, governs asset management to help ensure compliance with requirements for asset management.
• An ITAM function, or similar function, maintains an inventory of IT assets, covering both physical and virtual assets, as well as centrally managed asset ownership assignments.
• Technology assets and data are categorized according to data classification and business criticality criteria.
• A Cybersecurity Supply Chain Risk Management (C-SCRM) function oversees supply chain risks including the removal and prevention of certain technology services and/ or equipment designated as supply chain threats by a statutory or regulatory body.
• Data/process owners document where sensitive/regulated data is stored, transmitted and processed, generating Data Flow Diagrams (DFDs) and network diagrams to document the flow of data.
• Stakeholders performs perform annual scoping evaluations to determine cybersecurity & data privacy control applicability by identifying, assigning and documenting the appropriate asset scope categorization for all systems, applications, services and personnel (internal and third-parties). | See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to determine cybersecurity & data privacy control applicability by identifying, assigning and documenting the appropriate asset scope categorization for all systems, applications, services and personnel (internal and third-parties). | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to determine cybersecurity & data privacy control applicability by identifying, assigning and documenting the appropriate asset scope categorization for all systems, applications, services and personnel (internal and third-parties). | null | CC2.2-POF9 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 4.3 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | PE-22
SA-5 | PE-22
SA-5 | null | SA-5 | SA-5 | SA-5 | PE-22 | null | null | PE-22 | PE-22 | null | SA-5 | SA-5 | null | null | null | SA-5 | null | 3.4.11.a
3.4.11.c | null | null | null | null | null | null | null | null | A3.2.5 | null | null | null | null | null | null | null | null | null | P.2.1 | null | null | null | null | null | null | null | 7.4 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | SA-5 | null | null | null | null | null | null | null | null | null | null | null | null | III.B.1.c | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 3.3.3(17)
3.3.3(18) | null | null | null | null | null | null | null | null | null | null | null | null | null | 12.4 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | A3.a
B3.a | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | R-AC-1
R-AC-4
R-AM-3
R-BC-2
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1 | R-AC-1 | null | null | R-AC-4 | null | null | R-AM-3 | null | R-BC-2 | null | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | null | null | R-EX-5 | R-EX-6 | R-EX-7 | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | null | R-IR-1 | R-IR-2 | R-IR-3 | R-IR-4 | R-SA-1 | null | MT-8
MT-9
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | MT-8 | MT-9 | null | null | MT-12 | MT-13 | MT-14 | MT-15 | null | - Added NIST 800-53 R5 mapping for PE-22 |
Asset Management | Control Applicability Boundary Graphical Representation | AST-04.2 | Mechanisms exist to ensure control applicability is appropriately-determined for systems, applications, services and third parties by graphically representing applicable boundaries. | null | E-AST-02
E-CPL-02 | Does the organization ensure control applicability is appropriately-determined for systems, applications, services and third parties by graphically representing applicable boundaries? | 6 | Identify | null | X | X | There is no evidence of a capability to ensure control applicability is appropriately-determined for systems, applications, services and third parties by graphically representing applicable boundaries. | SP-CMM1 is N/A, since a structured process is required to ensure control applicability is appropriately-determined for systems, applications, services and third parties by graphically representing applicable boundaries. | SP-CMM2 is N/A, since a well-defined process is required to ensure control applicability is appropriately-determined for systems, applications, services and third parties by graphically representing applicable boundaries. | Asset Management (AST) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• An IT Asset Management (ITAM) function, or similar function, governs asset management to help ensure compliance with requirements for asset management.
• An ITAM function, or similar function, maintains an inventory of IT assets, covering both physical and virtual assets, as well as centrally managed asset ownership assignments.
• Technology assets and data are categorized according to data classification and business criticality criteria.
• A Cybersecurity Supply Chain Risk Management (C-SCRM) function oversees supply chain risks including the removal and prevention of certain technology services and/ or equipment designated as supply chain threats by a statutory or regulatory body.
• Data/process owners document where sensitive/regulated data is stored, transmitted and processed, generating Data Flow Diagrams (DFDs) and network diagrams to document the flow of data.
• Stakeholders create network diagrams that graphically represent compliance boundaries (e.g., in-scope vs out-of-scope). | See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to ensure control applicability is appropriately-determined for systems, applications, services and third parties by graphically representing applicable boundaries. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to ensure control applicability is appropriately-determined for systems, applications, services and third parties by graphically representing applicable boundaries. | null | CC2.2-POF9
CC5.2-POF2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | TS-2.2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 3.4.11.a
3.4.11.c
3.15.2.a.2 | null | null | null | null | null | null | null | null | 1.2.3
6.3.2
12.5.2.1
A3.2.5 | null | 1.2.3 | null | 1.2.3 | null | null | 1.2.3 | 1.2.3
12.5.2.1 | null | N.1.3 | null | null | null | null | null | null | null | 7.4 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | III.B.1.c | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 2-4-1-16 | null | null | null | null | null | null | null | null | null | B3.a | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | R-AM-3
R-EX-5
R-GV-1
R-SA-1 | null | null | null | null | null | null | R-AM-3 | null | null | null | null | null | null | null | null | null | R-EX-5 | null | null | R-GV-1 | null | null | null | null | null | null | null | null | null | null | null | R-SA-1 | null | MT-8
MT-9
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | MT-8 | MT-9 | null | null | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Asset Management | Compliance-Specific Asset Identification | AST-04.3 | Mechanisms exist to create and maintain a current inventory of systems, applications and services that are in scope for statutory, regulatory and/or contractual compliance obligations that provides sufficient detail to determine control applicability, based on asset scope categorization. | null | E-AST-02
E-CPL-02 | Does the organization create and maintain a current inventory of systems, applications and services that are in scope for statutory, regulatory and/or contractual compliance obligations that provides sufficient detail to determine control applicability, based on asset scope categorization? | 6 | Identify | null | X | X | There is no evidence of a capability to create and maintain a current inventory of systems, applications and services that are in scope for statutory, regulatory and/ or contractual compliance obligations that provides sufficient detail to determine control applicability, based on asset scope categorization. | SP-CMM1 is N/A, since a structured process is required to create and maintain a current inventory of systems, applications and services that are in scope for statutory, regulatory and/ or contractual compliance obligations that provides sufficient detail to determine control applicability, based on asset scope categorization. | SP-CMM2 is N/A, since a well-defined process is required to create and maintain a current inventory of systems, applications and services that are in scope for statutory, regulatory and/ or contractual compliance obligations that provides sufficient detail to determine control applicability, based on asset scope categorization. | Asset Management (AST) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• An IT Asset Management (ITAM) function, or similar function, governs asset management to help ensure compliance with requirements for asset management.
• An ITAM function, or similar function, maintains an inventory of IT assets, covering both physical and virtual assets, as well as centrally managed asset ownership assignments.
• Technology assets and data are categorized according to data classification and business criticality criteria.
• A Cybersecurity Supply Chain Risk Management (C-SCRM) function oversees supply chain risks including the removal and prevention of certain technology services and/ or equipment designated as supply chain threats by a statutory or regulatory body.
• Data/process owners document where sensitive/regulated data is stored, transmitted and processed, generating Data Flow Diagrams (DFDs) and network diagrams to document the flow of data.
• Stakeholders create network diagrams that graphically represent compliance boundaries (e.g., in-scope vs out-of-scope). | See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to create and maintain a current inventory of systems, applications and services that are in scope for statutory, regulatory and/ or contractual compliance obligations that provides sufficient detail to determine control applicability, based on asset scope categorization. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to create and maintain a current inventory of systems, applications and services that are in scope for statutory, regulatory and/ or contractual compliance obligations that provides sufficient detail to determine control applicability, based on asset scope categorization. | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 12.5.1
12.5.2.1
A3.2.5 | null | null | null | null | null | null | 12.5.1 | 12.5.1
12.5.2.1 | null | B.1.1.3
| null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | B3.a | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | R-AM-3
R-EX-5
R-GV-1
R-SA-1 | null | null | null | null | null | null | R-AM-3 | null | null | null | null | null | null | null | null | null | R-EX-5 | null | null | R-GV-1 | null | null | null | null | null | null | null | null | null | null | null | R-SA-1 | null | MT-8
MT-9
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | MT-8 | MT-9 | null | null | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Asset Management | Security of Assets & Media | AST-05 | Mechanisms exist to maintain strict control over the internal or external distribution of any kind of sensitive/regulated media. | - ITIL - Configuration Management Database (CMDB)
- Definitive Software Library (DSL) | null | Does the organization maintain strict control over the internal or external distribution of any kind of sensitive/regulated media? | 8 | Identify | null | X | null | There is no evidence of a capability to maintain strict control over the internal or external distribution of any kind of sensitive/regulated media. | Asset Management (AST) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Asset management is informally assigned as an additional duty to existing IT/cybersecurity personnel.
• Asset inventories are performed in an ad hoc manner.
• Software licensing is tracked as part of IT asset inventories.
• Data process owners maintain limited network diagrams to document the flow of sensitive/regulated data that is specific to their initiative.
• IT personnel work with data/process owners to help ensure secure practices are implemented throughout the System Development Lifecycle (SDLC) for all high-value projects. | Asset Management (AST) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Asset management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for asset management.
• Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• Asset management is formally assigned as an additional duty to existing IT/cybersecurity personnel.
• Technology assets are categorized according to data classification and business criticality.
• Inventories cover technology assets in scope for statutory, regulatory and/ or contractual compliance, which includes both physical and virtual assets.
• Software licensing is tracked as part of IT asset inventories.
• Users are educated on their responsibilities to protect technology assets assigned to them or under their supervision.
• IT/cybersecurity personnel maintain network diagrams to document the flow of sensitive/regulated data across the network.
• Data classification and handling criteria govern user behavior for media handling.
• Organizational policies and standards cover media handling requirements. | Asset Management (AST) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• An IT Asset Management (ITAM) function, or similar function, governs asset management to help ensure compliance with requirements for asset management.
• An ITAM function, or similar function, maintains an inventory of IT assets, covering both physical and virtual assets, as well as centrally managed asset ownership assignments.
• Technology assets and data are categorized according to data classification and business criticality criteria.
• A Cybersecurity Supply Chain Risk Management (C-SCRM) function oversees supply chain risks including the removal and prevention of certain technology services and/ or equipment designated as supply chain threats by a statutory or regulatory body.
• Data/process owners document where sensitive/regulated data is stored, transmitted and processed, generating Data Flow Diagrams (DFDs) and network diagrams to document the flow of data.
• Data classification and handling criteria govern user behavior for media handling.
• Organizational policies and standards cover media handling requirements.
• Users are educated on their responsibilities to strictly control sensitive/regulated media (e.g., USBs, mobile devices, external drives, etc.). | Asset Management (AST) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement.
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to maintain strict control over the internal or external distribution of any kind of sensitive/regulated media. | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 11.2.6 | 7.9 | 11.2.6 | null | 6.8.2.6 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | NFO - MP-1 | 3.7.4.a
3.7.4.d
3.7.4.d.1
3.7.4.d.2
3.7.4.d.3 | null | null | null | null | null | null | null | 9.6
9.6.1
9.6.2
9.6.3 | 9.4.4 | 9.4.4 | 9.4.4 | 9.4.4 | 9.4.4 | 9.4.4 | 9.4.4 | 9.4.4 | 9.4.4 | null | D.3 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 2-6-1-4 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0161
1178 | null | null | null | null | null | null | null | null | null | null | 11.2.6 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | null | null | x | R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
R-SA-2 | R-AC-1 | R-AC-2 | R-AC-3 | R-AC-4 | R-AM-1 | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | null | R-EX-4 | R-EX-5 | R-EX-6 | R-EX-7 | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | null | R-IR-1 | R-IR-2 | R-IR-3 | R-IR-4 | R-SA-1 | R-SA-2 | NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | NT-9 | NT-10 | NT-11 | NT-12 | NT-13 | NT-14 | MT-1 | MT-2 | MT-3 | MT-4 | MT-5 | MT-6 | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Asset Management | Management Approval For External Media Transfer | AST-05.1 | Mechanisms exist to obtain management approval for any sensitive / regulated media that is transferred outside of the organization's facilities. | null | null | Does the organization obtain management approval for any sensitive / regulated media that is transferred outside of the organization's facilities? | 8 | Protect | null | X | X | There is no evidence of a capability to obtain management approval for any sensitive / regulated media that is transferred outside of the organization's facilities. | SP-CMM1 is N/A, since a structured process is required to obtain management approval for any sensitive / regulated media that is transferred outside of the organization's facilities. | SP-CMM2 is N/A, since a well-defined process is required to obtain management approval for any sensitive / regulated media that is transferred outside of the organization's facilities. | Asset Management (AST) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• An IT Asset Management (ITAM) function, or similar function, governs asset management to help ensure compliance with requirements for asset management.
• An ITAM function, or similar function, maintains an inventory of IT assets, covering both physical and virtual assets, as well as centrally managed asset ownership assignments.
• Technology assets and data are categorized according to data classification and business criticality criteria.
• A Cybersecurity Supply Chain Risk Management (C-SCRM) function oversees supply chain risks including the removal and prevention of certain technology services and/ or equipment designated as supply chain threats by a statutory or regulatory body.
• Data/process owners document where sensitive/regulated data is stored, transmitted and processed, generating Data Flow Diagrams (DFDs) and network diagrams to document the flow of data.
• Data classification and handling criteria govern user behavior for media handling.
• Organizational policies and standards cover media handling requirements.
• Users are educated on their responsibilities to strictly control sensitive/regulated media (e.g., USBs, mobile devices, external drives, etc.).
• Users are required to obtain management approval for any sensitive/regulated media before it is transferred outside of the organization's facilities. | See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to obtain management approval for any sensitive / regulated media that is transferred outside of the organization's facilities. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to obtain management approval for any sensitive / regulated media that is transferred outside of the organization's facilities. | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 9.4.4 | 9.4.4 | 9.4.4 | 9.4.4 | 9.4.4 | 9.4.4 | 9.4.4 | 9.4.4 | 9.4.4 | null | D.11.2 | 2.5A
2.9 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 2-6-1-5 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1 | R-AC-1 | R-AC-2 | R-AC-3 | R-AC-4 | R-AM-1 | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | null | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | R-EX-6 | R-EX-7 | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | null | R-IR-1 | R-IR-2 | R-IR-3 | R-IR-4 | R-SA-1 | null | NT-1
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-8
MT-9
MT-12
MT-13
MT-14
MT-15 | NT-1 | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | NT-9 | NT-10 | NT-11 | NT-12 | NT-13 | NT-14 | null | null | null | null | null | null | null | MT-8 | MT-9 | null | null | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Asset Management | Unattended End-User Equipment | AST-06 | Mechanisms exist to implement enhanced protection measures for unattended systems to protect against tampering and unauthorized access. | - CimTrak Integrity Suite (https://www.cimcor.com/cimtrak/)
- File Integrity Monitoring (FIM)
- Lockable casings
- Tamper detection tape
- Full Disk Encryption (FDE)
- NNT Change Tracker (https://www.newnettechnologies.com) | null | Does the organization implement enhanced protection measures for unattended systems to protect against tampering and unauthorized access? | 9 | Protect | null | X | null | There is no evidence of a capability to implement enhanced protection measures for unattended systems to protect against tampering and unauthorized access. | Asset Management (AST) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Asset management is informally assigned as an additional duty to existing IT/cybersecurity personnel.
• Asset inventories are performed in an ad hoc manner.
• Software licensing is tracked as part of IT asset inventories.
• Data process owners maintain limited network diagrams to document the flow of sensitive/regulated data that is specific to their initiative.
• IT personnel work with data/process owners to help ensure secure practices are implemented throughout the System Development Lifecycle (SDLC) for all high-value projects. | Asset Management (AST) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Asset management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for asset management.
• Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• Asset management is formally assigned as an additional duty to existing IT/cybersecurity personnel.
• Technology assets are categorized according to data classification and business criticality.
• Inventories cover technology assets in scope for statutory, regulatory and/ or contractual compliance, which includes both physical and virtual assets.
• Software licensing is tracked as part of IT asset inventories.
• Users are educated on their responsibilities to protect technology assets assigned to them or under their supervision.
• IT/cybersecurity personnel maintain network diagrams to document the flow of sensitive/regulated data across the network.
• Hardened system configurations are used for unattended systems to enforce the principle of least functionality by removing unnecessary accounts, applications and services. | Asset Management (AST) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• An IT Asset Management (ITAM) function, or similar function, governs asset management to help ensure compliance with requirements for asset management.
• An ITAM function, or similar function, maintains an inventory of IT assets, covering both physical and virtual assets, as well as centrally managed asset ownership assignments.
• Technology assets and data are categorized according to data classification and business criticality criteria.
• A Cybersecurity Supply Chain Risk Management (C-SCRM) function oversees supply chain risks including the removal and prevention of certain technology services and/ or equipment designated as supply chain threats by a statutory or regulatory body.
• Data/process owners document where sensitive/regulated data is stored, transmitted and processed, generating Data Flow Diagrams (DFDs) and network diagrams to document the flow of data.
• Hardened system configurations are used for unattended systems to enforce the principle of least functionality by removing unnecessary accounts, applications and services.
• File Integrity Monitoring (FIM) is deployed on systems and unattended systems that store, process or transmit sensitive/regulated data to monitor the integrity of business-critical files to detect tampering.
• Host-based Intrusion Prevention System (HIPS) is deployed on both systems and unattended systems to identify and block hostile activities. | See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to implement enhanced protection measures for unattended systems to protect against tampering and unauthorized access. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to implement enhanced protection measures for unattended systems to protect against tampering and unauthorized access. | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 11.2.6
11.2.8 | 7.9
8.1 | 11.2.6
11.2.8 | null | 6.8.2.8 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 9.5
9.5.1 | null | null | 9.5
9.5.1 | 9.5
9.5.1 | 9.5
9.5.1 | null | 9.5
9.5.1 | 9.5
9.5.1 | 9.5.1 | M.3.10 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 8.3.2 [MP.EQ.2] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0161 | null | null | null | null | null | null | null | null | null | null | 11.2.6
11.2.8 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | null | null | x | R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1 | R-AC-1 | R-AC-2 | R-AC-3 | R-AC-4 | R-AM-1 | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | null | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | R-EX-6 | R-EX-7 | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | null | R-IR-1 | R-IR-2 | R-IR-3 | R-IR-4 | R-SA-1 | null | NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | NT-9 | NT-10 | NT-11 | NT-12 | NT-13 | NT-14 | MT-1 | MT-2 | MT-3 | MT-4 | MT-5 | MT-6 | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Asset Management | Asset Storage In Automobiles | AST-06.1 | Mechanisms exist to educate users on the need to physically secure laptops and other mobile devices out of site when traveling, preferably in the trunk of a vehicle. | - Security awareness training
- Gamification | null | Does the organization educate users on the need to physically secure laptops and other mobile devices out of site when traveling, preferably in the trunk of a vehicle? | 7 | Protect | null | X | null | There is no evidence of a capability to educate users on the need to physically secure laptops and other mobile devices out of site when traveling, preferably in the trunk of a vehicle. | Asset Management (AST) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Asset management is informally assigned as an additional duty to existing IT/cybersecurity personnel.
• Asset inventories are performed in an ad hoc manner.
• Software licensing is tracked as part of IT asset inventories.
• Data process owners maintain limited network diagrams to document the flow of sensitive/regulated data that is specific to their initiative.
• IT personnel work with data/process owners to help ensure secure practices are implemented throughout the System Development Lifecycle (SDLC) for all high-value projects. | Asset Management (AST) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Asset management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for asset management.
• Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• Asset management is formally assigned as an additional duty to existing IT/cybersecurity personnel.
• Technology assets are categorized according to data classification and business criticality.
• Inventories cover technology assets in scope for statutory, regulatory and/ or contractual compliance, which includes both physical and virtual assets.
• Software licensing is tracked as part of IT asset inventories.
• Users are educated on their responsibilities to protect technology assets assigned to them or under their supervision.
• IT/cybersecurity personnel maintain network diagrams to document the flow of sensitive/regulated data across the network.
• Security awareness training covers recommended practices for securing laptops and mobile devices while traveling. | Asset Management (AST) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• An IT Asset Management (ITAM) function, or similar function, governs asset management to help ensure compliance with requirements for asset management.
• An ITAM function, or similar function, maintains an inventory of IT assets, covering both physical and virtual assets, as well as centrally managed asset ownership assignments.
• Technology assets and data are categorized according to data classification and business criticality criteria.
• A Cybersecurity Supply Chain Risk Management (C-SCRM) function oversees supply chain risks including the removal and prevention of certain technology services and/ or equipment designated as supply chain threats by a statutory or regulatory body.
• Data/process owners document where sensitive/regulated data is stored, transmitted and processed, generating Data Flow Diagrams (DFDs) and network diagrams to document the flow of data.
• Security awareness training covers recommended practices for securing laptops and mobile devices while traveling. | See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to educate users on the need to physically secure laptops and other mobile devices out of site when traveling, preferably in the trunk of a vehicle. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to educate users on the need to physically secure laptops and other mobile devices out of site when traveling, preferably in the trunk of a vehicle. | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | M.3.4.7.2 | null | 8.3.1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | AM-02 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | R-AC-1
R-AC-2
R-AC-4
R-AM-1
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-5
R-EX-1
R-EX-2
R-EX-4
R-EX-7
R-GV-1
R-GV-2
R-GV-4
R-GV-5
R-IR-4 | R-AC-1 | R-AC-2 | null | R-AC-4 | R-AM-1 | null | R-AM-3 | R-BC-1 | R-BC-2 | R-BC-3 | null | R-BC-5 | R-EX-1 | R-EX-2 | null | R-EX-4 | null | null | R-EX-7 | R-GV-1 | R-GV-2 | null | R-GV-4 | R-GV-5 | null | null | null | null | null | null | R-IR-4 | null | null | NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | NT-9 | NT-10 | NT-11 | NT-12 | NT-13 | NT-14 | MT-1 | MT-2 | MT-3 | MT-4 | MT-5 | MT-6 | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Asset Management | Kiosks & Point of Interaction (PoI) Devices | AST-07 | Mechanisms exist to appropriately protect devices that capture sensitive/regulated data via direct physical interaction from tampering and substitution. | - CimTrak Integrity Suite (https://www.cimcor.com/cimtrak/)
- File Integrity Monitoring (FIM)
- Lockable casings
- Tamper detection tape
- Chip & PIN | null | Does the organization appropriately protect devices that capture sensitive/regulated data via direct physical interaction from tampering and substitution? | 8 | Protect | null | X | X | There is no evidence of a capability to appropriately protect devices that capture sensitive/regulated data via direct physical interaction from tampering and substitution. | Asset Management (AST) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Asset management is informally assigned as an additional duty to existing IT/cybersecurity personnel.
• Asset inventories are performed in an ad hoc manner.
• Software licensing is tracked as part of IT asset inventories.
• Data process owners maintain limited network diagrams to document the flow of sensitive/regulated data that is specific to their initiative.
• IT personnel work with data/process owners to help ensure secure practices are implemented throughout the System Development Lifecycle (SDLC) for all high-value projects. | Asset Management (AST) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Asset management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for asset management.
• Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• Asset management is formally assigned as an additional duty to existing IT/cybersecurity personnel.
• Technology assets are categorized according to data classification and business criticality.
• Inventories cover technology assets in scope for statutory, regulatory and/ or contractual compliance, which includes both physical and virtual assets.
• Software licensing is tracked as part of IT asset inventories.
• Users are educated on their responsibilities to protect technology assets assigned to them or under their supervision.
• IT/cybersecurity personnel maintain network diagrams to document the flow of sensitive/regulated data across the network.
• Hardened system configurations are used for unattended systems to enforce the principle of least functionality by removing unnecessary accounts, applications and services.
• Periodic physical inspections are performed to validate the integrity of unattended systems (e.g., kiosks, ATMs, etc.) and Point of Sale (POS) devices.
• Organizational policies and standards cover Enhanced security requirements for unattended systems (e.g., kiosks, ATMs, etc.) and POS devices. | Asset Management (AST) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• An IT Asset Management (ITAM) function, or similar function, governs asset management to help ensure compliance with requirements for asset management.
• An ITAM function, or similar function, maintains an inventory of IT assets, covering both physical and virtual assets, as well as centrally managed asset ownership assignments.
• Technology assets and data are categorized according to data classification and business criticality criteria.
• A Cybersecurity Supply Chain Risk Management (C-SCRM) function oversees supply chain risks including the removal and prevention of certain technology services and/ or equipment designated as supply chain threats by a statutory or regulatory body.
• Data/process owners document where sensitive/regulated data is stored, transmitted and processed, generating Data Flow Diagrams (DFDs) and network diagrams to document the flow of data.
• Hardened system configurations are used for unattended systems to enforce the principle of least functionality by removing unnecessary accounts, applications and services.
• Periodic physical inspections are performed to validate the integrity of unattended systems (e.g., kiosks, ATMs, etc.) and Point of Sale (POS) devices.
• Organizational policies and standards cover Enhanced security requirements for unattended systems (e.g., kiosks, ATMs, etc.) and POS devices.
• Periodic physical and local inspections are performed to validate the integrity of unattended systems (e.g., kiosks, ATMs, etc.), sensitive/regulated systems and Point of Sale (POS) devices.
• File Integrity Monitoring (FIM) is deployed on systems and unattended systems that store, process or transmit sensitive/regulated data to monitor the integrity of business-critical files to detect tampering.
• Host-based Intrusion Prevention System (HIPS) is deployed on both systems and unattended systems to identify and block hostile activities. | See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to appropriately protect devices that capture sensitive/regulated data via direct physical interaction from tampering and substitution. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to appropriately protect devices that capture sensitive/regulated data via direct physical interaction from tampering and substitution. | null | null | null | null | null | null | null | null | null | null | PHY-01 | null | null | null | null | null | null | null | 11.2.8 | 8.1 | 11.2.8 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 9.9
9.9.1
9.9.2
9.9.3 | 9.5
9.5.1
9.5.1.1
9.5.1.2 | null | null | 9.5.1
9.5.1.1
9.5.1.2 | 9.5.1
9.5.1.1
9.5.1.2 | 9.5.1
9.5.1.1
9.5.1.2 | null | 9.5.1
9.5.1.1
9.5.1.2 | 9.5.1
9.5.1.1
9.5.1.2 | 9.5.1
9.5.1.1
9.5.1.2 | M.3.24 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 3.3.12 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 11.2.8 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1 | R-AC-1 | R-AC-2 | R-AC-3 | R-AC-4 | R-AM-1 | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | null | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | R-EX-6 | R-EX-7 | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | null | R-IR-1 | R-IR-2 | R-IR-3 | R-IR-4 | R-SA-1 | null | NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | NT-9 | NT-10 | NT-11 | NT-12 | NT-13 | NT-14 | MT-1 | MT-2 | MT-3 | MT-4 | MT-5 | MT-6 | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Asset Management | Tamper Detection | AST-08 | Mechanisms exist to periodically inspect systems and system components for Indicators of Compromise (IoC). | - "Burner" phones & laptops
- Tamper tape | null | Does the organization periodically inspect systems and system components for Indicators of Compromise (IoC)? | 9 | Detect | null | X | null | There is no evidence of a capability to periodically inspect systems and system components for Indicators of Compromise (IoC). | Asset Management (AST) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Asset management is informally assigned as an additional duty to existing IT/cybersecurity personnel.
• Asset inventories are performed in an ad hoc manner.
• Software licensing is tracked as part of IT asset inventories.
• Data process owners maintain limited network diagrams to document the flow of sensitive/regulated data that is specific to their initiative.
• IT personnel work with data/process owners to help ensure secure practices are implemented throughout the System Development Lifecycle (SDLC) for all high-value projects.
• Security awareness training covers reporting of unauthorized alterations and evidence of tampering of technology assets. | Asset Management (AST) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Asset management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for asset management.
• Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• Asset management is formally assigned as an additional duty to existing IT/cybersecurity personnel.
• Technology assets are categorized according to data classification and business criticality.
• Inventories cover technology assets in scope for statutory, regulatory and/ or contractual compliance, which includes both physical and virtual assets.
• Software licensing is tracked as part of IT asset inventories.
• Users are educated on their responsibilities to protect technology assets assigned to them or under their supervision.
• IT/cybersecurity personnel maintain network diagrams to document the flow of sensitive/regulated data across the network.
• Security awareness training covers reporting of unauthorized alterations and evidence of tampering of equipment | Asset Management (AST) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• An IT Asset Management (ITAM) function, or similar function, governs asset management to help ensure compliance with requirements for asset management.
• An ITAM function, or similar function, maintains an inventory of IT assets, covering both physical and virtual assets, as well as centrally managed asset ownership assignments.
• Technology assets and data are categorized according to data classification and business criticality criteria.
• A Cybersecurity Supply Chain Risk Management (C-SCRM) function oversees supply chain risks including the removal and prevention of certain technology services and/ or equipment designated as supply chain threats by a statutory or regulatory body.
• Data/process owners document where sensitive/regulated data is stored, transmitted and processed, generating Data Flow Diagrams (DFDs) and network diagrams to document the flow of data.
• Security awareness training covers reporting of unauthorized alterations and evidence of tampering of equipment | Asset Management (AST) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement.
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to periodically inspect systems and system components for Indicators of Compromise (IoC). | null | null | null | null | null | null | null | null | null | null | PHY-01 | null | null | CR 3.11 (7.13)
EDR 3.11 (13.6.1)
EDR 3.11 (13.6.3(1))
HDR 3.11 (14.6.1)
HDR 3.11 (14.6.3(1))
NDR 3.11 (15.8.1)
NDR 3.11 (15.8.3(1)) | null | null | null | null | 11.2.6 | 7.9 | 11.2.6 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 9.5.1.2
9.5.1.2.1 | null | null | 9.5.1.2 | 9.5.1.2 | 9.5.1.2 | null | 9.5.1.2
9.5.1.2.1 | 9.5.1.2
9.5.1.2.1 | 9.5.1.2 | M.3.4.8.4 | null | null | null | null | null | null | null | null | 5.13.1.2.1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 11.2.6 | null | null | 8.5.3.C.01
8.5.3.C.02
8.5.3.C.03
8.5.3.C.04
8.5.4.C.01
8.5.4.C.02
8.5.4.C.03
8.5.5.C.01 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1 | R-AC-1 | R-AC-2 | R-AC-3 | R-AC-4 | R-AM-1 | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | null | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | R-EX-6 | R-EX-7 | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | null | R-IR-1 | R-IR-2 | R-IR-3 | R-IR-4 | R-SA-1 | null | NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | NT-9 | NT-10 | NT-11 | NT-12 | NT-13 | NT-14 | MT-1 | MT-2 | MT-3 | MT-4 | MT-5 | MT-6 | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Asset Management | Secure Disposal, Destruction or Re-Use of Equipment | AST-09 | Mechanisms exist to securely dispose of, destroy or repurpose system components using organization-defined techniques and methods to prevent information being recovered from these components. | - Shred-it
- Iron Mountain
- sdelete (sysinternals)
- Bootnukem | E-AST-03 | Does the organization securely dispose of, destroy or repurpose system components using organization-defined techniques and methods to prevent information being recovered from these components? | 10 | Identify | null | X | X | There is no evidence of a capability to securely dispose of, destroy or repurpose system components using organization-defined techniques and methods to prevent information being recovered from these components. | Asset Management (AST) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Asset management is informally assigned as an additional duty to existing IT/cybersecurity personnel.
• Asset inventories are performed in an ad hoc manner.
• Software licensing is tracked as part of IT asset inventories.
• Data process owners maintain limited network diagrams to document the flow of sensitive/regulated data that is specific to their initiative.
• IT personnel work with data/process owners to help ensure secure practices are implemented throughout the System Development Lifecycle (SDLC) for all high-value projects. | Asset Management (AST) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Asset management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for asset management.
• Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• Asset management is formally assigned as an additional duty to existing IT/cybersecurity personnel.
• Technology assets are categorized according to data classification and business criticality.
• Inventories cover technology assets in scope for statutory, regulatory and/ or contractual compliance, which includes both physical and virtual assets.
• Software licensing is tracked as part of IT asset inventories.
• Users are educated on their responsibilities to protect technology assets assigned to them or under their supervision.
• IT/cybersecurity personnel maintain network diagrams to document the flow of sensitive/regulated data across the network.
• IT personnel collect technology assets and media for destruction when it is no longer needed for business or legal reasons.
• IT personnel perform the destruction of technology assets and media in a secure manner or outsource the destruction to a third-party that specializes in technology assets and media destruction, as well as provides evidence of destruction (e.g., certificate of destruction).
• Devices are escrowed in storage for a period of time before being wiped and reissued, in case data on the devices are needed for investigations or business purposes. | Asset Management (AST) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• An IT Asset Management (ITAM) function, or similar function, governs asset management to help ensure compliance with requirements for asset management.
• An ITAM function, or similar function, maintains an inventory of IT assets, covering both physical and virtual assets, as well as centrally managed asset ownership assignments.
• Technology assets and data are categorized according to data classification and business criticality criteria.
• A Cybersecurity Supply Chain Risk Management (C-SCRM) function oversees supply chain risks including the removal and prevention of certain technology services and/ or equipment designated as supply chain threats by a statutory or regulatory body.
• Data/process owners document where sensitive/regulated data is stored, transmitted and processed, generating Data Flow Diagrams (DFDs) and network diagrams to document the flow of data.
• IT personnel perform the destruction of technology assets and media in a secure manner or outsource the destruction to a third-party that specializes in technology assets and media destruction, as well as provides evidence of destruction (e.g., certificate of destruction).
• Organizational standards exist for users to dispose of, destroy or repurpose system components when it is no longer needed for business or legal reasons.
• Third-party providers ensure world-wide coverage to securely dispose of, destroy or repurpose system components using organization-defined techniques and methods to prevent such components from entering the gray market.
• Devices are escrowed in storage for a period of time before being wiped and reissued, in case data on the devices are needed for investigations or business purposes. | See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to securely dispose of, destroy or repurpose system components using organization-defined techniques and methods to prevent information being recovered from these components. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to securely dispose of, destroy or repurpose system components using organization-defined techniques and methods to prevent information being recovered from these components. | CC6.5 | CC6.5-POF2
C1.2-POF2
P4.3-POF2
P4.3-POF3 | null | 3.5 | 3.5 | 3.5 | 3.5 | null | null | DSP-02 | POL-04 | null | null | null | null | null | null | null | 11.2.7 | 7.14
8.10 | 11.2.7 | null | 6.8.2.7
7.4.8 | null | null | null | null | null | null | GOVERN 1.7 | null | null | M-7 | null | SA-19(3) | null | null | null | SR-12 | null | SR-12 | SR-12 | SR-12 | null | null | SR-12 | SR-12 | SR-12 | 3.4.14 | SR-12 | SR-12 | null | null | SR-12 | SR-12 | null | 3.7.4.d
3.7.4.d.1
3.7.4.d.2
3.7.4.d.3
3.8.3 | null | null | null | null | PR.DS-3 | null | null | 9.8
9.8.1
9.8.2 | 9.4.7 | null | null | null | null | null | null | 9.4.7 | 9.4.7 | null | D.4.3 | null | null | null | null | null | ASSET-2.H.MIL3 | null | null | null | null | null | null | MP.L1-b.1.vii | null | null | null | null | null | null | 52.204-21(b)(1)(vii) | null | null | null | null | null | null | null | null | SR-12 | SR-12 | SR-12 | SR-12 | SR-12 | null | null | null | null | 314.4(c)(6)(i) | 164.310(d)(2)(i)
164.310(d)(2)(ii) | 5.S.C | 5.M.D | 5.M.D
5.L.A
9.L.C | null | null | null | null | 10.3
10.4
18.5
19.5 | null | null | null | null | 5.8 | null | null | null | null | 45.48.500
45.48.510 | null | null | null | null | null | null | null | null | null | null | null | null | null | Sec. 521.052(b) | null | SR-12 | null | null | null | null | null | null | null | null | null | null | Art 24 | null | null | null | null | null | null | null | null | null | AM-04
PI-03 | null | null | null | 15.4
17.21 | null | null | null | null | null | null | null | null | null | null | null | null | TPC-19
TPC-66 | 3.3.11 | 2-14-3-4 | 2-6-1-3 | null | null | null | null | 8.5.5 [MP.SI.5] | null | null | null | null | A3.a
B3.a | null | null | null | null | null | null | null | null | null | 0311
0312
0315
0317
0318
0350
0363
1076
1217
1218
1219
1220
1221
1222
1223
1225
1226
1534
1550
1741
1742
0321
1722
1723
1724
1725
1726
1727
1728
1729
1641 | null | null | null | null | null | null | null | null | null | null | 11.2.7
11.2.7.4.PB | null | null | 11.2.13.C.01
11.2.13.C.02
11.7.35.C.01
12.6.4.C.01
12.6.4.C.02
12.6.5.C.01
12.6.5.C.02
12.6.5.C.03
12.6.5.C.04
12.6.5.C.05
12.6.8.C.01
12.6.9.C.01
12.6.10.C.01
13.4.19.C.02
13.4.10.C.01
13.5.24.C.01
13.5.24.C.02
13.5.24.C.03
13.5.24.C.04
13.5.25.C.01
13.5.26.C.01
13.5.26.C.02
13.5.26.C.03
13.5.29.C.01
13.5.29.C.02
13.5.30.C.01
13.6.6.C.01
13.6.6.C.02
13.6.7.C.01
13.6.8.C.01
13.6.9.C.01
13.6.10.C.01
13.6.10.C.02
13.6.10.C.03
13.6.11.C.01
13.6.12.C.01 | null | null | null | null | 11.1.7 | null | null | null | null | null | null | null | null | 2.2.4 | null | null | null | null | null | null | null | null | null | null | x | FAR 52.204-21 | x | null | R-AC-1
R-AC-2
R-AC-4
R-AM-1
R-AM-3
R-BC-1
R-BC-2
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-7
R-GV-1
R-GV-2
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-IR-1
R-IR-4 | R-AC-1 | R-AC-2 | null | R-AC-4 | R-AM-1 | null | R-AM-3 | R-BC-1 | R-BC-2 | null | null | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | R-EX-7 | R-GV-1 | R-GV-2 | null | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | null | R-IR-1 | null | null | R-IR-4 | null | null | NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | NT-9 | NT-10 | NT-11 | NT-12 | NT-13 | NT-14 | MT-1 | MT-2 | MT-3 | MT-4 | MT-5 | MT-6 | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Asset Management | Return of Assets | AST-10 | Mechanisms exist to ensure that employees and third-party users return all organizational assets in their possession upon termination of employment, contract or agreement. | - Termination checklist
- Manual Process
- Native OS and Device Asset Tracking capabilities | E-AST-01 | Does the organization ensure that employees and third-party users return all organizational assets in their possession upon termination of employment, contract or agreement? | 8 | Protect | null | X | null | There is no evidence of a capability to ensure that employees and third-party users return all organizational assets in their possession up on termination of employment, contract or agreement. | Asset Management (AST) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Asset management is informally assigned as an additional duty to existing IT/cybersecurity personnel.
• Asset inventories are performed in an ad hoc manner.
• Software licensing is tracked as part of IT asset inventories.
• Data process owners maintain limited network diagrams to document the flow of sensitive/regulated data that is specific to their initiative.
• IT personnel work with data/process owners to help ensure secure practices are implemented throughout the System Development Lifecycle (SDLC) for all high-value projects.
• Supervisors for users leaving the company collect assets and return those assets to IT personnel. | Asset Management (AST) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Asset management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for asset management.
• Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• Asset management is formally assigned as an additional duty to existing IT/cybersecurity personnel.
• Technology assets are categorized according to data classification and business criticality.
• Inventories cover technology assets in scope for statutory, regulatory and/ or contractual compliance, which includes both physical and virtual assets.
• Software licensing is tracked as part of IT asset inventories.
• Users are educated on their responsibilities to protect technology assets assigned to them or under their supervision.
• IT/cybersecurity personnel maintain network diagrams to document the flow of sensitive/regulated data across the network.
• Supervisors for users leaving the company should collect assets and return the assets to IT personnel.
• Assets not returned are reported as a security incident, based on the data that may exist on the device(s).
• Devices are escrowed in storage for a period of time before being wiped and reissued, in case data on the devices are needed for investigations or business purposes. | Asset Management (AST) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• An IT Asset Management (ITAM) function, or similar function, governs asset management to help ensure compliance with requirements for asset management.
• An ITAM function, or similar function, maintains an inventory of IT assets, covering both physical and virtual assets, as well as centrally managed asset ownership assignments.
• Technology assets and data are categorized according to data classification and business criticality criteria.
• A Cybersecurity Supply Chain Risk Management (C-SCRM) function oversees supply chain risks including the removal and prevention of certain technology services and/ or equipment designated as supply chain threats by a statutory or regulatory body.
• Data/process owners document where sensitive/regulated data is stored, transmitted and processed, generating Data Flow Diagrams (DFDs) and network diagrams to document the flow of data.
• Supervisors for users leaving the company should collect assets and return the assets to IT personnel.
• Assets not returned by users leaving the organization are reported as a security incident, based on the data that may exist on the device(s).
• Devices are escrowed in storage for a period of time before being wiped and reissued, in case data on the devices are needed for investigations or business purposes. | Asset Management (AST) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement.
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to ensure that employees and third-party users return all organizational assets in their possession up on termination of employment, contract or agreement. | null | null | null | null | null | null | null | null | null | HRS-05 | null | null | null | null | null | null | null | null | 8.1.4 | 5.11 | 8.1.4
CLD.8.1.5 | null | 6.5.1.4 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | A.03.09.02.a.03 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | D.26 | null | 5.3.3 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | AM-04
AM-05 | null | null | null | 11.12 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 8.1.4
8.1.5.P | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | null | null | null | R-AC-1
R-AC-2
R-AC-4
R-AM-1
R-AM-3
R-BC-5
R-EX-1
R-EX-2
R-EX-4
R-EX-5
R-EX-7
R-GV-1
R-GV-2
R-GV-4
R-GV-5
R-IR-1
R-IR-4 | R-AC-1 | R-AC-2 | null | R-AC-4 | R-AM-1 | null | R-AM-3 | null | null | null | null | R-BC-5 | R-EX-1 | R-EX-2 | null | R-EX-4 | R-EX-5 | null | R-EX-7 | R-GV-1 | R-GV-2 | null | R-GV-4 | R-GV-5 | null | null | null | R-IR-1 | null | null | R-IR-4 | null | null | NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | NT-9 | NT-10 | NT-11 | NT-12 | NT-13 | NT-14 | MT-1 | MT-2 | MT-3 | MT-4 | MT-5 | MT-6 | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Asset Management | Removal of Assets | AST-11 | Mechanisms exist to authorize, control and track technology assets entering and exiting organizational facilities. | - RFID asset tagging
- RFID proximity sensors at access points
- Asset management software | null | Does the organization authorize, control and track technology assets entering and exiting organizational facilities? | 8 | Protect | null | X | null | There is no evidence of a capability to authorize, control and track technology assets entering and exiting organizational facilities. | Asset Management (AST) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Asset management is informally assigned as an additional duty to existing IT/cybersecurity personnel.
• Asset inventories are performed in an ad hoc manner.
• Software licensing is tracked as part of IT asset inventories.
• Data process owners maintain limited network diagrams to document the flow of sensitive/regulated data that is specific to their initiative.
• IT personnel work with data/process owners to help ensure secure practices are implemented throughout the System Development Lifecycle (SDLC) for all high-value projects. | Asset Management (AST) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Asset management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for asset management.
• Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• Asset management is formally assigned as an additional duty to existing IT/cybersecurity personnel.
• Technology assets are categorized according to data classification and business criticality.
• Inventories cover technology assets in scope for statutory, regulatory and/ or contractual compliance, which includes both physical and virtual assets.
• Software licensing is tracked as part of IT asset inventories.
• Users are educated on their responsibilities to protect technology assets assigned to them or under their supervision.
• IT/cybersecurity personnel maintain network diagrams to document the flow of sensitive/regulated data across the network.
• Users are trained and encouraged to stop and question anyone attempting to install or remove IT assets from facilities.
| Asset Management (AST) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• An IT Asset Management (ITAM) function, or similar function, governs asset management to help ensure compliance with requirements for asset management.
• An ITAM function, or similar function, maintains an inventory of IT assets, covering both physical and virtual assets, as well as centrally managed asset ownership assignments.
• Technology assets and data are categorized according to data classification and business criticality criteria.
• A Cybersecurity Supply Chain Risk Management (C-SCRM) function oversees supply chain risks including the removal and prevention of certain technology services and/ or equipment designated as supply chain threats by a statutory or regulatory body.
• Data/process owners document where sensitive/regulated data is stored, transmitted and processed, generating Data Flow Diagrams (DFDs) and network diagrams to document the flow of data.
• Physical entry points to facilities are monitored or staffed to identify personnel who bring in or remove IT assets into facilities.
• Users are trained and encouraged to stop and question anyone attempting to install or remove IT assets from facilities. | Asset Management (AST) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement.
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to authorize, control and track technology assets entering and exiting organizational facilities. | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 11.2.5 | 7.10 | 11.2.5 | null | 6.8.2.5 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | PR.DS-3 | null | null | null | null | null | null | null | null | null | null | null | null | null | F.11.3 | null | 5.3.3 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | D1.G.IT.E.3
D1.G.IT.E.2 | null | null | null | 164.310(d)(1)
164.310(d)(2) | 5.S.C | 5.M.D | 5.M.D
5.L.A | null | null | null | null | null | null | null | null | null | 5.8 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 622(2)(d)(C)(ii) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 11.2.5 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | OR 6464A | null | null | R-AC-1
R-AC-2
R-AC-4
R-AM-1
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-7
R-GV-1
R-GV-2
R-GV-4
R-GV-5
R-IR-1
R-IR-4 | R-AC-1 | R-AC-2 | null | R-AC-4 | R-AM-1 | null | R-AM-3 | R-BC-1 | R-BC-2 | R-BC-3 | null | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | R-EX-7 | R-GV-1 | R-GV-2 | null | R-GV-4 | R-GV-5 | null | null | null | R-IR-1 | null | null | R-IR-4 | null | null | NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | NT-9 | NT-10 | NT-11 | NT-12 | NT-13 | NT-14 | MT-1 | MT-2 | MT-3 | MT-4 | MT-5 | MT-6 | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Asset Management | Use of Personal Devices | AST-12 | Mechanisms exist to restrict the possession and usage of personally-owned technology devices within organization-controlled facilities. | - BYOD policy | null | Does the organization restrict the possession and usage of personally-owned technology devices within organization-controlled facilities? | 10 | Protect | null | X | null | There is no evidence of a capability to restrict the possession and usage of personally-owned technology devices within organization-controlled facilities. | Asset Management (AST) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Asset management is informally assigned as an additional duty to existing IT/cybersecurity personnel.
• Asset inventories are performed in an ad hoc manner.
• Software licensing is tracked as part of IT asset inventories.
• Data process owners maintain limited network diagrams to document the flow of sensitive/regulated data that is specific to their initiative.
• IT personnel work with data/process owners to help ensure secure practices are implemented throughout the System Development Lifecycle (SDLC) for all high-value projects. | Asset Management (AST) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Asset management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for asset management.
• Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• Asset management is formally assigned as an additional duty to existing IT/cybersecurity personnel.
• Technology assets are categorized according to data classification and business criticality.
• Inventories cover technology assets in scope for statutory, regulatory and/ or contractual compliance, which includes both physical and virtual assets.
• Software licensing is tracked as part of IT asset inventories.
• Users are educated on their responsibilities to protect technology assets assigned to them or under their supervision.
• IT/cybersecurity personnel maintain network diagrams to document the flow of sensitive/regulated data across the network.
• Organizational policies and standards cover the use of personal devices (e.g., Bring Your Own Device (BYOD), as part of acceptable and unacceptable behaviors. | Asset Management (AST) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• An IT Asset Management (ITAM) function, or similar function, governs asset management to help ensure compliance with requirements for asset management.
• An ITAM function, or similar function, maintains an inventory of IT assets, covering both physical and virtual assets, as well as centrally managed asset ownership assignments.
• Technology assets and data are categorized according to data classification and business criticality criteria.
• A Cybersecurity Supply Chain Risk Management (C-SCRM) function oversees supply chain risks including the removal and prevention of certain technology services and/ or equipment designated as supply chain threats by a statutory or regulatory body.
• Data/process owners document where sensitive/regulated data is stored, transmitted and processed, generating Data Flow Diagrams (DFDs) and network diagrams to document the flow of data.
• Organizational policies and standards cover the use of personal devices (e.g., Bring Your Own Device (BYOD), as part of acceptable and unacceptable behaviors.
• Mobile Device Management (MDM) software is used to restrict sensitive data from residing on personal devices. | Asset Management (AST) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement.
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to restrict the possession and usage of personally-owned technology devices within organization-controlled facilities. | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 7.10
8.1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 3.1.18.a
3.1.18.b
3.1.18.c | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | M.3.26 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 10.7 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 12.6 | null | null | null | null | null | null | null | null | null | null | null | null | TPC-84 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | null | null | null | R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
R-SA-2 | R-AC-1 | R-AC-2 | R-AC-3 | R-AC-4 | R-AM-1 | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | R-EX-6 | R-EX-7 | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | R-GV-8 | R-IR-1 | R-IR-2 | R-IR-3 | R-IR-4 | R-SA-1 | R-SA-2 | NT-1
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | NT-1 | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | NT-9 | NT-10 | NT-11 | NT-12 | NT-13 | NT-14 | MT-1 | MT-2 | MT-3 | MT-4 | MT-5 | MT-6 | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Asset Management | Use of Third-Party Devices | AST-13 | Mechanisms exist to reduce the risk associated with third-party assets that are attached to the network from harming organizational assets or exfiltrating organizational data. | - NAC
- Separate SSIDs for wireless networks
- SIEM monitoring/alerting
- Manual process to disable network all unused ports
- Network Access Control (NAC)
- Mobile Device Management (MDM) software
- Data Loss Prevention (DLP) | null | Does the organization reduce the risk associated with third-party assets that are attached to the network from harming organizational assets or exfiltrating organizational data? | 9 | Protect | null | X | null | There is no evidence of a capability to reduce the risk associated with third-party assets that are attached to the network from harming organizational assets or exfiltrating organizational data. | Asset Management (AST) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Asset management is informally assigned as an additional duty to existing IT/cybersecurity personnel.
• Asset inventories are performed in an ad hoc manner.
• Software licensing is tracked as part of IT asset inventories.
• Data process owners maintain limited network diagrams to document the flow of sensitive/regulated data that is specific to their initiative.
• IT personnel work with data/process owners to help ensure secure practices are implemented throughout the System Development Lifecycle (SDLC) for all high-value projects. | Asset Management (AST) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Asset management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for asset management.
• Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• Asset management is formally assigned as an additional duty to existing IT/cybersecurity personnel.
• Technology assets are categorized according to data classification and business criticality.
• Inventories cover technology assets in scope for statutory, regulatory and/ or contractual compliance, which includes both physical and virtual assets.
• Software licensing is tracked as part of IT asset inventories.
• Users are educated on their responsibilities to protect technology assets assigned to them or under their supervision.
• IT/cybersecurity personnel maintain network diagrams to document the flow of sensitive/regulated data across the network. | Asset Management (AST) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• An IT Asset Management (ITAM) function, or similar function, governs asset management to help ensure compliance with requirements for asset management.
• An ITAM function, or similar function, maintains an inventory of IT assets, covering both physical and virtual assets, as well as centrally managed asset ownership assignments.
• Technology assets and data are categorized according to data classification and business criticality criteria.
• A Cybersecurity Supply Chain Risk Management (C-SCRM) function oversees supply chain risks including the removal and prevention of certain technology services and/ or equipment designated as supply chain threats by a statutory or regulatory body.
• Data/process owners document where sensitive/regulated data is stored, transmitted and processed, generating Data Flow Diagrams (DFDs) and network diagrams to document the flow of data.
• Organizational policies and standards cover the use of third-party devices, as part of acceptable and unacceptable behaviors. | Asset Management (AST) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement.
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to reduce the risk associated with third-party assets that are attached to the network from harming organizational assets or exfiltrating organizational data. | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 3.1.18.a
3.1.18.b
3.1.18.c | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | N.2.4 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 10.7 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 12.6 | null | null | null | null | null | null | null | null | null | null | null | null | TPC-84 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 16.2.3.C.01
16.2.3.C.02 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
R-SA-2 | R-AC-1 | R-AC-2 | R-AC-3 | R-AC-4 | R-AM-1 | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | R-EX-6 | R-EX-7 | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | R-GV-8 | R-IR-1 | R-IR-2 | R-IR-3 | R-IR-4 | R-SA-1 | R-SA-2 | NT-7
MT-1
MT-2
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | null | null | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Asset Management | Usage Parameters | AST-14 | Mechanisms exist to monitor and enforce usage parameters that limit the potential damage caused from the unauthorized or unintentional alteration of system parameters.
| - CimTrak Integrity Suite (https://www.cimcor.com/cimtrak/)
- NNT Change Tracker (https://www.newnettechnologies.com) | null | Does the organization monitor and enforce usage parameters that limit the potential damage caused from the unauthorized or unintentional alteration of system parameters?
| 7 | Identify | null | X | null | There is no evidence of a capability to monitor and enforce usage parameters that limit the potential damage caused from the unauthorized or unintentional alteration of system parameters.
| SP-CMM1 is N/A, since a structured process is required to monitor and enforce usage parameters that limit the potential damage caused from the unauthorized or unintentional alteration of system parameters.
| Asset Management (AST) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Asset management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for asset management.
• Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• Asset management is formally assigned as an additional duty to existing IT/cybersecurity personnel.
• Technology assets are categorized according to data classification and business criticality.
• Inventories cover technology assets in scope for statutory, regulatory and/ or contractual compliance, which includes both physical and virtual assets.
• Software licensing is tracked as part of IT asset inventories.
• Users are educated on their responsibilities to protect technology assets assigned to them or under their supervision.
• IT/cybersecurity personnel maintain network diagrams to document the flow of sensitive/regulated data across the network. | Asset Management (AST) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• An IT Asset Management (ITAM) function, or similar function, governs asset management to help ensure compliance with requirements for asset management.
• An ITAM function, or similar function, maintains an inventory of IT assets, covering both physical and virtual assets, as well as centrally managed asset ownership assignments.
• Technology assets and data are categorized according to data classification and business criticality criteria.
• A Cybersecurity Supply Chain Risk Management (C-SCRM) function oversees supply chain risks including the removal and prevention of certain technology services and/ or equipment designated as supply chain threats by a statutory or regulatory body.
• Data/process owners document where sensitive/regulated data is stored, transmitted and processed, generating Data Flow Diagrams (DFDs) and network diagrams to document the flow of data. | Asset Management (AST) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement.
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | Asset Management (AST) efforts are “world-class” capabilities that leverage predictive analysis (e.g., machine learning, AI, etc.). In addition to CMM Level 4 criteria, CMM Level 5 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Stakeholders make time-sensitive decisions to support operational efficiency, which may include automated remediation actions.
▪ Based on predictive analysis, process improvements are implemented according to “continuous improvement” practices that affect process changes. | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | T1114.003, T1613 | null | null | null | null | null | null | null | SC-43 | null | null | null | SC-43 | null | null | null | null | SC-43 | null | null | null | null | null | null | null | null | null | null | null | null | 3.1.18.a | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | C.1.8 | 2.9 | null | null | null | null | null | TM:SG2.SP2
TM:SG4.SP1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | null | null | null | R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-IR-1
R-IR-2
R-IR-3
R-IR-4 | R-AC-1 | R-AC-2 | R-AC-3 | R-AC-4 | null | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | null | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | R-EX-6 | R-EX-7 | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | null | null | null | R-IR-1 | R-IR-2 | R-IR-3 | R-IR-4 | null | null | NT-7
MT-1
MT-2
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | null | null | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Asset Management | Bluetooth & Wireless Devices | AST-14.1 | Mechanisms exist to prevent the usage of Bluetooth and wireless devices (e.g., Near Field Communications (NFC)) in sensitive areas or unless used in a Radio Frequency (RF)-screened building. | null | null | Does the organization prevent the usage of Bluetooth and wireless devices (e.g., Near Field Communications (NFC)) in sensitive areas or unless used in a Radio Frequency (RF)-screened building? | 7 | Protect | null | X | X | There is no evidence of a capability to prevent the usage of Bluetooth and wireless devices (e.g., Near Field Communications (NFC)) in sensitive areas or unless used in a Radio Frequency (RF)-screened building. | SP-CMM1 is N/A, since a structured process is required to prevent the usage of Bluetooth and wireless devices (e.g., Near Field Communications (NFC)) in sensitive areas or unless used in a Radio Frequency (RF)-screened building. | Asset Management (AST) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Asset management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for asset management.
• Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• Asset management is formally assigned as an additional duty to existing IT/cybersecurity personnel.
• Technology assets are categorized according to data classification and business criticality.
• Inventories cover technology assets in scope for statutory, regulatory and/ or contractual compliance, which includes both physical and virtual assets.
• Software licensing is tracked as part of IT asset inventories.
• Users are educated on their responsibilities to protect technology assets assigned to them or under their supervision.
• IT/cybersecurity personnel maintain network diagrams to document the flow of sensitive/regulated data across the network.
• Organizational policies and standards cover enhanced security requirements for Bluetooth and wireless devices in sensitive/regulated areas. | Asset Management (AST) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• An IT Asset Management (ITAM) function, or similar function, governs asset management to help ensure compliance with requirements for asset management.
• An ITAM function, or similar function, maintains an inventory of IT assets, covering both physical and virtual assets, as well as centrally managed asset ownership assignments.
• Technology assets and data are categorized according to data classification and business criticality criteria.
• A Cybersecurity Supply Chain Risk Management (C-SCRM) function oversees supply chain risks including the removal and prevention of certain technology services and/ or equipment designated as supply chain threats by a statutory or regulatory body.
• Data/process owners document where sensitive/regulated data is stored, transmitted and processed, generating Data Flow Diagrams (DFDs) and network diagrams to document the flow of data.
• Organizational policies and standards cover enhanced security requirements for Bluetooth and wireless devices in sensitive/regulated areas.
• Periodic physical and local inspections are performed to prevent use of Bluetooth and wireless devices in sensitive/regulated areas or unless used in a Radio Frequency (RF)-screened building. | See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to prevent the usage of Bluetooth and wireless devices (e.g., Near Field Communications (NFC)) in sensitive areas or unless used in a Radio Frequency (RF)-screened building. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to prevent the usage of Bluetooth and wireless devices (e.g., Near Field Communications (NFC)) in sensitive areas or unless used in a Radio Frequency (RF)-screened building. | null | null | null | null | null | null | null | null | null | null | SWS-01
SWS-03
SWS-05 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | M.3.3 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0233 | null | null | null | null | null | null | null | null | null | null | null | null | null | 11.1.8.C.01
11.1.10.C.01
11.1.10.C.02
11.1.10.C.03
11.1.11.C.01
11.1.11.C.02
11.1.12.C.01
11.1.13.C.01
21.1.16.C.01
21.1.16.C.02 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
R-SA-2 | R-AC-1 | R-AC-2 | R-AC-3 | R-AC-4 | R-AM-1 | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | R-EX-6 | R-EX-7 | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | R-GV-8 | R-IR-1 | R-IR-2 | R-IR-3 | R-IR-4 | R-SA-1 | R-SA-2 | NT-7
MT-1
MT-2
MT-5
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | MT-5 | null | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Asset Management | Infrared Communications | AST-14.2 | Mechanisms exist to prevent line of sight and reflected infrared (IR) communications use in an unsecured space. | null | null | Does the organization prevent line of sight and reflected infrared (IR) communications use in an unsecured space? | 5 | Protect | null | X | X | There is no evidence of a capability to prevent line of sight and reflected infrared (IR) communications use in an unsecured space. | SP-CMM1 is N/A, since a structured process is required to prevent line of sight and reflected infrared (IR) communications use in an unsecured space. | Asset Management (AST) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Asset management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for asset management.
• Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• Asset management is formally assigned as an additional duty to existing IT/cybersecurity personnel.
• Technology assets are categorized according to data classification and business criticality.
• Inventories cover technology assets in scope for statutory, regulatory and/ or contractual compliance, which includes both physical and virtual assets.
• Software licensing is tracked as part of IT asset inventories.
• Users are educated on their responsibilities to protect technology assets assigned to them or under their supervision.
• IT/cybersecurity personnel maintain network diagrams to document the flow of sensitive/regulated data across the network.
• Organizational policies and standards cover requirements to prevent line of sight and reflected infrared (IR) communications use in an unsecured space. | Asset Management (AST) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• An IT Asset Management (ITAM) function, or similar function, governs asset management to help ensure compliance with requirements for asset management.
• An ITAM function, or similar function, maintains an inventory of IT assets, covering both physical and virtual assets, as well as centrally managed asset ownership assignments.
• Technology assets and data are categorized according to data classification and business criticality criteria.
• A Cybersecurity Supply Chain Risk Management (C-SCRM) function oversees supply chain risks including the removal and prevention of certain technology services and/ or equipment designated as supply chain threats by a statutory or regulatory body.
• Data/process owners document where sensitive/regulated data is stored, transmitted and processed, generating Data Flow Diagrams (DFDs) and network diagrams to document the flow of data.
• Organizational policies and standards cover requirements to prevent line of sight and reflected infrared (IR) communications use in an unsecured space.
• Periodic physical and local inspections are performed to prevent line of sight and reflected infrared (IR) communications use in an unsecured space. | See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to prevent line of sight and reflected infrared (IR) communications use in an unsecured space. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to prevent line of sight and reflected infrared (IR) communications use in an unsecured space. | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | O.9 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 11.1.9.C.01
11.1.9.C.02
11.1.9.C.03 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
R-SA-2 | R-AC-1 | R-AC-2 | R-AC-3 | R-AC-4 | R-AM-1 | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | R-EX-6 | R-EX-7 | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | R-GV-8 | R-IR-1 | R-IR-2 | R-IR-3 | R-IR-4 | R-SA-1 | R-SA-2 | NT-7
MT-1
MT-2
MT-5
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | MT-5 | null | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Asset Management | Tamper Protection | AST-15 | Mechanisms exist to verify logical configuration settings and the physical integrity of critical technology assets throughout their lifecycle. | - CimTrak Integrity Suite (https://www.cimcor.com/cimtrak/)
- Tamper detection tape
- File Integrity Monitoring (FIM)
- NNT Change Tracker (https://www.newnettechnologies.com)
- Tripwire Enterprise (https://www.tripwire.com/products/tripwire-enterprise/) | null | Does the organization verify logical configuration settings and the physical integrity of critical technology assets throughout their lifecycle? | 6 | Protect | X | X | X | There is no evidence of a capability to verify logical configuration settings and the physical integrity of critical technology assets throughout their lifecycle. | Asset Management (AST) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Asset management is informally assigned as an additional duty to existing IT/cybersecurity personnel.
• Asset inventories are performed in an ad hoc manner.
• Software licensing is tracked as part of IT asset inventories.
• Data process owners maintain limited network diagrams to document the flow of sensitive/regulated data that is specific to their initiative.
• IT personnel work with data/process owners to help ensure secure practices are implemented throughout the System Development Lifecycle (SDLC) for all high-value projects. | Asset Management (AST) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Asset management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for asset management.
• Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• Asset management is formally assigned as an additional duty to existing IT/cybersecurity personnel.
• Technology assets are categorized according to data classification and business criticality.
• Inventories cover technology assets in scope for statutory, regulatory and/ or contractual compliance, which includes both physical and virtual assets.
• Software licensing is tracked as part of IT asset inventories.
• Users are educated on their responsibilities to protect technology assets assigned to them or under their supervision.
• IT/cybersecurity personnel maintain network diagrams to document the flow of sensitive/regulated data across the network.
• Security awareness training covers reporting of unauthorized alterations and evidence of tampering.
• Users traveling to high threat countries use tamper-resistant tape to aid in detecting physical tampering and/ or use a specially hardened device besides their normal company issued device. | Asset Management (AST) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• An IT Asset Management (ITAM) function, or similar function, governs asset management to help ensure compliance with requirements for asset management.
• An ITAM function, or similar function, maintains an inventory of IT assets, covering both physical and virtual assets, as well as centrally managed asset ownership assignments.
• Technology assets and data are categorized according to data classification and business criticality criteria.
• A Cybersecurity Supply Chain Risk Management (C-SCRM) function oversees supply chain risks including the removal and prevention of certain technology services and/ or equipment designated as supply chain threats by a statutory or regulatory body.
• Data/process owners document where sensitive/regulated data is stored, transmitted and processed, generating Data Flow Diagrams (DFDs) and network diagrams to document the flow of data.
• Security awareness training covers reporting of unauthorized alterations and evidence of tampering.
• Users traveling to high threat countries use tamper-resistant tape to aid in detecting physical tampering and/ or use a specially hardened device besides their normal company issued device. | Asset Management (AST) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement.
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | Asset Management (AST) efforts are “world-class” capabilities that leverage predictive analysis (e.g., machine learning, AI, etc.). In addition to CMM Level 4 criteria, CMM Level 5 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Stakeholders make time-sensitive decisions to support operational efficiency, which may include automated remediation actions.
▪ Based on predictive analysis, process improvements are implemented according to “continuous improvement” practices that affect process changes. | null | null | null | null | null | null | null | null | null | null | IOT-05 | null | null | CR 3.11 (7.13)
EDR 3.11 (13.6.1)
HDR 3.11 (14.6.1) | null | null | null | null | 11.2.6 | 7.9 | 11.2.6 | null | null | null | null | null | null | null | null | null | null | null | null | null | SA-18 | null | null | null | SR-9
SR-9(1) | null | null | null | SR-9
SR-9(1) | null | null | null | null | SR-9
SR-9(1) | null | SR-9 | null | null | null | SR-9 | SR-9 | null | null | null | null | null | null | null | null | null | null | 9.5.1 | null | null | 9.5.1 | 9.5.1 | 9.5.1 | null | 9.5.1 | 9.5.1 | 9.5.1 | D.1.1 | null | null | null | null | null | null | KIM:SG2.SP2
TM:SG4.SP1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | SR-9
SR-9(1) | null | null | SR-9
SR-9(1) | null | null | null | null | null | null | null | null | null | null | null | null | null | 8-308 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 11.2.6 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-7
R-GV-1
R-GV-2
R-GV-4
R-GV-5
R-IR-1
R-IR-2
R-IR-4
R-SA-1 | null | null | R-AC-3 | R-AC-4 | R-AM-1 | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | R-EX-7 | R-GV-1 | R-GV-2 | null | R-GV-4 | R-GV-5 | null | null | null | R-IR-1 | R-IR-2 | null | R-IR-4 | R-SA-1 | null | NT-7
MT-1
MT-2
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | null | null | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Asset Management | Inspection of Systems, Components & Devices | AST-15.1 | Mechanisms exist to physically and logically inspect critical technology assets to detect evidence of tampering. | - CimTrak Integrity Suite (https://www.cimcor.com/cimtrak/)
- Tamper detection tape
- File Integrity Monitoring (FIM)
- NNT Change Tracker (https://www.newnettechnologies.com)
- Tripwire Enterprise (https://www.tripwire.com/products/tripwire-enterprise/) | null | Does the organization physically and logically inspect critical technology assets to detect evidence of tampering? | 6 | Detect | null | X | X | There is no evidence of a capability to physically and logically inspect critical technology assets to detect evidence of tampering. | Asset Management (AST) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Asset management is informally assigned as an additional duty to existing IT/cybersecurity personnel.
• Asset inventories are performed in an ad hoc manner.
• Software licensing is tracked as part of IT asset inventories.
• Data process owners maintain limited network diagrams to document the flow of sensitive/regulated data that is specific to their initiative.
• IT personnel work with data/process owners to help ensure secure practices are implemented throughout the System Development Lifecycle (SDLC) for all high-value projects.
• IT personnel should provide a list of dos and do nots for using laptops and mobile devices in high threat countries. | Asset Management (AST) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Asset management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for asset management.
• Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• Asset management is formally assigned as an additional duty to existing IT/cybersecurity personnel.
• Technology assets are categorized according to data classification and business criticality.
• Inventories cover technology assets in scope for statutory, regulatory and/ or contractual compliance, which includes both physical and virtual assets.
• Software licensing is tracked as part of IT asset inventories.
• Users are educated on their responsibilities to protect technology assets assigned to them or under their supervision.
• IT/cybersecurity personnel maintain network diagrams to document the flow of sensitive/regulated data across the network.
• Security awareness training covers reporting of unauthorized alterations and evidence of tampering.
• Users traveling to high threat countries use tamper-resistant tape to aid in detecting physical tampering and/ or use a specially hardened device besides their normal company issued device. | Asset Management (AST) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• An IT Asset Management (ITAM) function, or similar function, governs asset management to help ensure compliance with requirements for asset management.
• An ITAM function, or similar function, maintains an inventory of IT assets, covering both physical and virtual assets, as well as centrally managed asset ownership assignments.
• Technology assets and data are categorized according to data classification and business criticality criteria.
• A Cybersecurity Supply Chain Risk Management (C-SCRM) function oversees supply chain risks including the removal and prevention of certain technology services and/ or equipment designated as supply chain threats by a statutory or regulatory body.
• Data/process owners document where sensitive/regulated data is stored, transmitted and processed, generating Data Flow Diagrams (DFDs) and network diagrams to document the flow of data.
• Security awareness training covers reporting of unauthorized alterations and evidence of tampering.
• Users traveling to high threat countries use tamper-resistant tape to aid in detecting physical tampering and/ or use a specially hardened device besides their normal company issued device. | Asset Management (AST) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement.
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | Asset Management (AST) efforts are “world-class” capabilities that leverage predictive analysis (e.g., machine learning, AI, etc.). In addition to CMM Level 4 criteria, CMM Level 5 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Stakeholders make time-sensitive decisions to support operational efficiency, which may include automated remediation actions.
▪ Based on predictive analysis, process improvements are implemented according to “continuous improvement” practices that affect process changes. | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | SA-18(2) | null | null | null | SR-10 | null | SR-10 | SR-10 | SR-10 | null | null | SR-10 | SR-10 | SR-10 | null | SR-10 | SR-10 | SR-10 | null | SR-10 | SR-10 | null | null | null | null | null | null | null | null | null | 9.1
9.1.1
9.9
9.9.1
9.9.2
9.9.3 | 9.5.1
9.5.1.2 | null | null | 9.5.1
9.5.1.2 | 9.5.1
9.5.1.2 | 9.5.1
9.5.1.2 | null | 9.5.1
9.5.1.2 | 9.5.1
9.5.1.2 | 9.5.1
9.5.1.2 | J.6.11 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | SR-10 | SR-10 | SR-10 | SR-10 | SR-10 | null | null | null | null | null | null | null | null | null | SR-10 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-7
R-GV-1
R-GV-2
R-GV-4
R-GV-5
R-IR-1
R-IR-2
R-IR-4
R-SA-1 | null | null | R-AC-3 | R-AC-4 | R-AM-1 | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | R-EX-7 | R-GV-1 | R-GV-2 | null | R-GV-4 | R-GV-5 | null | null | null | R-IR-1 | R-IR-2 | null | R-IR-4 | R-SA-1 | null | NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | NT-9 | NT-10 | NT-11 | NT-12 | NT-13 | NT-14 | MT-1 | MT-2 | MT-3 | MT-4 | MT-5 | MT-6 | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Asset Management | Bring Your Own Device (BYOD) Usage | AST-16 | Mechanisms exist to implement and govern a Bring Your Own Device (BYOD) program to reduce risk associated with personally-owned devices in the workplace. | - AirWatch
- SCCM
- Casper
- BYOD policy | null | Does the organization implement and govern a Bring Your Own Device (BYOD) program to reduce risk associated with personally-owned devices in the workplace? | 10 | Identify | null | X | X | There is no evidence of a capability to implement and govern a Bring Your Own Device (BYOD) program to reduce risk associated with personally-owned devices in the workplace. | Asset Management (AST) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Asset management is informally assigned as an additional duty to existing IT/cybersecurity personnel.
• Asset inventories are performed in an ad hoc manner.
• Software licensing is tracked as part of IT asset inventories.
• Data process owners maintain limited network diagrams to document the flow of sensitive/regulated data that is specific to their initiative.
• IT personnel work with data/process owners to help ensure secure practices are implemented throughout the System Development Lifecycle (SDLC) for all high-value projects. | Asset Management (AST) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Asset management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for asset management.
• Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• Asset management is formally assigned as an additional duty to existing IT/cybersecurity personnel.
• Technology assets are categorized according to data classification and business criticality.
• Inventories cover technology assets in scope for statutory, regulatory and/ or contractual compliance, which includes both physical and virtual assets.
• Software licensing is tracked as part of IT asset inventories.
• Users are educated on their responsibilities to protect technology assets assigned to them or under their supervision.
• IT/cybersecurity personnel maintain network diagrams to document the flow of sensitive/regulated data across the network.
• Administrative means (e.g., policies and standards) govern the use of personal devices (e.g., Bring Your Own Device (BYOD)) as part of acceptable and unacceptable behaviors. | Asset Management (AST) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• An IT Asset Management (ITAM) function, or similar function, governs asset management to help ensure compliance with requirements for asset management.
• An ITAM function, or similar function, maintains an inventory of IT assets, covering both physical and virtual assets, as well as centrally managed asset ownership assignments.
• Technology assets and data are categorized according to data classification and business criticality criteria.
• A Cybersecurity Supply Chain Risk Management (C-SCRM) function oversees supply chain risks including the removal and prevention of certain technology services and/ or equipment designated as supply chain threats by a statutory or regulatory body.
• Data/process owners document where sensitive/regulated data is stored, transmitted and processed, generating Data Flow Diagrams (DFDs) and network diagrams to document the flow of data.
• Administrative means (e.g., policies and standards) govern the use of personal devices (e.g., Bring Your Own Device (BYOD)) as part of acceptable and unacceptable behaviors.
• Mobile Device Management (MDM) software is used to restrict the data that is stored/processed/transmitted on organization-owned and/ or applicable Bring Your Own Device (BYOD) (e.g., personal devices) across the entire organization. | Asset Management (AST) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement.
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to implement and govern a Bring Your Own Device (BYOD) program to reduce risk associated with personally-owned devices in the workplace. | null | null | null | 4.11 | null | 4.11 | 4.11 | null | null | UEM-14 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 3.1.18.b
3.1.18.c | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | M.3.3.1 | null | null | null | null | null | null | null | null | 5.5.6.1
5.5.6.2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 10.S.A | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 2-5 | null | 3.3.10 | 2-6-1
2-6-2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 8.1.12.C.01
21.1.12.C.01
21.4.7.C.01
21.4.7.C.02
21.4.8.C.01
21.4.8.C.02
21.4.9.C.01
21.4.10.C.01
21.4.10.C.02
21.4.10.C.03
21.4.10.C.04
21.4.10.C.05
21.4.10.C.06
21.4.10.C.07
21.4.10.C.08
21.4.10.C.09
21.4.10.C.10
21.4.10.C.11
21.4.10.C.12
21.4.10.C.13
21.4.10.C.14
21.4.10.C.15
21.4.10.C.16
21.4.11.C.01
21.4.11.C.02
21.4.11.C.03
21.4.11.C.04
21.4.11.C.05
21.4.11.C.06
21.4.11.C.07
21.4.11.C.08
21.4.11.C.09
21.4.11.C.10
21.4.11.C.11
21.4.11.C.12
21.4.11.C.13
21.4.11.C.14
21.4.11.C.15
21.4.11.C.16
21.4.11.C.17
21.4.11.C.18
21.4.11.C.19
21.4.11.C.20
21.4.13.C.01
21.4.13.C.02
21.4.13.C.03
21.4.13.C.04
21.4.13.C.05
21.4.13.C.06
21.4.13.C.07
21.4.13.C.08
21.4.13.C.09
21.4.13.C.10
21.4.13.C.11
21.4.14.C.01
21.4.14.C.02
21.4.14.C.03
21.4.14.C.04 | null | null | null | null | 11.3.7 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | null | null | null | R-AC-1
R-AC-4
R-AM-3
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-4
R-SA-1
R-SA-2 | R-AC-1 | null | null | R-AC-4 | null | null | R-AM-3 | null | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | R-EX-6 | R-EX-7 | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | R-GV-8 | R-IR-1 | R-IR-2 | null | R-IR-4 | R-SA-1 | R-SA-2 | NT-7
MT-1
MT-2
MT-5
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | MT-5 | null | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Asset Management | Prohibited Equipment & Services | AST-17 | Mechanisms exist to govern Supply Chain Risk Management (SCRM) sanctions that require the removal and prohibition of certain technology services and/or equipment that are designated as supply chain threats by a statutory or regulatory body. | null | E-AST-10 | Does the organization govern Supply Chain Risk Management (SCRM) sanctions that require the removal and prohibition of certain technology services and/or equipment that are designated as supply chain threats by a statutory or regulatory body? | 9 | Protect | null | X | X | There is no evidence of a capability to govern Supply Chain Risk Management (SCRM) sanctions that require the removal and prohibition of certain technology services and/ or equipment that are designated as supply chain threats by a statutory or regulatory body. | SP-CMM1 is N/A, since a structured process is required to govern Supply Chain Risk Management (SCRM) sanctions that require the removal and prohibition of certain technology services and/ or equipment that are designated as supply chain threats by a statutory or regulatory body. | SP-CMM2 is N/A, since a well-defined process is required to govern Supply Chain Risk Management (SCRM) sanctions that require the removal and prohibition of certain technology services and/ or equipment that are designated as supply chain threats by a statutory or regulatory body. | Asset Management (AST) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• An IT Asset Management (ITAM) function, or similar function, governs asset management to help ensure compliance with requirements for asset management.
• An ITAM function, or similar function, maintains an inventory of IT assets, covering both physical and virtual assets, as well as centrally managed asset ownership assignments.
• Technology assets and data are categorized according to data classification and business criticality criteria.
• A Cybersecurity Supply Chain Risk Management (C-SCRM) function oversees supply chain risks including the removal and prevention of certain technology services and/ or equipment designated as supply chain threats by a statutory or regulatory body.
• Data/process owners document where sensitive/regulated data is stored, transmitted and processed, generating Data Flow Diagrams (DFDs) and network diagrams to document the flow of data.
• An IT infrastructure team, or similar function, enforces sanctions that require the removal and prohibition of certain technology services and/ or equipment that are designated as supply chain threats by a statutory or regulatory body (e.g., removes prohibited assets and/ or services). | See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to govern Supply Chain Risk Management (SCRM) sanctions that require the removal and prohibition of certain technology services and/ or equipment that are designated as supply chain threats by a statutory or regulatory body. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to govern Supply Chain Risk Management (SCRM) sanctions that require the removal and prohibition of certain technology services and/ or equipment that are designated as supply chain threats by a statutory or regulatory body. | null | null | null | null | null | null | null | null | null | UEM-14 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | L.4.5 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 252.204-7018(b) | null | null | 52.204-27(b) | 889(a)(1)(A)
889(a)(1)(B) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1 | R-AC-1 | R-AC-2 | R-AC-3 | R-AC-4 | R-AM-1 | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | R-EX-6 | R-EX-7 | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | R-GV-8 | R-IR-1 | R-IR-2 | R-IR-3 | R-IR-4 | R-SA-1 | null | NT-7
MT-1
MT-2
MT-5
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | MT-5 | null | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | - updated DFARS mapping |
Asset Management | Roots of Trust Protection | AST-18 | Mechanisms exist to provision and protect the confidentiality, integrity and authenticity of product supplier keys and data that can be used as a “roots of trust” basis for integrity verification. | null | null | Does the organization provision and protect the confidentiality, integrity and authenticity of product supplier keys and data that can be used as a “roots of trust” basis for integrity verification? | 4 | Protect | null | X | X | There is no evidence of a capability to provision and protect the confidentiality, integrity and authenticity of product supplier keys and data that can be used as a “roots of trust” basis for integrity verification. | SP-CMM1 is N/A, since a structured process is required to provision and protect the confidentiality, integrity and authenticity of product supplier keys and data that can be used as a “roots of trust” basis for integrity verification. | SP-CMM2 is N/A, since a well-defined process is required to provision and protect the confidentiality, integrity and authenticity of product supplier keys and data that can be used as a “roots of trust” basis for integrity verification. | Asset Management (AST) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• An IT Asset Management (ITAM) function, or similar function, governs asset management to help ensure compliance with requirements for asset management.
• An ITAM function, or similar function, maintains an inventory of IT assets, covering both physical and virtual assets, as well as centrally managed asset ownership assignments.
• Technology assets and data are categorized according to data classification and business criticality criteria.
• A Cybersecurity Supply Chain Risk Management (C-SCRM) function oversees supply chain risks including the removal and prevention of certain technology services and/ or equipment designated as supply chain threats by a statutory or regulatory body.
• Data/process owners document where sensitive/regulated data is stored, transmitted and processed, generating Data Flow Diagrams (DFDs) and network diagrams to document the flow of data.
• A Supply Chain Risk Management (SCRM) program oversees supply chain risks, including “roots of trust” protections to ensure the chain of custody is intact to help ensure the likelihood of tampering or substitution is minimized. | See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to provision and protect the confidentiality, integrity and authenticity of product supplier keys and data that can be used as a “roots of trust” basis for integrity verification. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to provision and protect the confidentiality, integrity and authenticity of product supplier keys and data that can be used as a “roots of trust” basis for integrity verification. | null | null | null | null | null | null | null | null | null | null | null | null | null | EDR 3.13 (13.8.1(a))
HDR 3.12 (14.7.1)
HDR 3.13 (14.8.1(a))
HDR 3.13 (14.8.1(b))
NDR 3.12 (15.9.1)
NDR 3.13 (15.10.1(a)) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 3.14.1e | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | M.3 | null | null | null | null | null | null | null | null | null | null | null | TBD - 3.14.1e | null | null | SI.L3-3.14.1e | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Principle 4
Principle 7 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-7
R-GV-1
R-GV-2
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1 | R-AC-1 | R-AC-2 | R-AC-3 | R-AC-4 | null | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | null | null | null | null | null | null | R-EX-7 | R-GV-1 | R-GV-2 | null | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | null | R-IR-1 | R-IR-2 | R-IR-3 | R-IR-4 | R-SA-1 | null | NT-7
MT-1
MT-2
MT-5
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | MT-5 | null | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Asset Management | Telecommunications Equipment | AST-19 | Mechanisms exist to establish usage restrictions and implementation guidance for telecommunication equipment to prevent potential damage or unauthorized modification and to prevent potential eavesdropping. | null | null | Does the organization establish usage restrictions and implementation guidance for telecommunication equipment to prevent potential damage or unauthorized modification and to prevent potential eavesdropping? | 9 | Protect | null | X | X | There is no evidence of a capability to establish usage restrictions and implementation guidance for telecommunication equipment to prevent potential damage or unauthorized modification and to prevent potential eavesdropping. | SP-CMM1 is N/A, since a structured process is required to establish usage restrictions and implementation guidance for telecommunication equipment to prevent potential damage or unauthorized modification and to prevent potential eavesdropping. | Asset Management (AST) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Asset management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for asset management.
• Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• Asset management is formally assigned as an additional duty to existing IT/cybersecurity personnel.
• Technology assets are categorized according to data classification and business criticality.
• Inventories cover technology assets in scope for statutory, regulatory and/ or contractual compliance, which includes both physical and virtual assets.
• Software licensing is tracked as part of IT asset inventories.
• Users are educated on their responsibilities to protect technology assets assigned to them or under their supervision.
• IT/cybersecurity personnel maintain network diagrams to document the flow of sensitive/regulated data across the network. | Asset Management (AST) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• An IT Asset Management (ITAM) function, or similar function, governs asset management to help ensure compliance with requirements for asset management.
• An ITAM function, or similar function, maintains an inventory of IT assets, covering both physical and virtual assets, as well as centrally managed asset ownership assignments.
• Technology assets and data are categorized according to data classification and business criticality criteria.
• A Cybersecurity Supply Chain Risk Management (C-SCRM) function oversees supply chain risks including the removal and prevention of certain technology services and/ or equipment designated as supply chain threats by a statutory or regulatory body.
• Data/process owners document where sensitive/regulated data is stored, transmitted and processed, generating Data Flow Diagrams (DFDs) and network diagrams to document the flow of data. | See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to establish usage restrictions and implementation guidance for telecommunication equipment to prevent potential damage or unauthorized modification and to prevent potential eavesdropping. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to establish usage restrictions and implementation guidance for telecommunication equipment to prevent potential damage or unauthorized modification and to prevent potential eavesdropping. | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | F.9.2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | TPC-13
TPC-14
TPC-15
TPC-16
TPC-17 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0558 | null | null | null | null | null | null | null | null | null | null | null | null | null | 11.3.5.C.01
11.3.6.C.01
11.3.6.C.02
11.3.7.C.01
11.3.8.C.01
11.3.9.C.01
11.3.9.C.02
11.3.10.C.01
11.3.11.C.01
11.3.12.C.01
11.3.12.C.02
11.3.12.C.03
11.3.13.C.01
11.3.13.C.02
11.3.13.C.03 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1 | R-AC-1 | R-AC-2 | R-AC-3 | R-AC-4 | null | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | null | null | null | null | R-EX-5 | R-EX-6 | R-EX-7 | R-GV-1 | R-GV-2 | null | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | R-GV-8 | R-IR-1 | R-IR-2 | R-IR-3 | R-IR-4 | R-SA-1 | null | NT-7
MT-1
MT-2
MT-5
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | MT-5 | null | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Asset Management | Video Teleconference (VTC) Security | AST-20 | Mechanisms exist to implement secure Video Teleconference (VTC) capabilities on endpoint devices and in designated conference rooms, to prevent potential eavesdropping. | null | null | Does the organization implement secure Video Teleconference (VTC) capabilities on endpoint devices and in designated conference rooms, to prevent potential eavesdropping? | 8 | Protect | null | X | X | There is no evidence of a capability to implement secure Video Teleconference (VTC) capabilities on endpoint devices and in designated conference rooms, to prevent potential eavesdropping. | SP-CMM1 is N/A, since a structured process is required to implement secure Video Teleconference (VTC) capabilities on endpoint devices and in designated conference rooms, to prevent potential eavesdropping. | Asset Management (AST) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Asset management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for asset management.
• Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• Asset management is formally assigned as an additional duty to existing IT/cybersecurity personnel.
• Technology assets are categorized according to data classification and business criticality.
• Inventories cover technology assets in scope for statutory, regulatory and/ or contractual compliance, which includes both physical and virtual assets.
• Software licensing is tracked as part of IT asset inventories.
• Users are educated on their responsibilities to protect technology assets assigned to them or under their supervision.
• IT/cybersecurity personnel maintain network diagrams to document the flow of sensitive/regulated data across the network. | Asset Management (AST) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• An IT Asset Management (ITAM) function, or similar function, governs asset management to help ensure compliance with requirements for asset management.
• An ITAM function, or similar function, maintains an inventory of IT assets, covering both physical and virtual assets, as well as centrally managed asset ownership assignments.
• Technology assets and data are categorized according to data classification and business criticality criteria.
• A Cybersecurity Supply Chain Risk Management (C-SCRM) function oversees supply chain risks including the removal and prevention of certain technology services and/ or equipment designated as supply chain threats by a statutory or regulatory body.
• Data/process owners document where sensitive/regulated data is stored, transmitted and processed, generating Data Flow Diagrams (DFDs) and network diagrams to document the flow of data.
• Administrative processes exist and technologies are configured to unplug or prohibit the remote activation of collaborative computing devices, except for networked whiteboards, Video Teleconference Cameras (VTC) and teleconference microphones. | See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to implement secure Video Teleconference (VTC) capabilities on endpoint devices and in designated conference rooms, to prevent potential eavesdropping. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to implement secure Video Teleconference (VTC) capabilities on endpoint devices and in designated conference rooms, to prevent potential eavesdropping. | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | M.1.1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0548
0554
0553
0555
0551
1014 | null | null | null | null | null | Article 26 | null | null | null | null | null | null | null | 18.3.14.C.01
18.3.14.C.02 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1 | R-AC-1 | R-AC-2 | R-AC-3 | R-AC-4 | null | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | null | null | null | null | R-EX-5 | R-EX-6 | R-EX-7 | R-GV-1 | R-GV-2 | null | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | R-GV-8 | R-IR-1 | R-IR-2 | R-IR-3 | R-IR-4 | R-SA-1 | null | NT-7
MT-1
MT-2
MT-5
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | MT-5 | null | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Asset Management | Voice Over Internet Protocol (VoIP) Security | AST-21 | Mechanisms exist to implement secure Internet Protocol Telephony (IPT) that logically or physically separates Voice Over Internet Protocol (VoIP) traffic from data networks. | null | null | Does the organization implement secure Internet Protocol Telephony (IPT) that logically or physically separates Voice Over Internet Protocol (VoIP) traffic from data networks? | 8 | Protect | null | null | X | There is no evidence of a capability to implement secure Internet Protocol Telephony (IPT) that logically or physically separates Voice Over Internet Protocol (VoIP) traffic from data networks. | SP-CMM1 is N/A, since a structured process is required to implement secure Internet Protocol Telephony (IPT) that logically or physically separates Voice Over Internet Protocol (VoIP) traffic from data networks. | Asset Management (AST) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Asset management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for asset management.
• Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• Asset management is formally assigned as an additional duty to existing IT/cybersecurity personnel.
• Technology assets are categorized according to data classification and business criticality.
• Inventories cover technology assets in scope for statutory, regulatory and/ or contractual compliance, which includes both physical and virtual assets.
• Software licensing is tracked as part of IT asset inventories.
• Users are educated on their responsibilities to protect technology assets assigned to them or under their supervision.
• IT/cybersecurity personnel maintain network diagrams to document the flow of sensitive/regulated data across the network. | Asset Management (AST) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• An IT Asset Management (ITAM) function, or similar function, governs asset management to help ensure compliance with requirements for asset management.
• An ITAM function, or similar function, maintains an inventory of IT assets, covering both physical and virtual assets, as well as centrally managed asset ownership assignments.
• Technology assets and data are categorized according to data classification and business criticality criteria.
• A Cybersecurity Supply Chain Risk Management (C-SCRM) function oversees supply chain risks including the removal and prevention of certain technology services and/ or equipment designated as supply chain threats by a statutory or regulatory body.
• Data/process owners document where sensitive/regulated data is stored, transmitted and processed, generating Data Flow Diagrams (DFDs) and network diagrams to document the flow of data. | See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to implement secure Internet Protocol Telephony (IPT) that logically or physically separates Voice Over Internet Protocol (VoIP) traffic from data networks. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to implement secure Internet Protocol Telephony (IPT) that logically or physically separates Voice Over Internet Protocol (VoIP) traffic from data networks. | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | L.10.8 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 1014
0549
0556 | null | null | null | null | null | null | null | null | null | null | null | null | null | 18.3.8.C.01
18.3.9.C.01
18.3.9.C.02
18.3.10.C.01
18.3.11.C.01
18.3.11.C.02
18.3.12.C.01
18.3.12.C.02
18.3.13.C.01
18.3.13.C.02
18.3.13.C.03
18.3.14.C.01
18.3.14.C.02
18.3.15.C.01
18.3.15.C.02
18.3.16.C.01
18.3.16.C.02
18.3.16.C.03
18.3.17.C.01 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1 | R-AC-1 | R-AC-2 | R-AC-3 | R-AC-4 | null | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | null | null | null | null | R-EX-5 | R-EX-6 | R-EX-7 | R-GV-1 | R-GV-2 | null | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | R-GV-8 | R-IR-1 | R-IR-2 | R-IR-3 | R-IR-4 | R-SA-1 | null | NT-7
MT-1
MT-2
MT-5
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | MT-5 | null | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Asset Management | Microphones & Web Cameras | AST-22 | Mechanisms exist to configure assets to prohibit the use of endpoint-based microphones and web cameras in secure areas or where sensitive/regulated information is discussed. | null | null | Does the organization configure assets to prohibit the use of endpoint-based microphones and web cameras in secure areas or where sensitive/regulated information is discussed? | 8 | Protect | null | X | X | There is no evidence of a capability to configure assets to prohibit the use of endpoint-based microphones and web cameras in secure areas or where sensitive information is discussed. | SP-CMM1 is N/A, since a structured process is required to configure assets to prohibit the use of endpoint-based microphones and web cameras in secure areas or where sensitive information is discussed. | Asset Management (AST) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Asset management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for asset management.
• Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• Asset management is formally assigned as an additional duty to existing IT/cybersecurity personnel.
• Technology assets are categorized according to data classification and business criticality.
• Inventories cover technology assets in scope for statutory, regulatory and/ or contractual compliance, which includes both physical and virtual assets.
• Software licensing is tracked as part of IT asset inventories.
• Users are educated on their responsibilities to protect technology assets assigned to them or under their supervision.
• IT/cybersecurity personnel maintain network diagrams to document the flow of sensitive/regulated data across the network. | Asset Management (AST) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• An IT Asset Management (ITAM) function, or similar function, governs asset management to help ensure compliance with requirements for asset management.
• An ITAM function, or similar function, maintains an inventory of IT assets, covering both physical and virtual assets, as well as centrally managed asset ownership assignments.
• Technology assets and data are categorized according to data classification and business criticality criteria.
• A Cybersecurity Supply Chain Risk Management (C-SCRM) function oversees supply chain risks including the removal and prevention of certain technology services and/ or equipment designated as supply chain threats by a statutory or regulatory body.
• Data/process owners document where sensitive/regulated data is stored, transmitted and processed, generating Data Flow Diagrams (DFDs) and network diagrams to document the flow of data.
• Administrative processes exist and technologies are configured to unplug or prohibit the remote activation of collaborative computing devices, except for networked whiteboards, Video Teleconference Cameras (VTC) and teleconference microphones. | See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to configure assets to prohibit the use of endpoint-based microphones and web cameras in secure areas or where sensitive information is discussed. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to configure assets to prohibit the use of endpoint-based microphones and web cameras in secure areas or where sensitive information is discussed. | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | N.8 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0559
1450 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1 | R-AC-1 | R-AC-2 | R-AC-3 | R-AC-4 | null | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | null | null | null | null | R-EX-5 | R-EX-6 | R-EX-7 | R-GV-1 | R-GV-2 | null | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | R-GV-8 | R-IR-1 | R-IR-2 | R-IR-3 | R-IR-4 | R-SA-1 | null | NT-7
MT-1
MT-2
MT-5
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | MT-5 | null | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Asset Management | Multi-Function Devices (MFD) | AST-23 | Mechanisms exist to securely configure Multi-Function Devices (MFD) according to industry-recognized secure practices for the type of device. | null | E-TPM-01 | Does the organization securely configure Multi-Function Devices (MFD) according to industry-recognized secure practices for the type of device? | 8 | Protect | null | null | X | There is no evidence of a capability to securely configure Multi-Function Devices (MFD) according to industry-recognized secure practices for the type of device. | SP-CMM1 is N/A, since a structured process is required to securely configure Multi-Function Devices (MFD) according to industry-recognized secure practices for the type of device. | Asset Management (AST) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Asset management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for asset management.
• Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• Asset management is formally assigned as an additional duty to existing IT/cybersecurity personnel.
• Technology assets are categorized according to data classification and business criticality.
• Inventories cover technology assets in scope for statutory, regulatory and/ or contractual compliance, which includes both physical and virtual assets.
• Software licensing is tracked as part of IT asset inventories.
• Users are educated on their responsibilities to protect technology assets assigned to them or under their supervision.
• IT/cybersecurity personnel maintain network diagrams to document the flow of sensitive/regulated data across the network. | Asset Management (AST) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• An IT Asset Management (ITAM) function, or similar function, governs asset management to help ensure compliance with requirements for asset management.
• An ITAM function, or similar function, maintains an inventory of IT assets, covering both physical and virtual assets, as well as centrally managed asset ownership assignments.
• Technology assets and data are categorized according to data classification and business criticality criteria.
• A Cybersecurity Supply Chain Risk Management (C-SCRM) function oversees supply chain risks including the removal and prevention of certain technology services and/ or equipment designated as supply chain threats by a statutory or regulatory body.
• Data/process owners document where sensitive/regulated data is stored, transmitted and processed, generating Data Flow Diagrams (DFDs) and network diagrams to document the flow of data. | See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to securely configure Multi-Function Devices (MFD) according to industry-recognized secure practices for the type of device. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to securely configure Multi-Function Devices (MFD) according to industry-recognized secure practices for the type of device. | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | M.3.1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 3.3.5 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0590
0245
0589
1036 | null | null | null | null | null | null | null | null | null | null | null | null | null | 11.2.3.C.01
11.2.4.C.01
11.2.4.C.02
11.2.5.C.01
11.2.6.C.01
11.2.7.C.01
11.2.7.C.02
11.2.8.C.01
11.2.9.C.01
11.2.10.C.01
11.2.11.C.01
11.2.11.C.02
11.2.11.C.03
11.2.11.C.04
11.2.11.C.05
11.2.12.C.01
11.2.12.C.02
11.2.13.C.01
11.2.13.C.02 | null | null | null | null | 11.5.1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1 | R-AC-1 | R-AC-2 | R-AC-3 | R-AC-4 | null | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | null | null | null | null | R-EX-5 | R-EX-6 | R-EX-7 | R-GV-1 | R-GV-2 | null | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | R-GV-8 | R-IR-1 | R-IR-2 | R-IR-3 | R-IR-4 | R-SA-1 | null | NT-7
MT-1
MT-2
MT-5
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | MT-5 | null | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Asset Management | Travel-Only Devices | AST-24 | Mechanisms exist to issue personnel travelling overseas with temporary, loaner or "travel-only" end user technology (e.g., laptops and mobile devices) when travelling to authoritarian countries with a higher-than average risk for Intellectual Property (IP) theft or espionage against individuals and private companies. | null | null | Does the organization issue personnel travelling overseas with temporary, loaner or "travel-only" end user technology (e.g., laptops and mobile devices) when travelling to authoritarian countries with a higher-than average risk for Intellectual Property (IP) theft or espionage against individuals and private companies? | 8 | Protect | null | X | X | There is no evidence of a capability to issue personnel travelling overseas with temporary, loaner or "travel-only" end user technology (e.g., laptops and mobile devices) when travelling to authoritarian countries with a higher-than average risk for Intellectual Property (IP) theft or espionage against individuals and private companies. | SP-CMM1 is N/A, since a structured process is required to issue personnel travelling overseas with temporary, loaner or "travel-only" end user technology (e.g., laptops and mobile devices) when travelling to authoritarian countries with a higher-than average risk for Intellectual Property (IP) theft or espionage against individuals and private companies. | SP-CMM2 is N/A, since a well-defined process is required to issue personnel travelling overseas with temporary, loaner or "travel-only" end user technology (e.g., laptops and mobile devices) when travelling to authoritarian countries with a higher-than average risk for Intellectual Property (IP) theft or espionage against individuals and private companies. | Asset Management (AST) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• An IT Asset Management (ITAM) function, or similar function, governs asset management to help ensure compliance with requirements for asset management.
• An ITAM function, or similar function, maintains an inventory of IT assets, covering both physical and virtual assets, as well as centrally managed asset ownership assignments.
• Technology assets and data are categorized according to data classification and business criticality criteria.
• A Cybersecurity Supply Chain Risk Management (C-SCRM) function oversees supply chain risks including the removal and prevention of certain technology services and/ or equipment designated as supply chain threats by a statutory or regulatory body.
• Data/process owners document where sensitive/regulated data is stored, transmitted and processed, generating Data Flow Diagrams (DFDs) and network diagrams to document the flow of data.
• Organizational policies and standards cover requirements for users to secure laptops while traveling.
• Organizational policies and standards cover the use of travel-only devices.
• Security awareness training covers recommended practices for securing laptops and mobile devices while traveling.
• ITAM reviews and documents provisioning and issuing fully-encrypted loaner devices for users traveling to any country listed as a Level 2, 3 or 4 on the US State Department's travel advisory site (https://travel.state.gov).
• Users traveling to high threat countries use tamper-resistant tape to aid in detecting physical tampering and/ or use a specially hardened device besides their normal company issued device.
• Cybersecurity personnel provide a list of dos and don’ts for using laptops and mobile devices in high threat countries.
• Loaner devices are equipped with tamper-resistant tape to aid in detecting tampering. | See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to issue personnel travelling overseas with temporary, loaner or "travel-only" end user technology (e.g., laptops and mobile devices) when travelling to authoritarian countries with a higher-than average risk for Intellectual Property (IP) theft or espionage against individuals and private companies. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to issue personnel travelling overseas with temporary, loaner or "travel-only" end user technology (e.g., laptops and mobile devices) when travelling to authoritarian countries with a higher-than average risk for Intellectual Property (IP) theft or espionage against individuals and private companies. | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 3.4.12.a
3.4.12.b | null | A.03.04.12.a | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | M.3 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 1298
1554
1555
1299
1088
1300
1556 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | R-AC-1
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-4
R-GV-6
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
R-SA-2 | R-AC-1 | null | null | R-AC-4 | R-AM-1 | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | R-EX-6 | R-EX-7 | R-GV-1 | R-GV-2 | null | R-GV-4 | null | R-GV-6 | null | null | R-IR-1 | R-IR-2 | R-IR-3 | R-IR-4 | R-SA-1 | R-SA-2 | NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | NT-9 | NT-10 | NT-11 | NT-12 | NT-13 | NT-14 | MT-1 | MT-2 | null | null | null | null | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Asset Management | Re-Imaging Devices After Travel | AST-25 | Mechanisms exist to re-image end user technology (e.g., laptops and mobile devices) when returning from overseas travel to an authoritarian country with a higher-than average risk for Intellectual Property (IP) theft or espionage against individuals and private companies. | null | null | Does the organization re-image end user technology (e.g., laptops and mobile devices) when returning from overseas travel to an authoritarian country with a higher-than average risk for Intellectual Property (IP) theft or espionage against individuals and private companies? | 8 | Protect | null | X | X | There is no evidence of a capability to re-image end user technology (e.g., laptops and mobile devices) when returning from overseas travel to an authoritarian country with a higher-than average risk for Intellectual Property (IP) theft or espionage against individuals and private companies. | SP-CMM1 is N/A, since a structured process is required to re-image end user technology (e.g., laptops and mobile devices) when returning from overseas travel to an authoritarian country with a higher-than average risk for Intellectual Property (IP) theft or espionage against individuals and private companies. | SP-CMM2 is N/A, since a well-defined process is required to re-image end user technology (e.g., laptops and mobile devices) when returning from overseas travel to an authoritarian country with a higher-than average risk for Intellectual Property (IP) theft or espionage against individuals and private companies. | Asset Management (AST) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• An IT Asset Management (ITAM) function, or similar function, governs asset management to help ensure compliance with requirements for asset management.
• An ITAM function, or similar function, maintains an inventory of IT assets, covering both physical and virtual assets, as well as centrally managed asset ownership assignments.
• Technology assets and data are categorized according to data classification and business criticality criteria.
• A Cybersecurity Supply Chain Risk Management (C-SCRM) function oversees supply chain risks including the removal and prevention of certain technology services and/ or equipment designated as supply chain threats by a statutory or regulatory body.
• Data/process owners document where sensitive/regulated data is stored, transmitted and processed, generating Data Flow Diagrams (DFDs) and network diagrams to document the flow of data.
• ITAM reimages the devices prior to re-issue. | See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to re-image end user technology (e.g., laptops and mobile devices) when returning from overseas travel to an authoritarian country with a higher-than average risk for Intellectual Property (IP) theft or espionage against individuals and private companies. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to re-image end user technology (e.g., laptops and mobile devices) when returning from overseas travel to an authoritarian country with a higher-than average risk for Intellectual Property (IP) theft or espionage against individuals and private companies. | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 3.4.12.b | null | A.03.04.12.b | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | M.3.4.8.4 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 1300
1556 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | R-AC-1
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-4
R-GV-6
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
R-SA-2 | R-AC-1 | null | null | R-AC-4 | R-AM-1 | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | R-EX-6 | R-EX-7 | R-GV-1 | R-GV-2 | null | R-GV-4 | null | R-GV-6 | null | null | R-IR-1 | R-IR-2 | R-IR-3 | R-IR-4 | R-SA-1 | R-SA-2 | NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | NT-9 | NT-10 | NT-11 | NT-12 | NT-13 | NT-14 | MT-1 | MT-2 | MT-3 | MT-4 | MT-5 | MT-6 | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Asset Management | System Administrative Processes | AST-26 | Mechanisms exist to develop, implement and govern system administration processes, with corresponding Standardized Operating Procedures (SOP), for operating and maintaining systems, applications and services. | null | null | Does the organization develop, implement and govern system administration processes, with corresponding Standardized Operating Procedures (SOP), for operating and maintaining systems, applications and services? | 9 | Identify | null | X | null | There is no evidence of a capability to develop, implement and govern system administration processes, with corresponding Standardized Operating Procedures (SOP), for operating and maintaining systems, applications and services. | SP-CMM1 is N/A, since a structured process is required to develop, implement and govern system administration processes, with corresponding Standardized Operating Procedures (SOP), for operating and maintaining systems, applications and services. | Asset Management (AST) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Asset management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for asset management.
• Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• Asset management is formally assigned as an additional duty to existing IT/cybersecurity personnel.
• Technology assets are categorized according to data classification and business criticality.
• Inventories cover technology assets in scope for statutory, regulatory and/ or contractual compliance, which includes both physical and virtual assets.
• Software licensing is tracked as part of IT asset inventories.
• Users are educated on their responsibilities to protect technology assets assigned to them or under their supervision.
• IT/cybersecurity personnel maintain network diagrams to document the flow of sensitive/regulated data across the network. | Asset Management (AST) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• An IT Asset Management (ITAM) function, or similar function, governs asset management to help ensure compliance with requirements for asset management.
• An ITAM function, or similar function, maintains an inventory of IT assets, covering both physical and virtual assets, as well as centrally managed asset ownership assignments.
• Technology assets and data are categorized according to data classification and business criticality criteria.
• A Cybersecurity Supply Chain Risk Management (C-SCRM) function oversees supply chain risks including the removal and prevention of certain technology services and/ or equipment designated as supply chain threats by a statutory or regulatory body.
• Data/process owners document where sensitive/regulated data is stored, transmitted and processed, generating Data Flow Diagrams (DFDs) and network diagrams to document the flow of data.
• A Governance, Risk & Compliance (GRC) function, or similar function, enables the documentation of Standardized Operating Procedures (SOP), or similar mechanisms, at the business process-level to identify and document day-to-day procedures enabling the proper execution of assigned tasks. | See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to develop, implement and govern system administration processes, with corresponding Standardized Operating Procedures (SOP), for operating and maintaining systems, applications and services. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to develop, implement and govern system administration processes, with corresponding Standardized Operating Procedures (SOP), for operating and maintaining systems, applications and services. | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | G.2.6 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0042
1380
1381 | null | null | null | null | null | null | null | null | null | null | null | null | null | 3.4.10.C.01
3.4.10.C.02
5.1.11.C.01
5.1.13.C.01
5.5.3.C.01
5.5.4.C.01
5.5.5.C.01
5.5.6.C.01
18.6.10.C.01 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
R-SA-2 | R-AC-1 | R-AC-2 | R-AC-3 | R-AC-4 | R-AM-1 | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | R-EX-6 | R-EX-7 | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | R-GV-8 | R-IR-1 | R-IR-2 | R-IR-3 | R-IR-4 | R-SA-1 | R-SA-2 | NT-7
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | MT-3 | MT-4 | MT-5 | MT-6 | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Asset Management | Jump Server | AST-27 | Mechanisms exist to conduct remote system administrative functions via a "jump box" or "jump server" that is located in a separate network zone to user workstations. | null | null | Does the organization conduct remote system administrative functions via a "jump box" or "jump server" that is located in a separate network zone to user workstations? | 7 | Protect | null | X | X | There is no evidence of a capability to conduct remote system administrative functions via a "jump box" or "jump server" that is located in a separate network zone to user workstations. | SP-CMM1 is N/A, since a structured process is required to conduct remote system administrative functions via a "jump box" or "jump server" that is located in a separate network zone to user workstations. | Asset Management (AST) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Asset management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for asset management.
• Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• Asset management is formally assigned as an additional duty to existing IT/cybersecurity personnel.
• Technology assets are categorized according to data classification and business criticality.
• Inventories cover technology assets in scope for statutory, regulatory and/ or contractual compliance, which includes both physical and virtual assets.
• Software licensing is tracked as part of IT asset inventories.
• Users are educated on their responsibilities to protect technology assets assigned to them or under their supervision.
• IT/cybersecurity personnel maintain network diagrams to document the flow of sensitive/regulated data across the network.
• Sensitive/regulated data environments are configured to require jump boxes to meet contractual obligations and prevent unauthorized access. | Asset Management (AST) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• An IT Asset Management (ITAM) function, or similar function, governs asset management to help ensure compliance with requirements for asset management.
• An ITAM function, or similar function, maintains an inventory of IT assets, covering both physical and virtual assets, as well as centrally managed asset ownership assignments.
• Technology assets and data are categorized according to data classification and business criticality criteria.
• A Cybersecurity Supply Chain Risk Management (C-SCRM) function oversees supply chain risks including the removal and prevention of certain technology services and/ or equipment designated as supply chain threats by a statutory or regulatory body.
• Data/process owners document where sensitive/regulated data is stored, transmitted and processed, generating Data Flow Diagrams (DFDs) and network diagrams to document the flow of data.
• Remote users are configured to use jump boxes as part of a Zero Trust Architecture (ZTA).
• Server environments are configured to require jump boxes for remote maintenance purposes. | See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to conduct remote system administrative functions via a "jump box" or "jump server" that is located in a separate network zone to user workstations. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to conduct remote system administrative functions via a "jump box" or "jump server" that is located in a separate network zone to user workstations. | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 3.1.12.a
3.1.12.c | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | N.5.2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 2-3-1-4 | TPC-41 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Principle 5.9 | Principle 5.11 | null | null | 1385
1387
1388 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
R-SA-2 | R-AC-1 | R-AC-2 | R-AC-3 | R-AC-4 | R-AM-1 | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | R-EX-6 | R-EX-7 | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | R-GV-8 | R-IR-1 | R-IR-2 | R-IR-3 | R-IR-4 | R-SA-1 | R-SA-2 | NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | NT-9 | NT-10 | NT-11 | NT-12 | NT-13 | NT-14 | MT-1 | MT-2 | MT-3 | MT-4 | MT-5 | MT-6 | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Asset Management | Database Administrative Processes | AST-28 | Mechanisms exist to develop, implement and govern database management processes, with corresponding Standardized Operating Procedures (SOP), for operating and maintaining databases. | null | null | Does the organization develop, implement and govern database management processes, with corresponding Standardized Operating Procedures (SOP), for operating and maintaining databases? | 9 | Identify | null | X | null | There is no evidence of a capability to develop, implement and govern database management processes, with corresponding Standardized Operating Procedures (SOP), for operating and maintaining databases. | SP-CMM1 is N/A, since a structured process is required to develop, implement and govern database management processes, with corresponding Standardized Operating Procedures (SOP), for operating and maintaining databases. | Asset Management (AST) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Asset management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for asset management.
• Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• Asset management is formally assigned as an additional duty to existing IT/cybersecurity personnel.
• Technology assets are categorized according to data classification and business criticality.
• Inventories cover technology assets in scope for statutory, regulatory and/ or contractual compliance, which includes both physical and virtual assets.
• Software licensing is tracked as part of IT asset inventories.
• Users are educated on their responsibilities to protect technology assets assigned to them or under their supervision.
• IT/cybersecurity personnel maintain network diagrams to document the flow of sensitive/regulated data across the network.
• Database administrators implement and maintain Database Management Systems (DBMSs), where applicable. | Asset Management (AST) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• An IT Asset Management (ITAM) function, or similar function, governs asset management to help ensure compliance with requirements for asset management.
• An ITAM function, or similar function, maintains an inventory of IT assets, covering both physical and virtual assets, as well as centrally managed asset ownership assignments.
• Technology assets and data are categorized according to data classification and business criticality criteria.
• A Cybersecurity Supply Chain Risk Management (C-SCRM) function oversees supply chain risks including the removal and prevention of certain technology services and/ or equipment designated as supply chain threats by a statutory or regulatory body.
• Data/process owners document where sensitive/regulated data is stored, transmitted and processed, generating Data Flow Diagrams (DFDs) and network diagrams to document the flow of data.
• Database administrators implement and maintain Database Management Systems (DBMSs), where applicable. | See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to develop, implement and govern database management processes, with corresponding Standardized Operating Procedures (SOP), for operating and maintaining databases. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to develop, implement and govern database management processes, with corresponding Standardized Operating Procedures (SOP), for operating and maintaining databases. | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | G.3.6 | 6.3 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 2-2-1-8 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 1269
1277
1270
1271
1272
1273
1243
1256
0393
1255
1268
1274
1275
1276
1278 | null | null | null | null | null | null | null | null | null | null | null | null | null | 3.4.10.C.01
3.4.10.C.02
5.1.11.C.01
5.1.13.C.01
5.5.3.C.01
5.5.4.C.01
5.5.5.C.01
5.5.6.C.01
20.4.3.C.01
20.4.3.C.02
20.4.3.C.03
20.4.3.C.04
20.4.4.C.01
20.4.4.C.02
20.4.5.C.01
20.4.5.C.02
20.4.6.C.01
20.4.6.C.02 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
R-SA-2 | R-AC-1 | R-AC-2 | R-AC-3 | R-AC-4 | R-AM-1 | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | R-EX-6 | R-EX-7 | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | R-GV-8 | R-IR-1 | R-IR-2 | R-IR-3 | R-IR-4 | R-SA-1 | R-SA-2 | NT-7
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | MT-3 | MT-4 | MT-5 | MT-6 | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Asset Management | Database Management System (DBMS) | AST-28.1 | Mechanisms exist to implement and maintain Database Management Systems (DBMSs), where applicable. | null | null | Does the organization implement and maintain Database Management Systems (DBMSs), where applicable? | 6 | Protect | null | X | X | There is no evidence of a capability to implement and maintain Database Management Systems (DBMSs), where applicable. | SP-CMM1 is N/A, since a structured process is required to implement and maintain Database Management Systems (DBMSs), where applicable. | Asset Management (AST) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Asset management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for asset management.
• Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• Asset management is formally assigned as an additional duty to existing IT/cybersecurity personnel.
• Technology assets are categorized according to data classification and business criticality.
• Inventories cover technology assets in scope for statutory, regulatory and/ or contractual compliance, which includes both physical and virtual assets.
• Software licensing is tracked as part of IT asset inventories.
• Users are educated on their responsibilities to protect technology assets assigned to them or under their supervision.
• IT/cybersecurity personnel maintain network diagrams to document the flow of sensitive/regulated data across the network.
• Database administrators implement and maintain Database Management Systems (DBMSs), where applicable. | Asset Management (AST) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• An IT Asset Management (ITAM) function, or similar function, governs asset management to help ensure compliance with requirements for asset management.
• An ITAM function, or similar function, maintains an inventory of IT assets, covering both physical and virtual assets, as well as centrally managed asset ownership assignments.
• Technology assets and data are categorized according to data classification and business criticality criteria.
• A Cybersecurity Supply Chain Risk Management (C-SCRM) function oversees supply chain risks including the removal and prevention of certain technology services and/ or equipment designated as supply chain threats by a statutory or regulatory body.
• Data/process owners document where sensitive/regulated data is stored, transmitted and processed, generating Data Flow Diagrams (DFDs) and network diagrams to document the flow of data.
• Database administrators implement and maintain Database Management Systems (DBMSs), where applicable. | See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to implement and maintain Database Management Systems (DBMSs), where applicable. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to implement and maintain Database Management Systems (DBMSs), where applicable. | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | D.1.3 | 6.3 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 1245
1246
1247
1249
1250
1251
1260
1261
1262
1263
1264 | null | null | null | null | null | null | null | null | null | null | null | null | null | 20.4.3.C.01
20.4.3.C.02
20.4.3.C.03
20.4.3.C.04
20.4.4.C.01
20.4.4.C.02
20.4.5.C.01
20.4.5.C.02
20.4.6.C.01
20.4.6.C.02 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
R-SA-2 | R-AC-1 | R-AC-2 | R-AC-3 | R-AC-4 | R-AM-1 | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | R-EX-6 | R-EX-7 | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | R-GV-8 | R-IR-1 | R-IR-2 | R-IR-3 | R-IR-4 | R-SA-1 | R-SA-2 | NT-7
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | MT-3 | MT-4 | MT-5 | MT-6 | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Asset Management | Radio Frequency Identification (RFID) Security | AST-29 | Mechanisms exist to securely govern Radio Frequency Identification (RFID) deployments to ensure RFID is used safely and securely to protect the confidentiality and integrity of data and prevent the compromise of secure spaces. | null | null | Does the organization securely govern Radio Frequency Identification (RFID) deployments to ensure RFID is used safely and securely to protect the confidentiality and integrity of data and prevent the compromise of secure spaces? | 3 | Protect | null | X | X | There is no evidence of a capability to securely govern Radio Frequency Identification (RFID) deployments to ensure RFID is used safely and securely to protect the confidentiality and integrity of data and prevent the compromise of secure spaces. | SP-CMM1 is N/A, since a structured process is required to securely govern Radio Frequency Identification (RFID) deployments to ensure RFID is used safely and securely to protect the confidentiality and integrity of data and prevent the compromise of secure spaces. | Asset Management (AST) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Asset management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for asset management.
• Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• Asset management is formally assigned as an additional duty to existing IT/cybersecurity personnel.
• Technology assets are categorized according to data classification and business criticality.
• Inventories cover technology assets in scope for statutory, regulatory and/ or contractual compliance, which includes both physical and virtual assets.
• Software licensing is tracked as part of IT asset inventories.
• Users are educated on their responsibilities to protect technology assets assigned to them or under their supervision.
• IT/cybersecurity personnel maintain network diagrams to document the flow of sensitive/regulated data across the network. | Asset Management (AST) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• An IT Asset Management (ITAM) function, or similar function, governs asset management to help ensure compliance with requirements for asset management.
• An ITAM function, or similar function, maintains an inventory of IT assets, covering both physical and virtual assets, as well as centrally managed asset ownership assignments.
• Technology assets and data are categorized according to data classification and business criticality criteria.
• A Cybersecurity Supply Chain Risk Management (C-SCRM) function oversees supply chain risks including the removal and prevention of certain technology services and/ or equipment designated as supply chain threats by a statutory or regulatory body.
• Data/process owners document where sensitive/regulated data is stored, transmitted and processed, generating Data Flow Diagrams (DFDs) and network diagrams to document the flow of data. | See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to securely govern Radio Frequency Identification (RFID) deployments to ensure RFID is used safely and securely to protect the confidentiality and integrity of data and prevent the compromise of secure spaces. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to securely govern Radio Frequency Identification (RFID) deployments to ensure RFID is used safely and securely to protect the confidentiality and integrity of data and prevent the compromise of secure spaces. | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | P.7.5 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 11.6.59.C.01
11.6.59.C.02
11.6.60.C.01
11.6.60.C.02
11.6.60.C.03
11.6.60.C.04
11.6.61.C.01
11.6.61.C.02
11.6.62.C.01
11.6.62.C.02
11.6.62.C.03
11.6.63.C.01
11.6.63.C.02
11.6.64.C.01
11.6.65.C.01
11.6.65.C.02
11.6.65.C.03
11.6.66.C.01
11.6.67.C.01
11.6.67.C.02
11.6.68.C.01
11.6.69.C.01
11.6.70.C.01
11.6.71.C.01
11.6.72.C.01
11.6.72.C.02
11.6.72.C.03 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1 | R-AC-1 | R-AC-2 | R-AC-3 | R-AC-4 | null | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | null | null | null | null | R-EX-5 | R-EX-6 | R-EX-7 | R-GV-1 | R-GV-2 | null | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | R-GV-8 | R-IR-1 | R-IR-2 | R-IR-3 | R-IR-4 | R-SA-1 | null | NT-7
MT-1
MT-2
MT-5
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | MT-5 | null | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Asset Management | Contactless Access Control Systems | AST-29.1 | Mechanisms exist to securely configure contactless access control systems incorporating contactless RFID or smart cards to protect the confidentiality and integrity of data and prevent the compromise of secure spaces. | null | null | Does the organization securely configure contactless access control systems incorporating contactless RFID or smart cards to protect the confidentiality and integrity of data and prevent the compromise of secure spaces? | 3 | Protect | null | X | X | There is no evidence of a capability to securely configure contactless access control systems incorporating contactless RFID or smart cards to protect the confidentiality and integrity of data and prevent the compromise of secure spaces. | SP-CMM1 is N/A, since a structured process is required to securely configure contactless access control systems incorporating contactless RFID or smart cards to protect the confidentiality and integrity of data and prevent the compromise of secure spaces. | Asset Management (AST) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Asset management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for asset management.
• Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• Asset management is formally assigned as an additional duty to existing IT/cybersecurity personnel.
• Technology assets are categorized according to data classification and business criticality.
• Inventories cover technology assets in scope for statutory, regulatory and/ or contractual compliance, which includes both physical and virtual assets.
• Software licensing is tracked as part of IT asset inventories.
• Users are educated on their responsibilities to protect technology assets assigned to them or under their supervision.
• IT/cybersecurity personnel maintain network diagrams to document the flow of sensitive/regulated data across the network. | Asset Management (AST) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• An IT Asset Management (ITAM) function, or similar function, governs asset management to help ensure compliance with requirements for asset management.
• An ITAM function, or similar function, maintains an inventory of IT assets, covering both physical and virtual assets, as well as centrally managed asset ownership assignments.
• Technology assets and data are categorized according to data classification and business criticality criteria.
• A Cybersecurity Supply Chain Risk Management (C-SCRM) function oversees supply chain risks including the removal and prevention of certain technology services and/ or equipment designated as supply chain threats by a statutory or regulatory body.
• Data/process owners document where sensitive/regulated data is stored, transmitted and processed, generating Data Flow Diagrams (DFDs) and network diagrams to document the flow of data. | See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to securely configure contactless access control systems incorporating contactless RFID or smart cards to protect the confidentiality and integrity of data and prevent the compromise of secure spaces. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to securely configure contactless access control systems incorporating contactless RFID or smart cards to protect the confidentiality and integrity of data and prevent the compromise of secure spaces. | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | P.7.5 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 11.7.29.C.01
11.7.29.C.02
11.7.30.C.01
11.7.30.C.02
11.7.30.C.03
11.7.31.C.01
11.7.31.C.02
11.7.32.C.01
11.7.32.C.02
11.7.32.C.03
11.7.32.C.04
11.7.33.C.01
11.7.33.C.02
11.7.33.C.03
11.7.34.C.01 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1 | R-AC-1 | R-AC-2 | R-AC-3 | R-AC-4 | null | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | null | null | null | null | R-EX-5 | R-EX-6 | R-EX-7 | R-GV-1 | R-GV-2 | null | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | R-GV-8 | R-IR-1 | R-IR-2 | R-IR-3 | R-IR-4 | R-SA-1 | null | NT-7
MT-1
MT-2
MT-5
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | MT-5 | null | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Asset Management | Decommissioning | AST-30 | Mechanisms exist to ensure systems, applications and services are properly decommissioned so that data is properly transitioned to new systems or archived in accordance with applicable organizational standards, as well as statutory, regulatory and contractual obligations. | null | null | Does the organization ensure systems, applications and services are properly decommissioned so that data is properly transitioned to new systems or archived in accordance with applicable organizational standards, as well as statutory, regulatory and contractual obligations? | 4 | Protect | null | X | X | There is no evidence of a capability to ensure systems, applications and services are properly decommissioned so that data is properly transitioned to new systems or archived in accordance with applicable organizational standards, as well as statutory, regulatory and contractual obligations. | SP-CMM1 is N/A, since a structured process is required to ensure systems, applications and services are properly decommissioned so that data is properly transitioned to new systems or archived in accordance with applicable organizational standards, as well as statutory, regulatory and contractual obligations. | Asset Management (AST) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Asset management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for asset management.
• Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• Asset management is formally assigned as an additional duty to existing IT/cybersecurity personnel.
• Technology assets are categorized according to data classification and business criticality.
• Inventories cover technology assets in scope for statutory, regulatory and/ or contractual compliance, which includes both physical and virtual assets.
• Software licensing is tracked as part of IT asset inventories.
• Users are educated on their responsibilities to protect technology assets assigned to them or under their supervision.
• IT/cybersecurity personnel maintain network diagrams to document the flow of sensitive/regulated data across the network.
• Asset decommissioning consists of mainly wiping hard drives. | Asset Management (AST) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• An IT Asset Management (ITAM) function, or similar function, governs asset management to help ensure compliance with requirements for asset management.
• An ITAM function, or similar function, maintains an inventory of IT assets, covering both physical and virtual assets, as well as centrally managed asset ownership assignments.
• Technology assets and data are categorized according to data classification and business criticality criteria.
• A Cybersecurity Supply Chain Risk Management (C-SCRM) function oversees supply chain risks including the removal and prevention of certain technology services and/ or equipment designated as supply chain threats by a statutory or regulatory body.
• Data/process owners document where sensitive/regulated data is stored, transmitted and processed, generating Data Flow Diagrams (DFDs) and network diagrams to document the flow of data.
• Asset decommissioning is formalized to ensure that systems, applications and services are properly decommissioned and data is properly transitioned to new systems or archived in accordance with applicable organizational standards, as well as statutory, regulatory and contractual requirements. | See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to ensure systems, applications and services are properly decommissioned so that data is properly transitioned to new systems or archived in accordance with applicable organizational standards, as well as statutory, regulatory and contractual obligations. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to ensure systems, applications and services are properly decommissioned so that data is properly transitioned to new systems or archived in accordance with applicable organizational standards, as well as statutory, regulatory and contractual obligations. | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | GOVERN 1.7 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | D.13 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 2-6-1-3 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 8.1.5.P | null | null | 2.3.30.C.01
13.1.9.C.01
13.1.10.C.01
13.1.10.C.02
13.1.10.C.03
13.1.10.C.04
13.1.11.C.01
13.1.12.C.01
13.1.12.C.02
13.1.12.C.03
13.1.13.C.01
13.1.13.C.02
13.1.13.C.03
13.1.13.C.04
13.1.14.C.01 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
R-SA-2 | R-AC-1 | R-AC-2 | R-AC-3 | R-AC-4 | R-AM-1 | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | R-EX-6 | R-EX-7 | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | R-GV-8 | R-IR-1 | R-IR-2 | R-IR-3 | R-IR-4 | R-SA-1 | R-SA-2 | NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | NT-9 | NT-10 | NT-11 | NT-12 | NT-13 | NT-14 | MT-1 | MT-2 | MT-3 | MT-4 | MT-5 | MT-6 | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Asset Management | Asset Categorization | AST-31 | Mechanisms exist to categorize technology assets. | null | E-AST-24 | Does the organization categorize technology assets? | 9 | Identify | X | X | X | There is no evidence of a capability to categorize technology assets. | SP-CMM1 is N/A, since a structured process is required to categorize technology assets. | Asset Management (AST) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Asset management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for asset management.
• Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• Asset management is formally assigned as an additional duty to existing IT/cybersecurity personnel.
• Technology assets are categorized according to data classification and business criticality.
• Inventories cover technology assets in scope for statutory, regulatory and/ or contractual compliance, which includes both physical and virtual assets.
• Software licensing is tracked as part of IT asset inventories.
• Users are educated on their responsibilities to protect technology assets assigned to them or under their supervision.
• IT/cybersecurity personnel maintain network diagrams to document the flow of sensitive/regulated data across the network.
• Data/process owners categorize data in accordance with organizational policies and standards. | Asset Management (AST) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• An IT Asset Management (ITAM) function, or similar function, governs asset management to help ensure compliance with requirements for asset management.
• An ITAM function, or similar function, maintains an inventory of IT assets, covering both physical and virtual assets, as well as centrally managed asset ownership assignments.
• Technology assets and data are categorized according to data classification and business criticality criteria.
• A Cybersecurity Supply Chain Risk Management (C-SCRM) function oversees supply chain risks including the removal and prevention of certain technology services and/ or equipment designated as supply chain threats by a statutory or regulatory body.
• Data/process owners document where sensitive/regulated data is stored, transmitted and processed, generating Data Flow Diagrams (DFDs) and network diagrams to document the flow of data.
• Data/process owners categorize data in accordance with organizational policies and standards.
• A data classification process exists to identify categories of data and specific protection requirements.
• Administrative processes and technologies identify by data classification type to ensure adequate cybersecurity & data privacy controls are in place to protect organizational information and individual data privacy. | See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to categorize technology assets. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to categorize technology assets. | null | null | null | null | null | null | null | null | null | null | null | null | null | null | RQ-15-06 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | MAP 2.0 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | A3.a | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
R-SA-2 | R-AC-1 | R-AC-2 | R-AC-3 | R-AC-4 | R-AM-1 | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | R-EX-6 | R-EX-7 | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | R-GV-8 | R-IR-1 | R-IR-2 | R-IR-3 | R-IR-4 | R-SA-1 | R-SA-2 | NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | NT-9 | NT-10 | NT-11 | NT-12 | NT-13 | NT-14 | MT-1 | MT-2 | MT-3 | MT-4 | MT-5 | MT-6 | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Asset Management | Categorize Artificial Intelligence (AI)-Related Technologies | AST-31.1 | Mechanisms exist to categorize Artificial Intelligence (AI) and Autonomous Technologies (AAT). | null | E-AST-24 | Does the organization categorize Artificial Intelligence (AI) and Autonomous Technologies (AAT)? | 9 | Identify | X | X | X | There is no evidence of a capability to categorize Artificial Intelligence (AI) and Autonomous Technologies (AAT). | SP-CMM1 is N/A, since a structured process is required to categorize Artificial Intelligence (AI) and Autonomous Technologies (AAT). | SP-CMM2 is N/A, since a well-defined process is required to categorize Artificial Intelligence (AI) and Autonomous Technologies (AAT). | Asset Management (AST) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• An IT Asset Management (ITAM) function, or similar function, governs asset management to help ensure compliance with requirements for asset management.
• An ITAM function, or similar function, maintains an inventory of IT assets, covering both physical and virtual assets, as well as centrally managed asset ownership assignments.
• Technology assets and data are categorized according to data classification and business criticality criteria.
• A Cybersecurity Supply Chain Risk Management (C-SCRM) function oversees supply chain risks including the removal and prevention of certain technology services and/ or equipment designated as supply chain threats by a statutory or regulatory body.
• Data/process owners document where sensitive/regulated data is stored, transmitted and processed, generating Data Flow Diagrams (DFDs) and network diagrams to document the flow of data.
• A data classification process exists to identify categories of data and specific protection requirements.
• Administrative processes and technologies identify by data classification type to ensure adequate cybersecurity & data privacy controls are in place to protect organizational information and individual data privacy. | See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to categorize Artificial Intelligence (AI) and Autonomous Technologies (AAT). | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to categorize Artificial Intelligence (AI) and Autonomous Technologies (AAT). | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | MAP 2.0 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1 | R-AC-1 | R-AC-2 | R-AC-3 | R-AC-4 | R-AM-1 | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | R-EX-6 | R-EX-7 | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | R-GV-8 | R-IR-1 | R-IR-2 | R-IR-3 | R-IR-4 | R-SA-1 | null | NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-9
NT-10
NT-11
NT-12
NT-13
MT-7
MT-8
MT-9
MT-10
MT-12
MT-13
MT-14
MT-15 | null | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | null | NT-9 | NT-10 | NT-11 | NT-12 | NT-13 | null | null | null | null | null | null | null | MT-7 | MT-8 | MT-9 | MT-10 | null | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Business Continuity & Disaster Recovery | Business Continuity Management System (BCMS) | BCD-01 | Mechanisms exist to facilitate the implementation of contingency planning controls to help ensure resilient assets and services (e.g., Continuity of Operations Plan (COOP) or Business Continuity & Disaster Recovery (BC/DR) playbooks). | - Business Continuity Plan (BCP)
- Disaster Recovery Plan (DRP)
- Continuity of Operations Plan (COOP)
- Business Impact Analysis (BIA)
- Criticality assessments | E-BCM-01 | Does the organization facilitate the implementation of contingency planning controls to help ensure resilient assets and services (e.g., Continuity of Operations Plan (COOP) or Business Continuity & Disaster Recovery (BC/DR) playbooks)? | 10 | Recover | X | X | X | There is no evidence of a capability to facilitate the implementation of contingency planning controls to help ensure resilient assets and services. | Business Continuity & Disaster Recovery (BCD) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• IT personnel work with business stakeholders to identify business-critical systems and services, including internal teams and third-party service providers.
• IT personnel develop limited Disaster Recovery Plans (DRP) to recover business-critical systems and services.
• Business stakeholders develop limited Business Continuity Plans (BCPs) to ensure business-critical functions are sustainable both during and after an incident within Recovery Time Objectives (RTOs).
• Backups are performed ad-hoc and focus on business-critical systems.
• Limited technologies exist to support near real-time network infrastructure failover (e.g., redundant ISPs, redundant power, etc.). | Business Continuity & Disaster Recovery (BCD) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Business Continuity / Disaster Recovery (BC/DR) management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for BC/DR management.
• IT/cybersecurity personnel work with business stakeholders to identify business-critical systems, services, internal teams and third-party service providers.
• BC/DR roles are formally assigned as an additional duty to existing IT/cybersecurity personnel.
• Recovery Time Objectives (RTOs) identify business-critical systems and services, which are given priority of service in alternate processing and storage sites.
• IT personnel develop Disaster Recovery Plans (DRP) to recover business-critical systems and services.
• Data/process owners conduct a Business Impact Analysis (BIA) at least annually, or after any major technology or process change, to identify assets critical to the business in need of protection, as well as single points of failure.
• IT/cybersecurity personnel work with business stakeholders to develop Business Continuity Plans (BCPs) to ensure business functions are sustainable both during and after an incident within Recovery Time Objectives (RTOs).
• Within the BCPs, alternate communications channels have been defined and alternative decision-makers are designated if primary decision-makers are unavailable.
• IT personnel use a backup methodology (e.g., grandfather, father & s on rotation) to store backups in a secondary location, separate from the primary storage site.
• IT personnel configure business-critical systems to transfer backup data to the alternate storage site at a rate that is capable of meeting Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs). | Business Continuity & Disaster Recovery (BCD) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• The Chief Information Security Officer (CISO), or similar function, analyzes the organization’s business strategy and security function objectives to determine prioritization of and authoritative guidance for Business Continuity & Disaster Recovery (BC/DR) practices, within the broader scope of cybersecurity and data protection operations.
• The CISO, or similar function, develops a security-focused Concept of Operations (CONOPS) that documents management, operational and technical measures to apply defense-in-depth techniques across the organization. This CONOPS for continuity of operations may be incorporated as part of a broader operational plan for the cybersecurity & data privacy program.
• A Governance, Risk & Compliance (GRC) team, or similar function, provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data. Compliance requirements for data backups are identified and documented.
• A steering committee is formally established to provide executive oversight of the cybersecurity & data privacy program, including BC/DR and establishes a clear and authoritative accountability structure for BC/DR operations.
• A formal Business Continuity & Disaster Recovery (BC/DR) program exists with defined roles and responsibilities to restore functionality in the event of a catastrophe, emergency, or significant disruptive incident that is handled in accordance with the Continuity of Operations Plan (COOP).
• BC/DR personnel work with business stakeholders to identify business-critical systems, services, internal teams and third-party service providers.
• Application/system/process owners conduct a Business Impact Analysis (BIA) at least annually, or after any major technology or process change, to identify assets critical to the business in need of protection, as well as single points of failure.
• Recovery Time Objectives (RTOs) are defined.
• Recovery Point Objectives (RPOs) are defined.
• Controls are assigned to sensitive/regulated assets to comply with specific BC/DR requirements to facilitate recovery operations in accordance with RTOs and RPOs.
• IT personnel work with business stakeholders to develop Disaster Recovery Plans (DRP) to recover business-critical systems and services within RPOs.
• Business stakeholders work with IT personnel to develop Business Continuity Plans (BCPs) to ensure business functions are sustainable both during and after an incident within RTOs.
• Within the BCPs, alternate communications channels have been defined and alternative decision-makers are designated if primary decision-makers are unavailable.
• The data backup function is formally assigned with defined roles and responsibilities. | Business Continuity & Disaster Recovery (BCD) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to facilitate the implementation of contingency planning controls to help ensure resilient assets and services. | CC7.5
CC9.1 | CC7.4-POF5
CC7.5-POF1
CC7.5-POF2
CC7.5-POF4
CC7.5-POF5
CC9.1-POF1
CC9.1-POF2
A1.2-POF1
A1.2-POF2
A1.2-POF3
A1.2-POF4
A1.2-POF5
A1.2-POF6 | null | 11.0
11.1 | 11.1 | 11.1 | 11.1 | DSS04.01
DSS04.02
DSS04.03
DSS04.04
DSS04.05
DSS04.06
DSS04.07
DSS04.08 | null | BCR-01
BCR-03
BCR-04
BCR-05
BCR-07
BCR-09 | GVN-03 | SO19
SO20 | null | null | null | 4.3
4.3.1
4.3.2
4.4
5.1
5.2
5.2.1
6.1
6.1.1
6.1.2
6.2
6.2.1
6.2.2
7.4
7.5.1
8.3
8.3.1
8.3.2
8.3.3
8.3.4
8.3.5
10.1
10.1.1
10.1.2
10.1.3
10.2 | null | null | 17.1.1
17.1.2 | 5.29
5.30 | 17.1.1
17.1.2 | null | 6.14.1.2 | null | null | null | T1485, T1486, T1490, T1491, T1491.001, T1491.002, T1561, T1561.001, T1561.002 | OR-1.2
OR-3.4
TS-1.5 | Sec 4(D)(2)(b)
Sec 4(D)(2)(i) | GOVERN 6.2 | PR.PO-P7 | null | null | null | CP-1
CP-2
IR-4(3)
PM-8
CP-10 | CP-1
CP-2
CP-10 | CP-1
CP-2
CP-10 | CP-1
CP-2
CP-10 | CP-1
CP-2
IR-4(3)
PM-8
CP-10 | null | CP-1
CP-2
CP-10 | CP-1
CP-2
CP-10 | CP-1
CP-2
CP-10 | IR-4(3)
PM-8 | null | CP-1
CP-2
CP-10 | CP-1
CP-2
CP-10 | CP-1
CP-2
CP-10 | null | CP-1
CP-2
PM-8 | CP-1
CP-2 | null | CP-1
PM-8 | CP-1
CP-2 | CP-1
CP-2 | null | null | null | null | null | null | ID.BE-5
PR.IP-9
RC.RP-1 | GV.OC-04
GV.OC-05
ID.IM-04
PR.IR-04
RC.RP-01
RC.RP-02
RC.RP-03
RC.RP-04
RC.RP-05
RC.RP-06
RC.CO-03
RC.CO-04 | null | null | null | null | null | null | null | null | null | null | null | null | K.4 | null | 3.1.2 | null | null | null | RESPONSE-4.A.MIL1
RESPONSE-4.D.MIL2
RESPONSE-4.H.MIL2
RESPONSE-4.M.MIL3 | EC:SG4.SP5
EF:SG2.SP1
RRM:SG1.SP3
RRM:SG1.SP4
SC:SG1.SP1
SC:SG2.SP1
SC:SG3.SP2
SC:SG3.SP3
SC:SG3.SP4
SC:SG7.SP2 | null | null | null | null | null | null | null | null | CP-1
CP-2
PM-8
CP-10 | null | null | null | null | null | null | null | CP-1
CP-2
IR-4(3) | CP-1
CP-2 | CP-1
CP-2 | CP-1
CP-2
IR-4(3) | CP-1
CP-2 | CP-1
CP-2 | CP-1
CP-2 | CP-1
CP-2 | CP-1
CP-2 | CP-1
CP-2 | null | D5.IR.Pl.B.6 | null | null | null | 164.308(a)(7)(ii)(B)
164.308(a)(7)(ii)(C)
164.310(b) | null | null | null | CP-1
CP-2
CP-10 | null | null | 8-104
8-603
8-614 | 6.1 | null | null | null | null | null | CP-1
CP-2 | CP-1
CP-2 | CP-1
CP-2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 38-99-20(D)(2)(b)
38-99-20(D)(2)(i) | null | null | CP-1
CP-2
CP-10 | CP-1
CP-2
CP-10 | CP-1
CP-2
CP-10 | null | null | null | 3.7(77)
3.7.1(78)
3.7.1(79)
3.7.2(80)
3.7.2(81)
3.7.2(82)
3.7.3(83)
3.7.3(84)(a)
3.7.3(84)(b)
3.7.3(84)(c)
3.7.3(85)
3.7.3(86) | Art 11.1
Art 11.2
Art 11.2(a)
Art 11.2(b)
Art 11.2(c)
Art 11.2(d)
Art 11.2(e)
Art 11.3
Art 11.4
Art 11.5
Art 11.6(a)
Art 11.6(b)
Art 11.7
Art 11.8
Art 11.9
Art 11.10
Art 11.11
Art 12.1
Art 12.1(a)
Art 12.1(b) | null | Art 32.1
Art 32.2 | Article 21.2(c) | null | null | Sec 14
Sec 15 | Art 16 | null | null | null | null | null | 10.1
10.2
10.3
10.5 | BCM-01
BCM-02
BCM-03 | null | null | null | 11.7
25.1 | null | null | null | null | null | null | null | null | null | null | null | 2-8
3-1
3-1-1-1
3-1-1-2 | TPC-67
TPC-68
TPC-69 | null | 2-4-4
2-9-1
2-9-2
2-9-3
2-9-3-1
2-9-4
3-1-1
3-1-2
3-1-3
3-1-3-1
3-1-3-2
3-1-3-3
3-1-4 | 3-1
3-1-1
3-1-1-1
3-1-1-2
3-1-1-3
3-1-1-4
3-1-1-5
3-1-1-6
3-1-2 | null | null | Sec 19.1
Sec 19.2 | null | 7.5.1 [OP.CONT.1]
7.5.2 [OP.CONT.2] | null | null | null | null | B5.a
B5.b | D1 | null | null | null | null | null | null | null | null | 0734 | null | 12(b)
14
34(a)
34(b)
34(c)
34(d)
34(e)
40(a)
40(b)
40(c)
40(d)
40(e)
41 | null | null | null | null | null | null | null | null | 17.1.1
17.1.2 | null | 13.1 | 6.4.5.C.01
6.4.7.C.01
6.4.8.C.01
23.4.12.C.01
23.4.12.C.02 | null | null | null | null | 8.1.1
8.1.2
8.1.3
8.1.4
8.2.1
8.2.2
8.2.3
8.2.4
8.5.1
8.5.2
8.5.2(a)
8.5.2(b)
8.5.2(c) | null | null | null | null | null | 6.14
7.1 | null | 2.9 | 2.9
2.9.1
2.9.2 | null | null | null | null | null | null | null | null | null | null | x | NAIC | x | x | R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1 | null | null | null | null | R-AM-1 | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | null | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | null | null | null | R-IR-1 | R-IR-2 | R-IR-3 | R-IR-4 | R-SA-1 | null | NT-1
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15
MT-16 | NT-1 | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | NT-9 | NT-10 | NT-11 | NT-12 | NT-13 | NT-14 | MT-1 | MT-2 | MT-3 | MT-4 | MT-5 | MT-6 | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | MT-16 | null |
Business Continuity & Disaster Recovery | Coordinate with Related Plans | BCD-01.1 | Mechanisms exist to coordinate contingency plan development with internal and external elements responsible for related plans. | - Cybersecurity Incident Response Plan (IIRP) | null | Does the organization coordinate contingency plan development with internal and external elements responsible for related plans? | 5 | Recover | null | X | X | There is no evidence of a capability to coordinate contingency plan development with internal and external elements responsible for related plans. | Business Continuity & Disaster Recovery (BCD) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• IT personnel work with business stakeholders to identify business-critical systems and services, including internal teams and third-party service providers.
• IT personnel develop limited Disaster Recovery Plans (DRP) to recover business-critical systems and services.
• Business stakeholders develop limited Business Continuity Plans (BCPs) to ensure business-critical functions are sustainable both during and after an incident within Recovery Time Objectives (RTOs).
• Backups are performed ad-hoc and focus on business-critical systems.
• Limited technologies exist to support near real-time network infrastructure failover (e.g., redundant ISPs, redundant power, etc.). | Business Continuity & Disaster Recovery (BCD) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Business Continuity / Disaster Recovery (BC/DR) management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for BC/DR management.
• BC/DR roles are formally assigned as an additional duty to existing IT/cybersecurity personnel.
• Recovery Time Objectives (RTOs) identify business-critical systems and services, which are given priority of service in alternate processing and storage sites.
• IT personnel develop Disaster Recovery Plans (DRP) to recover business-critical systems and services.
• Data/process owners conduct a Business Impact Analysis (BIA) at least annually, or after any major technology or process change, to identify assets critical to the business in need of protection, as well as single points of failure.
• IT/cybersecurity personnel work with business stakeholders to develop Business Continuity Plans (BCPs) to ensure business functions are sustainable both during and after an incident within Recovery Time Objectives (RTOs).
• IT personnel use a backup methodology (e.g., grandfather, father & s on rotation) to store backups in a secondary location, separate from the primary storage site.
• IT personnel configure business-critical systems to transfer backup data to the alternate storage site at a rate that is capable of meeting Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs). | Business Continuity & Disaster Recovery (BCD) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A formal Business Continuity & Disaster Recovery (BC/DR) program exists with defined roles and responsibilities to restore functionality in the event of a catastrophe, emergency, or significant disruptive incident that is handled in accordance with the Continuity of Operations Plan (COOP).
• BC/DR personnel work with business stakeholders to identify business-critical systems, services, internal teams and third-party service providers.
• Application/system/process owners conduct a Business Impact Analysis (BIA) at least annually, or after any major technology or process change, to identify assets critical to the business in need of protection, as well as single points of failure.
• Recovery Time Objectives (RTOs) are defined.
• Recovery Point Objectives (RPOs) are defined.
• Controls are assigned to sensitive/regulated assets to comply with specific BC/DR requirements to facilitate recovery operations in accordance with RTOs and RPOs.
• IT personnel work with business stakeholders to develop Disaster Recovery Plans (DRP) to recover business-critical systems and services within RPOs.
• Business stakeholders work with IT personnel to develop Business Continuity Plans (BCPs) to ensure business functions are sustainable both during and after an incident within RTOs.
• The data backup function is formally assigned with defined roles and responsibilities. | Business Continuity & Disaster Recovery (BCD) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to coordinate contingency plan development with internal and external elements responsible for related plans. | null | null | null | null | null | null | null | null | null | BCR-06 | null | null | null | null | null | null | null | null | null | 5.29
5.30 | null | null | null | null | null | null | null | TS-1.5 | null | null | null | null | null | null | CP-2(1) | null | CP-2(1) | CP-2(1) | CP-2(1) | null | null | CP-2(1) | CP-2(1) | null | null | null | CP-2(1) | CP-2(1) | null | CP-2(1) | null | null | null | CP-2(1) | CP-2(1) | null | null | null | null | null | null | null | GV.SC-08 | null | null | null | null | null | null | null | null | null | null | null | null | K.1.47 | null | null | null | null | null | null | SC:SG4.SP2 | null | null | null | null | null | null | null | null | CP-2(1) | null | null | null | null | null | null | null | CP-2(1) | null | CP-2(1) | CP-2(1) | null | CP-2(1) | null | CP-2(1) | CP-2(1) | null | null | null | null | null | null | null | null | null | null | CP-2(1) | null | null | null | null | null | null | null | null | null | null | null | CP-2(1) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | CP-2(1) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 25.2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 3-1-3-2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1 | null | null | null | null | R-AM-1 | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | null | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | null | null | null | R-IR-1 | R-IR-2 | R-IR-3 | R-IR-4 | R-SA-1 | null | NT-7
MT-1
MT-2
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | null | null | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Business Continuity & Disaster Recovery | Coordinate With External Service Providers | BCD-01.2 | Mechanisms exist to coordinate internal contingency plans with the contingency plans of external service providers to ensure that contingency requirements can be satisfied. | - Business Continuity Plan (BCP)
- Disaster Recovery Plan (DRP)
- Continuity of Operations Plan (COOP) | null | Does the organization coordinate internal contingency plans with the contingency plans of external service providers to ensure that contingency requirements can be satisfied? | 5 | Recover | null | null | X | There is no evidence of a capability to coordinate internal contingency plans with the contingency plans of external service providers to ensure that contingency requirements can be satisfied. | Business Continuity & Disaster Recovery (BCD) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• IT personnel work with business stakeholders to identify business-critical systems and services, including internal teams and third-party service providers.
• IT personnel develop limited Disaster Recovery Plans (DRP) to recover business-critical systems and services.
• Business stakeholders develop limited Business Continuity Plans (BCPs) to ensure business-critical functions are sustainable both during and after an incident within Recovery Time Objectives (RTOs).
• Backups are performed ad-hoc and focus on business-critical systems.
• Limited technologies exist to support near real-time network infrastructure failover (e.g., redundant ISPs, redundant power, etc.). | Business Continuity & Disaster Recovery (BCD) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Business Continuity / Disaster Recovery (BC/DR) management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for BC/DR management.
• BC/DR roles are formally assigned as an additional duty to existing IT/cybersecurity personnel.
• Recovery Time Objectives (RTOs) identify business-critical systems and services, which are given priority of service in alternate processing and storage sites.
• IT personnel develop Disaster Recovery Plans (DRP) to recover business-critical systems and services.
• Data/process owners conduct a Business Impact Analysis (BIA) at least annually, or after any major technology or process change, to identify assets critical to the business in need of protection, as well as single points of failure.
• IT/cybersecurity personnel work with business stakeholders to develop Business Continuity Plans (BCPs) to ensure business functions are sustainable both during and after an incident within Recovery Time Objectives (RTOs).
• IT personnel use a backup methodology (e.g., grandfather, father & s on rotation) to store backups in a secondary location, separate from the primary storage site.
• IT personnel configure business-critical systems to transfer backup data to the alternate storage site at a rate that is capable of meeting Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs). | Business Continuity & Disaster Recovery (BCD) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A formal Business Continuity & Disaster Recovery (BC/DR) program exists with defined roles and responsibilities to restore functionality in the event of a catastrophe, emergency, or significant disruptive incident that is handled in accordance with the Continuity of Operations Plan (COOP).
• BC/DR personnel work with business stakeholders to identify business-critical systems, services, internal teams and third-party service providers.
• Application/system/process owners conduct a Business Impact Analysis (BIA) at least annually, or after any major technology or process change, to identify assets critical to the business in need of protection, as well as single points of failure.
• Recovery Time Objectives (RTOs) are defined.
• Recovery Point Objectives (RPOs) are defined.
• Controls are assigned to sensitive/regulated assets to comply with specific BC/DR requirements to facilitate recovery operations in accordance with RTOs and RPOs.
• IT personnel work with business stakeholders to develop Disaster Recovery Plans (DRP) to recover business-critical systems and services within RPOs.
• Business stakeholders work with IT personnel to develop Business Continuity Plans (BCPs) to ensure business functions are sustainable both during and after an incident within RTOs.
• The data backup function is formally assigned with defined roles and responsibilities. | Business Continuity & Disaster Recovery (BCD) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to coordinate internal contingency plans with the contingency plans of external service providers to ensure that contingency requirements can be satisfied. | null | null | null | null | null | null | null | null | null | BCR-06 | OPA-05 | null | null | null | null | null | null | null | null | 5.29
5.30 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | CP-2(7) | null | null | null | CP-2(7) | null | null | null | null | CP-2(7) | null | null | null | null | null | CP-2(7) | null | CP-2(7) | null | null | CP-2(7) | null | null | null | null | null | null | null | GV.OC-05
GV.SC-08 | null | null | null | null | null | null | null | null | null | null | null | null | K.1.1 | null | null | null | null | null | null | SC:SG4.SP2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 3-1-3-2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 2.9 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1 | null | null | null | null | R-AM-1 | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | null | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | null | null | null | R-IR-1 | R-IR-2 | R-IR-3 | R-IR-4 | R-SA-1 | null | NT-1
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | NT-1 | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | NT-9 | NT-10 | NT-11 | NT-12 | NT-13 | NT-14 | MT-1 | MT-2 | MT-3 | MT-4 | MT-5 | MT-6 | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Business Continuity & Disaster Recovery | Transfer to Alternate Processing / Storage Site | BCD-01.3 | Mechanisms exist to redeploy personnel to other roles during a disruptive event or in the execution of a continuity plan. | null | null | Does the organization redeploy personnel to other roles during a disruptive event or in the execution of a continuity plan? | 5 | Recover | null | X | null | There is no evidence of a capability to redeploy personnel to other roles during a disruptive event or in the execution of a continuity plan. | SP-CMM1 is N/A, since a structured process is required to redeploy personnel to other roles during a disruptive event or in the execution of a continuity plan. | SP-CMM2 is N/A, since a well-defined process is required to redeploy personnel toother roles during a disruptive event or in the execution of a continuity plan. | Business Continuity & Disaster Recovery (BCD) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A formal Business Continuity & Disaster Recovery (BC/DR) program exists with defined roles and responsibilities to restore functionality in the event of a catastrophe, emergency, or significant disruptive incident that is handled in accordance with the Continuity of Operations Plan (COOP).
• BC/DR personnel work with business stakeholders to identify business-critical systems, services, internal teams and third-party service providers.
• Application/system/process owners conduct a Business Impact Analysis (BIA) at least annually, or after any major technology or process change, to identify assets critical to the business in need of protection, as well as single points of failure.
• Recovery Time Objectives (RTOs) are defined.
• Recovery Point Objectives (RPOs) are defined.
• Controls are assigned to sensitive/regulated assets to comply with specific BC/DR requirements to facilitate recovery operations in accordance with RTOs and RPOs.
• IT personnel work with business stakeholders to develop Disaster Recovery Plans (DRP) to recover business-critical systems and services within RPOs.
• Business stakeholders work with IT personnel to develop Business Continuity Plans (BCPs) to ensure business functions are sustainable both during and after an incident within RTOs.
• The data backup function is formally assigned with defined roles and responsibilities.
• Human Resources (HR), Legal and Procurement departments implement and manage a formal process that enables business-critical personnel to be both redeployed to other roles during a disruptive event, but also appropriately supports the employee(s) throughout the role transition and back into the their original role when the disruptive event is over.
• BC/DR function formally assigns business-critical roles that require redundancies and/ or cross training. | See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to redeploy personnel to other roles during a disruptive event or in the execution of a continuity plan. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to redeploy personnel to other roles during a disruptive event or in the execution of a continuity plan. | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | CP-2(6) | null | null | null | CP-2(6) | null | null | null | null | CP-2(6) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | K.1.7.1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 2.B.6 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-IR-1
R-IR-2
R-IR-3
R-IR-4 | null | null | null | null | R-AM-1 | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | null | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | null | null | null | R-IR-1 | R-IR-2 | R-IR-3 | R-IR-4 | null | null | NT-1
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | NT-1 | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | NT-9 | NT-10 | NT-11 | NT-12 | NT-13 | NT-14 | MT-1 | MT-2 | MT-3 | MT-4 | MT-5 | MT-6 | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Business Continuity & Disaster Recovery | Recovery Time / Point Objectives (RTO / RPO) | BCD-01.4 | Mechanisms exist to facilitate recovery operations in accordance with Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs). | null | E-BCM-02
E-BCM-03 | Does the organization facilitate recovery operations in accordance with Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs)? | 5 | Recover | null | X | null | There is no evidence of a capability to facilitate recovery operations in accordance with Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs). | SP-CMM1 is N/A, since a structured process is required to facilitate recovery operations in accordance with Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs). | SP-CMM2 is N/A, since a well-defined process is required to facilitate recovery operations in accordance with Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs). | Business Continuity & Disaster Recovery (BCD) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A formal Business Continuity & Disaster Recovery (BC/DR) program exists with defined roles and responsibilities to restore functionality in the event of a catastrophe, emergency, or significant disruptive incident that is handled in accordance with the Continuity of Operations Plan (COOP).
• BC/DR personnel work with business stakeholders to identify business-critical systems, services, internal teams and third-party service providers.
• Application/system/process owners conduct a Business Impact Analysis (BIA) at least annually, or after any major technology or process change, to identify assets critical to the business in need of protection, as well as single points of failure.
• Recovery Time Objectives (RTOs) are defined.
• Recovery Point Objectives (RPOs) are defined.
• Controls are assigned to sensitive/regulated assets to comply with specific BC/DR requirements to facilitate recovery operations in accordance with RTOs and RPOs.
• IT personnel work with business stakeholders to develop Disaster Recovery Plans (DRP) to recover business-critical systems and services within RPOs.
• Business stakeholders work with IT personnel to develop Business Continuity Plans (BCPs) to ensure business functions are sustainable both during and after an incident within RTOs.
• The data backup function is formally assigned with defined roles and responsibilities.
• Recovery Time Objectives (RTOs) identify business-critical systems and services that are given priority of service in alternate processing and storage sites.
• Technologies exist to conduct transaction-level recovery, in accordance with Recovery Point Objectives (RPOs). | Business Continuity & Disaster Recovery (BCD) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to facilitate recovery operations in accordance with Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs). | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | OR-3.4 | null | null | null | null | null | null | CP-6(2)
CP-10 | CP-10 | CP-10 | CP-6(2)
CP-10 | CP-6(2)
CP-10 | null | CP-10 | CP-10 | CP-6(2)
CP-10 | null | null | CP-10 | CP-10 | CP-6(2)
CP-10 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | GV.OC-04 | null | null | null | null | null | null | null | null | null | null | null | null | K.1.1 | null | null | null | null | null | RESPONSE-4.G.MIL2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | CP-6(2) | null | null | CP-6(2) | null | CP-6(2) | null | null | CP-6(2) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Art 12.6 | null | null | null | null | null | null | null | null | null | null | null | null | null | OPS-06
OPS-08
OPS-09 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 2-9-3-2 | null | null | null | null | null | null | null | null | null | null | B5.b | null | null | null | null | null | null | null | null | null | 1810 | null | 38(a)
38(b)
38(c)
39 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 8.1.4
8.2.1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1 | null | null | null | null | R-AM-1 | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | null | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | null | null | null | R-IR-1 | R-IR-2 | R-IR-3 | R-IR-4 | R-SA-1 | null | NT-1
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | NT-1 | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | NT-9 | NT-10 | NT-11 | NT-12 | NT-13 | NT-14 | MT-1 | MT-2 | MT-3 | MT-4 | MT-5 | MT-6 | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Business Continuity & Disaster Recovery | Identify Critical Assets | BCD-02 | Mechanisms exist to identify and document the critical systems, applications and services that support essential missions and business functions. | - Business Impact Analysis (BIA)
- Criticality assessments | E-BCM-08 | Does the organization identify and document the critical systems, applications and services that support essential missions and business functions? | 9 | Recover | null | null | X | There is no evidence of a capability to identify and document the critical systems, applications and services that support essential missions and business functions. | Business Continuity & Disaster Recovery (BCD) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• IT personnel work with business stakeholders to identify business-critical systems and services, including internal teams and third-party service providers.
• IT personnel develop limited Disaster Recovery Plans (DRP) to recover business-critical systems and services.
• Business stakeholders develop limited Business Continuity Plans (BCPs) to ensure business-critical functions are sustainable both during and after an incident within Recovery Time Objectives (RTOs).
• Backups are performed ad-hoc and focus on business-critical systems.
• Limited technologies exist to support near real-time network infrastructure failover (e.g., redundant ISPs, redundant power, etc.). | Business Continuity & Disaster Recovery (BCD) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Business Continuity / Disaster Recovery (BC/DR) management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for BC/DR management.
• BC/DR roles are formally assigned as an additional duty to existing IT/cybersecurity personnel.
• Recovery Time Objectives (RTOs) identify business-critical systems and services, which are given priority of service in alternate processing and storage sites.
• IT personnel develop Disaster Recovery Plans (DRP) to recover business-critical systems and services.
• Data/process owners conduct a Business Impact Analysis (BIA) at least annually, or after any major technology or process change, to identify assets critical to the business in need of protection, as well as single points of failure.
• IT/cybersecurity personnel work with business stakeholders to develop Business Continuity Plans (BCPs) to ensure business functions are sustainable both during and after an incident within Recovery Time Objectives (RTOs).
• IT personnel use a backup methodology (e.g., grandfather, father & s on rotation) to store backups in a secondary location, separate from the primary storage site.
• IT personnel configure business-critical systems to transfer backup data to the alternate storage site at a rate that is capable of meeting Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs). | Business Continuity & Disaster Recovery (BCD) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A formal Business Continuity & Disaster Recovery (BC/DR) program exists with defined roles and responsibilities to restore functionality in the event of a catastrophe, emergency, or significant disruptive incident that is handled in accordance with the Continuity of Operations Plan (COOP).
• BC/DR personnel work with business stakeholders to identify business-critical systems, services, internal teams and third-party service providers.
• Application/system/process owners conduct a Business Impact Analysis (BIA) at least annually, or after any major technology or process change, to identify assets critical to the business in need of protection, as well as single points of failure.
• Recovery Time Objectives (RTOs) are defined.
• Recovery Point Objectives (RPOs) are defined.
• Controls are assigned to sensitive/regulated assets to comply with specific BC/DR requirements to facilitate recovery operations in accordance with RTOs and RPOs.
• IT personnel work with business stakeholders to develop Disaster Recovery Plans (DRP) to recover business-critical systems and services within RPOs.
• Business stakeholders work with IT personnel to develop Business Continuity Plans (BCPs) to ensure business functions are sustainable both during and after an incident within RTOs.
• The data backup function is formally assigned with defined roles and responsibilities. | Business Continuity & Disaster Recovery (BCD) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to identify and document the critical systems, applications and services that support essential missions and business functions. | CC7.5 | null | null | null | null | null | null | null | null | null | SET-01 | SO20 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | OR-1.2 | null | null | ID.BE-P3 | null | P-8 | null | CP-2(8) | null | CP-2(8) | CP-2(8) | CP-2(8) | null | null | CP-2(8) | CP-2(8) | null | null | null | CP-2(8) | CP-2(8) | null | CP-2(8) | null | null | null | null | CP-2(8) | null | null | null | null | null | null | ID.AM-5
ID.BE-5 | GV.OC-04 | null | null | null | null | null | null | null | null | null | null | null | null | K.8.1 | null | null | null | null | null | ASSET-1.C.MIL2
ASSET-2.C.MIL2
RESPONSE-4.E.MIL2 | EC:SG1.SP1
EC:SG4.SP5
SC:SG7.SP1 | null | null | null | null | null | null | null | null | CP-2(8) | null | null | null | null | null | null | null | CP-2(8) | null | CP-2(8) | CP-2(8) | null | CP-2(8) | null | CP-2(8) | CP-2(8) | null | null | null | null | null | null | 164.308(a)(7)(ii)(E) | null | null | null | CP-2(8) | null | CIP-002-5.1a
R1 & R2 | null | null | null | null | null | null | null | null | CP-2(8) | CP-2(8) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | CP-2(8) | null | null | null | 3.7.1(78)
3.7.3(83) | Art 8.4 | null | null | null | null | null | null | null | null | null | null | null | null | 12.2 | BCM-02 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 2-8-1-1
3-1-1-2 | TPC-24 | null | 2-9-3-2 | 2-1-1-5 | null | null | null | null | null | null | null | null | null | B5.b | A4 | null | null | null | null | null | null | null | null | null | null | 34(a)
35
36(a)
36(b)
36(c)
36(d)
37 | 21(b) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 8.1.2 | null | null | null | null | null | null | null | null | 2.9.2
3.2.3 | null | null | null | null | null | null | null | null | null | null | x | null | null | x | R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-IR-1
R-IR-2
R-IR-3
R-IR-4 | null | null | null | null | R-AM-1 | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | null | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | null | null | null | R-IR-1 | R-IR-2 | R-IR-3 | R-IR-4 | null | null | NT-7
MT-1
MT-2
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | null | null | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Business Continuity & Disaster Recovery | Resume All Missions & Business Functions | BCD-02.1 | Mechanisms exist to resume all missions and business functions within Recovery Time Objectives (RTOs) of the contingency plan's activation. | - Disaster Recovery Plan (DRP)
- Continuity of Operations Plan (COOP)
- Disaster recovery software | null | Does the organization resume all missions and business functions within Recovery Time Objectives (RTOs) of the contingency plan's activation? | 8 | Recover | null | X | null | There is no evidence of a capability to resume all missions and business functions within Recovery Time Objectives (RTOs) of the contingency plan's activation. | Business Continuity & Disaster Recovery (BCD) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• IT personnel work with business stakeholders to identify business-critical systems and services, including internal teams and third-party service providers.
• IT personnel develop limited Disaster Recovery Plans (DRP) to recover business-critical systems and services.
• Business stakeholders develop limited Business Continuity Plans (BCPs) to ensure business-critical functions are sustainable both during and after an incident within Recovery Time Objectives (RTOs).
• Backups are performed ad-hoc and focus on business-critical systems.
• Limited technologies exist to support near real-time network infrastructure failover (e.g., redundant ISPs, redundant power, etc.). | Business Continuity & Disaster Recovery (BCD) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Business Continuity / Disaster Recovery (BC/DR) management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for BC/DR management.
• BC/DR roles are formally assigned as an additional duty to existing IT/cybersecurity personnel.
• Recovery Time Objectives (RTOs) identify business-critical systems and services, which are given priority of service in alternate processing and storage sites.
• IT personnel develop Disaster Recovery Plans (DRP) to recover business-critical systems and services.
• Data/process owners conduct a Business Impact Analysis (BIA) at least annually, or after any major technology or process change, to identify assets critical to the business in need of protection, as well as single points of failure.
• IT/cybersecurity personnel work with business stakeholders to develop Business Continuity Plans (BCPs) to ensure business functions are sustainable both during and after an incident within Recovery Time Objectives (RTOs).
• IT personnel use a backup methodology (e.g., grandfather, father & s on rotation) to store backups in a secondary location, separate from the primary storage site.
• IT personnel configure business-critical systems to transfer backup data to the alternate storage site at a rate that is capable of meeting Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs). | Business Continuity & Disaster Recovery (BCD) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A formal Business Continuity & Disaster Recovery (BC/DR) program exists with defined roles and responsibilities to restore functionality in the event of a catastrophe, emergency, or significant disruptive incident that is handled in accordance with the Continuity of Operations Plan (COOP).
• BC/DR personnel work with business stakeholders to identify business-critical systems, services, internal teams and third-party service providers.
• Application/system/process owners conduct a Business Impact Analysis (BIA) at least annually, or after any major technology or process change, to identify assets critical to the business in need of protection, as well as single points of failure.
• Recovery Time Objectives (RTOs) are defined.
• Recovery Point Objectives (RPOs) are defined.
• Controls are assigned to sensitive/regulated assets to comply with specific BC/DR requirements to facilitate recovery operations in accordance with RTOs and RPOs.
• IT personnel work with business stakeholders to develop Disaster Recovery Plans (DRP) to recover business-critical systems and services within RPOs.
• Business stakeholders work with IT personnel to develop Business Continuity Plans (BCPs) to ensure business functions are sustainable both during and after an incident within RTOs.
• The data backup function is formally assigned with defined roles and responsibilities. | Business Continuity & Disaster Recovery (BCD) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to resume all missions and business functions within Recovery Time Objectives (RTOs) of the contingency plan's activation. | CC7.5 | null | null | null | null | null | null | null | null | BCR-03 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | OR-1.2 | null | null | null | null | null | null | CP-2(4) | null | null | CP-2(4) | CP-2(3) | null | null | CP-2(3) | CP-2(3) | null | null | null | CP-2(3) | CP-2(3) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | GV.OC-05 | null | null | null | null | null | null | null | null | null | null | null | null | K.1.1 | null | null | null | null | null | RESPONSE-4.E.MIL2
RESPONSE-4.F.MIL2 | SC:SG6.SP1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | CP-2(4) | null | null | CP-2(4) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | CP-2(3) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 21.15
21.16 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 2-9-3-2 | null | null | null | null | null | null | null | null | null | null | B5.b | null | null | null | null | null | null | null | null | null | null | null | 34(e) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 2.9 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-IR-1
R-IR-2
R-IR-3
R-IR-4 | null | null | null | null | R-AM-1 | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | null | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | null | null | null | R-IR-1 | R-IR-2 | R-IR-3 | R-IR-4 | null | null | NT-1
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | NT-1 | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | NT-9 | NT-10 | NT-11 | NT-12 | NT-13 | NT-14 | MT-1 | MT-2 | MT-3 | MT-4 | MT-5 | MT-6 | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Business Continuity & Disaster Recovery | Continue Essential Mission & Business Functions | BCD-02.2 | Mechanisms exist to continue essential missions and business functions with little or no loss of operational continuity and sustain that continuity until full system restoration at primary processing and/or storage sites. | - Disaster Recovery Plan (DRP)
- Continuity of Operations Plan (COOP) | null | Does the organization continue essential missions and business functions with little or no loss of operational continuity and sustain that continuity until full system restoration at primary processing and/or storage sites? | 8 | Recover | null | X | null | There is no evidence of a capability to continue essential missions and business functions with little or no loss of operational continuity and sustain that continuity until full system restoration at primary processing and/ or storage sites. | Business Continuity & Disaster Recovery (BCD) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• IT personnel work with business stakeholders to identify business-critical systems and services, including internal teams and third-party service providers.
• IT personnel develop limited Disaster Recovery Plans (DRP) to recover business-critical systems and services.
• Business stakeholders develop limited Business Continuity Plans (BCPs) to ensure business-critical functions are sustainable both during and after an incident within Recovery Time Objectives (RTOs).
• Backups are performed ad-hoc and focus on business-critical systems.
• Limited technologies exist to support near real-time network infrastructure failover (e.g., redundant ISPs, redundant power, etc.). | Business Continuity & Disaster Recovery (BCD) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Business Continuity / Disaster Recovery (BC/DR) management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for BC/DR management.
• BC/DR roles are formally assigned as an additional duty to existing IT/cybersecurity personnel.
• Recovery Time Objectives (RTOs) identify business-critical systems and services, which are given priority of service in alternate processing and storage sites.
• IT personnel develop Disaster Recovery Plans (DRP) to recover business-critical systems and services.
• Data/process owners conduct a Business Impact Analysis (BIA) at least annually, or after any major technology or process change, to identify assets critical to the business in need of protection, as well as single points of failure.
• IT/cybersecurity personnel work with business stakeholders to develop Business Continuity Plans (BCPs) to ensure business functions are sustainable both during and after an incident within Recovery Time Objectives (RTOs).
• IT personnel use a backup methodology (e.g., grandfather, father & s on rotation) to store backups in a secondary location, separate from the primary storage site.
• IT personnel configure business-critical systems to transfer backup data to the alternate storage site at a rate that is capable of meeting Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs). | Business Continuity & Disaster Recovery (BCD) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A formal Business Continuity & Disaster Recovery (BC/DR) program exists with defined roles and responsibilities to restore functionality in the event of a catastrophe, emergency, or significant disruptive incident that is handled in accordance with the Continuity of Operations Plan (COOP).
• BC/DR personnel work with business stakeholders to identify business-critical systems, services, internal teams and third-party service providers.
• Application/system/process owners conduct a Business Impact Analysis (BIA) at least annually, or after any major technology or process change, to identify assets critical to the business in need of protection, as well as single points of failure.
• Recovery Time Objectives (RTOs) are defined.
• Recovery Point Objectives (RPOs) are defined.
• Controls are assigned to sensitive/regulated assets to comply with specific BC/DR requirements to facilitate recovery operations in accordance with RTOs and RPOs.
• IT personnel work with business stakeholders to develop Disaster Recovery Plans (DRP) to recover business-critical systems and services within RPOs.
• Business stakeholders work with IT personnel to develop Business Continuity Plans (BCPs) to ensure business functions are sustainable both during and after an incident within RTOs.
• The data backup function is formally assigned with defined roles and responsibilities. | Business Continuity & Disaster Recovery (BCD) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to continue essential missions and business functions with little or no loss of operational continuity and sustain that continuity until full system restoration at primary processing and/ or storage sites. | CC7.5 | null | null | null | null | null | null | null | null | BCR-03 | OPA-05 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | OR-1.2 | null | null | null | null | null | null | CP-2(5) | null | null | CP-2(5) | CP-2(5) | null | null | null | CP-2(5) | null | null | null | null | CP-2(5) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | GV.OC-05
RC.RP-04 | null | null | null | null | null | null | null | null | null | null | null | null | K.4 | null | null | null | null | null | RESPONSE-4.E.MIL2
RESPONSE-4.F.MIL2 | SC:SG6.SP1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | CP-2(5) | null | null | CP-2(5) | null | CP-2(5) | null | null | CP-2(5) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 18.15
25.23 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 2-9-3-2 | null | null | null | null | null | null | null | null | null | null | B5.b | null | null | null | null | null | null | null | null | null | null | null | 34(e) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 2.9 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-IR-1
R-IR-2
R-IR-3
R-IR-4 | null | null | null | null | R-AM-1 | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | null | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | null | null | null | R-IR-1 | R-IR-2 | R-IR-3 | R-IR-4 | null | null | NT-1
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | NT-1 | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | NT-9 | NT-10 | NT-11 | NT-12 | NT-13 | NT-14 | MT-1 | MT-2 | MT-3 | MT-4 | MT-5 | MT-6 | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Business Continuity & Disaster Recovery | Resume Essential Missions & Business Functions | BCD-02.3 | Mechanisms exist to resume essential missions and business functions within an organization-defined time period of contingency plan activation. | - Business Continuity Plan (BCP)
- Disaster Recovery Plan (DRP)
- Continuity of Operations Plan (COOP) | null | Does the organization resume essential missions and business functions within an organization-defined time period of contingency plan activation? | 8 | Recover | null | X | null | There is no evidence of a capability to resume essential missions and business functions within an organization-defined time period of contingency plan activation. | Business Continuity & Disaster Recovery (BCD) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• IT personnel work with business stakeholders to identify business-critical systems and services, including internal teams and third-party service providers.
• IT personnel develop limited Disaster Recovery Plans (DRP) to recover business-critical systems and services.
• Business stakeholders develop limited Business Continuity Plans (BCPs) to ensure business-critical functions are sustainable both during and after an incident within Recovery Time Objectives (RTOs).
• Backups are performed ad-hoc and focus on business-critical systems.
• Limited technologies exist to support near real-time network infrastructure failover (e.g., redundant ISPs, redundant power, etc.). | Business Continuity & Disaster Recovery (BCD) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Business Continuity / Disaster Recovery (BC/DR) management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for BC/DR management.
• BC/DR roles are formally assigned as an additional duty to existing IT/cybersecurity personnel.
• Recovery Time Objectives (RTOs) identify business-critical systems and services, which are given priority of service in alternate processing and storage sites.
• IT personnel develop Disaster Recovery Plans (DRP) to recover business-critical systems and services.
• Data/process owners conduct a Business Impact Analysis (BIA) at least annually, or after any major technology or process change, to identify assets critical to the business in need of protection, as well as single points of failure.
• IT/cybersecurity personnel work with business stakeholders to develop Business Continuity Plans (BCPs) to ensure business functions are sustainable both during and after an incident within Recovery Time Objectives (RTOs).
• IT personnel use a backup methodology (e.g., grandfather, father & s on rotation) to store backups in a secondary location, separate from the primary storage site.
• IT personnel configure business-critical systems to transfer backup data to the alternate storage site at a rate that is capable of meeting Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs). | Business Continuity & Disaster Recovery (BCD) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A formal Business Continuity & Disaster Recovery (BC/DR) program exists with defined roles and responsibilities to restore functionality in the event of a catastrophe, emergency, or significant disruptive incident that is handled in accordance with the Continuity of Operations Plan (COOP).
• BC/DR personnel work with business stakeholders to identify business-critical systems, services, internal teams and third-party service providers.
• Application/system/process owners conduct a Business Impact Analysis (BIA) at least annually, or after any major technology or process change, to identify assets critical to the business in need of protection, as well as single points of failure.
• Recovery Time Objectives (RTOs) are defined.
• Recovery Point Objectives (RPOs) are defined.
• Controls are assigned to sensitive/regulated assets to comply with specific BC/DR requirements to facilitate recovery operations in accordance with RTOs and RPOs.
• IT personnel work with business stakeholders to develop Disaster Recovery Plans (DRP) to recover business-critical systems and services within RPOs.
• Business stakeholders work with IT personnel to develop Business Continuity Plans (BCPs) to ensure business functions are sustainable both during and after an incident within RTOs.
• The data backup function is formally assigned with defined roles and responsibilities. | Business Continuity & Disaster Recovery (BCD) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to resume essential missions and business functions within an organization-defined time period of contingency plan activation. | CC7.5 | null | null | null | null | null | null | null | null | BCR-03 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | OR-1.2 | null | null | null | null | null | null | CP-2(3) | null | CP-2(3) | CP-2(3) | CP-2(3) | null | null | CP-2(3) | CP-2(3) | null | null | null | CP-2(3) | CP-2(3) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | GV.OC-05
RC.RP-04 | null | null | null | null | null | null | null | null | null | null | null | null | K.2.1 | null | null | null | null | null | RESPONSE-4.E.MIL2
RESPONSE-4.F.MIL2 | SC:SG6.SP1 | null | null | null | null | null | null | null | null | CP-2(3) | null | null | null | null | null | null | null | CP-2(3) | null | CP-2(3) | CP-2(3) | null | CP-2(3) | null | CP-2(3) | CP-2(3) | null | null | null | null | null | null | null | null | null | null | null | null | CIP-009-6
R1 | null | null | null | null | null | null | null | null | null | CP-2(3) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | CP-2(3) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 21.15
21.16 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 2-9-3-2 | null | null | null | null | null | null | null | null | null | null | B5.b | null | null | null | null | null | null | null | null | null | null | null | 34(e) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 2.9 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-IR-1
R-IR-2
R-IR-3
R-IR-4 | null | null | null | null | R-AM-1 | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | null | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | null | null | null | R-IR-1 | R-IR-2 | R-IR-3 | R-IR-4 | null | null | NT-1
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | NT-1 | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | NT-9 | NT-10 | NT-11 | NT-12 | NT-13 | NT-14 | MT-1 | MT-2 | MT-3 | MT-4 | MT-5 | MT-6 | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Business Continuity & Disaster Recovery | Data Storage Location Reviews | BCD-02.4 | Mechanisms exist to perform periodic security reviews of storage locations that contain sensitive / regulated data. | null | E-AST-23 | Does the organization perform periodic security reviews of storage locations that contain sensitive / regulated data? | 8 | Recover | null | X | null | There is no evidence of a capability to perform periodic security reviews of storage locations that contain sensitive / regulated data. | SP-CMM1 is N/A, since a structured process is required to perform periodic security reviews of storage locations that contain sensitive / regulated data. | Business Continuity & Disaster Recovery (BCD) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Business Continuity / Disaster Recovery (BC/DR) management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for BC/DR management.
• BC/DR roles are formally assigned as an additional duty to existing IT/cybersecurity personnel.
• Recovery Time Objectives (RTOs) identify business-critical systems and services, which are given priority of service in alternate processing and storage sites.
• IT personnel develop Disaster Recovery Plans (DRP) to recover business-critical systems and services.
• Data/process owners conduct a Business Impact Analysis (BIA) at least annually, or after any major technology or process change, to identify assets critical to the business in need of protection, as well as single points of failure.
• IT/cybersecurity personnel work with business stakeholders to develop Business Continuity Plans (BCPs) to ensure business functions are sustainable both during and after an incident within Recovery Time Objectives (RTOs).
• IT personnel use a backup methodology (e.g., grandfather, father & s on rotation) to store backups in a secondary location, separate from the primary storage site.
• IT personnel configure business-critical systems to transfer backup data to the alternate storage site at a rate that is capable of meeting Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs).
• on at least an annual basis, BC/DR personnel conduct security reviews of storage locations containing sensitive/regulated data. | Business Continuity & Disaster Recovery (BCD) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A formal Business Continuity & Disaster Recovery (BC/DR) program exists with defined roles and responsibilities to restore functionality in the event of a catastrophe, emergency, or significant disruptive incident that is handled in accordance with the Continuity of Operations Plan (COOP).
• BC/DR personnel work with business stakeholders to identify business-critical systems, services, internal teams and third-party service providers.
• Application/system/process owners conduct a Business Impact Analysis (BIA) at least annually, or after any major technology or process change, to identify assets critical to the business in need of protection, as well as single points of failure.
• Recovery Time Objectives (RTOs) are defined.
• Recovery Point Objectives (RPOs) are defined.
• Controls are assigned to sensitive/regulated assets to comply with specific BC/DR requirements to facilitate recovery operations in accordance with RTOs and RPOs.
• IT personnel work with business stakeholders to develop Disaster Recovery Plans (DRP) to recover business-critical systems and services within RPOs.
• Business stakeholders work with IT personnel to develop Business Continuity Plans (BCPs) to ensure business functions are sustainable both during and after an incident within RTOs.
• The data backup function is formally assigned with defined roles and responsibilities.
• on at least an annual basis, BC/DR personnel conduct security reviews of storage locations to ensure that sensitive/regulated data is both physically and logically protected. | See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to perform periodic security reviews of storage locations that contain sensitive / regulated data. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to perform periodic security reviews of storage locations that contain sensitive / regulated data. | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 9.4.1.2 | null | null | null | null | null | null | 9.4.1.2 | 9.4.1.2 | null | F.1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1 | null | null | null | R-AC-4 | R-AM-1 | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | R-EX-6 | R-EX-7 | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | null | R-IR-1 | R-IR-2 | R-IR-3 | R-IR-4 | R-SA-1 | null | NT-1
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-8
MT-9
MT-12
MT-13
MT-14
MT-15 | NT-1 | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | NT-9 | NT-10 | NT-11 | NT-12 | NT-13 | NT-14 | null | null | null | null | null | null | null | MT-8 | MT-9 | null | null | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Business Continuity & Disaster Recovery | Contingency Training | BCD-03 | Mechanisms exist to adequately train contingency personnel and applicable stakeholders in their contingency roles and responsibilities. | - NIST NICE Framework
- Tabletop exercises | E-BCM-07 | Does the organization adequately train contingency personnel and applicable stakeholders in their contingency roles and responsibilities? | 5 | Recover | null | X | X | There is no evidence of a capability to adequately train contingency personnel and applicable stakeholders in their contingency roles and responsibilities. | SP-CMM1 is N/A, since a structured process is required to adequately train contingency personnel and applicable stakeholders in their contingency roles and responsibilities. | Business Continuity & Disaster Recovery (BCD) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Business Continuity / Disaster Recovery (BC/DR) management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for BC/DR management.
• BC/DR roles are formally assigned as an additional duty to existing IT/cybersecurity personnel.
• Recovery Time Objectives (RTOs) identify business-critical systems and services, which are given priority of service in alternate processing and storage sites.
• IT personnel develop Disaster Recovery Plans (DRP) to recover business-critical systems and services.
• Data/process owners conduct a Business Impact Analysis (BIA) at least annually, or after any major technology or process change, to identify assets critical to the business in need of protection, as well as single points of failure.
• IT/cybersecurity personnel work with business stakeholders to develop Business Continuity Plans (BCPs) to ensure business functions are sustainable both during and after an incident within Recovery Time Objectives (RTOs).
• IT personnel use a backup methodology (e.g., grandfather, father & s on rotation) to store backups in a secondary location, separate from the primary storage site.
• IT personnel configure business-critical systems to transfer backup data to the alternate storage site at a rate that is capable of meeting Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs). | Business Continuity & Disaster Recovery (BCD) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A formal Business Continuity & Disaster Recovery (BC/DR) program exists with defined roles and responsibilities to restore functionality in the event of a catastrophe, emergency, or significant disruptive incident that is handled in accordance with the Continuity of Operations Plan (COOP).
• BC/DR personnel work with business stakeholders to identify business-critical systems, services, internal teams and third-party service providers.
• Application/system/process owners conduct a Business Impact Analysis (BIA) at least annually, or after any major technology or process change, to identify assets critical to the business in need of protection, as well as single points of failure.
• Recovery Time Objectives (RTOs) are defined.
• Recovery Point Objectives (RPOs) are defined.
• Controls are assigned to sensitive/regulated assets to comply with specific BC/DR requirements to facilitate recovery operations in accordance with RTOs and RPOs.
• IT personnel work with business stakeholders to develop Disaster Recovery Plans (DRP) to recover business-critical systems and services within RPOs.
• Business stakeholders work with IT personnel to develop Business Continuity Plans (BCPs) to ensure business functions are sustainable both during and after an incident within RTOs.
• The data backup function is formally assigned with defined roles and responsibilities.
• BC/DR function formally assigns business-critical roles that require redundancies and/ or cross training. | Business Continuity & Disaster Recovery (BCD) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to adequately train contingency personnel and applicable stakeholders in their contingency roles and responsibilities. | null | null | null | null | null | null | null | DSS04.06 | null | BCR-06 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | CP-3 | CP-3 | CP-3 | CP-3 | CP-3 | null | CP-3 | CP-3 | CP-3 | null | null | CP-3 | CP-3 | CP-3 | null | CP-3 | CP-3 | CP-3 | null | CP-3 | CP-3 | null | null | null | null | null | null | PR.IP-10 | null | null | null | null | null | null | null | null | null | null | null | null | null | E.1.14.3 | null | null | null | null | null | null | SC:SG3.SP5
SC:SG5.SP3 | null | null | null | null | null | null | null | null | CP-3 | null | null | null | null | null | null | null | CP-3 | CP-3 | CP-3 | CP-3 | CP-3 | CP-3 | CP-3 | CP-3 | CP-3 | CP-3 | null | null | null | null | null | null | null | null | null | CP-3 | null | null | 8-615 | null | null | null | null | null | null | CP-3 | CP-3 | CP-3 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | CP-3 | CP-3 | CP-3 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 25.3 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | null | null | x | R-AM-3
R-EX-2
R-EX-5
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-IR-3
R-SA-1
R-SA-2 | null | null | null | null | null | null | R-AM-3 | null | null | null | null | null | null | R-EX-2 | null | null | R-EX-5 | null | null | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | null | null | null | R-IR-3 | null | R-SA-1 | R-SA-2 | NT-1
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | NT-1 | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | NT-9 | NT-10 | NT-11 | NT-12 | NT-13 | NT-14 | MT-1 | MT-2 | MT-3 | MT-4 | MT-5 | MT-6 | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Business Continuity & Disaster Recovery | Simulated Events | BCD-03.1 | Mechanisms exist to incorporate simulated events into contingency training to facilitate effective response by personnel in crisis situations. | - Tabletop exercises | E-BCM-06 | Does the organization incorporate simulated events into contingency training to facilitate effective response by personnel in crisis situations? | 3 | Recover | null | X | X | There is no evidence of a capability to incorporate simulated events into contingency training to facilitate effective response by personnel in crisis situations. | SP-CMM1 is N/A, since a structured process is required to incorporate simulated events into contingency training to facilitate effective response by personnel in crisis situations. | SP-CMM2 is N/A, since a well-defined process is required to incorporate simulated events into contingency training to facilitate effective response by personnel in crisis situations. | Business Continuity & Disaster Recovery (BCD) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A formal Business Continuity & Disaster Recovery (BC/DR) program exists with defined roles and responsibilities to restore functionality in the event of a catastrophe, emergency, or significant disruptive incident that is handled in accordance with the Continuity of Operations Plan (COOP).
• BC/DR personnel work with business stakeholders to identify business-critical systems, services, internal teams and third-party service providers.
• Application/system/process owners conduct a Business Impact Analysis (BIA) at least annually, or after any major technology or process change, to identify assets critical to the business in need of protection, as well as single points of failure.
• Recovery Time Objectives (RTOs) are defined.
• Recovery Point Objectives (RPOs) are defined.
• Controls are assigned to sensitive/regulated assets to comply with specific BC/DR requirements to facilitate recovery operations in accordance with RTOs and RPOs.
• IT personnel work with business stakeholders to develop Disaster Recovery Plans (DRP) to recover business-critical systems and services within RPOs.
• Business stakeholders work with IT personnel to develop Business Continuity Plans (BCPs) to ensure business functions are sustainable both during and after an incident within RTOs.
• The data backup function is formally assigned with defined roles and responsibilities.
• BC/DR personnel conduct simulated incidents to validate the viability BC/DR plans, in conjunction with stakeholders. | See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to incorporate simulated events into contingency training to facilitate effective response by personnel in crisis situations. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to incorporate simulated events into contingency training to facilitate effective response by personnel in crisis situations. | A1.3 | null | null | null | null | null | null | null | null | BCR-06 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | CP-3(1) | null | null | CP-3(1) | CP-3(1) | null | null | null | CP-3(1) | null | null | null | null | CP-3(1) | null | CP-3(1) | null | null | null | CP-3(1) | CP-3(1) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | K.2.9 | null | null | null | null | null | RESPONSE-4.N.MIL3 | SC:SG4.SP1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | CP-3(1) | null | null | CP-3(1) | null | CP-3(1) | null | null | CP-3(1) | null | null | null | null | null | null | 164.308(a)(7)(ii)(D) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 25.4
25.5 | null | null | null | null | null | null | null | null | null | null | null | 3-1-1-4 | null | null | null | 3-1-1-6 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 2.8 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | R-AM-3
R-EX-2
R-EX-5
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-IR-3
R-SA-1
R-SA-2 | null | null | null | null | null | null | R-AM-3 | null | null | null | null | null | null | R-EX-2 | null | null | R-EX-5 | null | null | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | null | null | null | R-IR-3 | null | R-SA-1 | R-SA-2 | NT-7
MT-1
MT-2
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | null | null | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Business Continuity & Disaster Recovery | Automated Training Environments | BCD-03.2 | Automated mechanisms exist to provide a more thorough and realistic contingency training environment. | null | null | Does the organization use automated mechanisms to provide a more thorough and realistic contingency training environment? | 1 | Recover | null | X | X | There is no evidence of a capability to provide a more thorough and realistic contingency training environment. | SP-CMM1 is N/A, since a structured process is required to provide a more thorough and realistic contingency training environment. | SP-CMM2 is N/A, since a well-defined process is required to provide a more thorough and realistic contingency training environment. | Business Continuity & Disaster Recovery (BCD) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A formal Business Continuity & Disaster Recovery (BC/DR) program exists with defined roles and responsibilities to restore functionality in the event of a catastrophe, emergency, or significant disruptive incident that is handled in accordance with the Continuity of Operations Plan (COOP).
• BC/DR personnel work with business stakeholders to identify business-critical systems, services, internal teams and third-party service providers.
• Application/system/process owners conduct a Business Impact Analysis (BIA) at least annually, or after any major technology or process change, to identify assets critical to the business in need of protection, as well as single points of failure.
• Recovery Time Objectives (RTOs) are defined.
• Recovery Point Objectives (RPOs) are defined.
• Controls are assigned to sensitive/regulated assets to comply with specific BC/DR requirements to facilitate recovery operations in accordance with RTOs and RPOs.
• IT personnel work with business stakeholders to develop Disaster Recovery Plans (DRP) to recover business-critical systems and services within RPOs.
• Business stakeholders work with IT personnel to develop Business Continuity Plans (BCPs) to ensure business functions are sustainable both during and after an incident within RTOs.
• The data backup function is formally assigned with defined roles and responsibilities.
• Automated mechanisms are used to conduct simulated incidents to validate the viability disaster recovery and contingency plans, in conjunction with stakeholders and any required vendors. | See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to provide a more thorough and realistic contingency training environment. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to provide a more thorough and realistic contingency training environment. | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | CP-3(2) | null | null | null | CP-3(2) | null | null | null | null | CP-3(2) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | K.2.1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 25.8 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | R-AM-3
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-IR-3
R-SA-1
R-SA-2 | null | null | null | null | null | null | R-AM-3 | null | null | null | null | null | null | null | null | null | null | null | null | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | null | null | null | R-IR-3 | null | R-SA-1 | R-SA-2 | NT-7
MT-1
MT-2
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | null | null | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | null | null | null |
Business Continuity & Disaster Recovery | Contingency Plan Testing & Exercises | BCD-04 | Mechanisms exist to conduct tests and/or exercises to evaluate the contingency plan's effectiveness and the organization’s readiness to execute the plan. | - Simulated disasters / emergencies | E-BCM-06
E-BCM-07 | Does the organization conduct tests and/or exercises to evaluate the contingency plan's effectiveness and the organization’s readiness to execute the plan? | 6 | Recover | null | X | X | There is no evidence of a capability to conduct tests and/ or exercises to evaluate the contingency plan's effectiveness and the organization’s readiness to execute the plan. | Business Continuity & Disaster Recovery (BCD) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• IT personnel work with business stakeholders to identify business-critical systems and services, including internal teams and third-party service providers.
• IT personnel develop limited Disaster Recovery Plans (DRP) to recover business-critical systems and services.
• Business stakeholders develop limited Business Continuity Plans (BCPs) to ensure business-critical functions are sustainable both during and after an incident within Recovery Time Objectives (RTOs).
• Backups are performed ad-hoc and focus on business-critical systems.
• Limited technologies exist to support near real-time network infrastructure failover (e.g., redundant ISPs, redundant power, etc.). | Business Continuity & Disaster Recovery (BCD) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Business Continuity / Disaster Recovery (BC/DR) management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for BC/DR management.
• BC/DR roles are formally assigned as an additional duty to existing IT/cybersecurity personnel.
• Recovery Time Objectives (RTOs) identify business-critical systems and services, which are given priority of service in alternate processing and storage sites.
• IT personnel develop Disaster Recovery Plans (DRP) to recover business-critical systems and services.
• Data/process owners conduct a Business Impact Analysis (BIA) at least annually, or after any major technology or process change, to identify assets critical to the business in need of protection, as well as single points of failure.
• IT/cybersecurity personnel work with business stakeholders to develop Business Continuity Plans (BCPs) to ensure business functions are sustainable both during and after an incident within Recovery Time Objectives (RTOs).
• IT personnel use a backup methodology (e.g., grandfather, father & s on rotation) to store backups in a secondary location, separate from the primary storage site.
• IT personnel configure business-critical systems to transfer backup data to the alternate storage site at a rate that is capable of meeting Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs).
• on at least an annual basis, IT/cybersecurity personnel conduct tabletop exercises to validate disaster recovery and contingency plans, in conjunction with stakeholders and any required vendors. | Business Continuity & Disaster Recovery (BCD) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A formal Business Continuity & Disaster Recovery (BC/DR) program exists with defined roles and responsibilities to restore functionality in the event of a catastrophe, emergency, or significant disruptive incident that is handled in accordance with the Continuity of Operations Plan (COOP).
• BC/DR personnel work with business stakeholders to identify business-critical systems, services, internal teams and third-party service providers.
• Application/system/process owners conduct a Business Impact Analysis (BIA) at least annually, or after any major technology or process change, to identify assets critical to the business in need of protection, as well as single points of failure.
• Recovery Time Objectives (RTOs) are defined.
• Recovery Point Objectives (RPOs) are defined.
• Controls are assigned to sensitive/regulated assets to comply with specific BC/DR requirements to facilitate recovery operations in accordance with RTOs and RPOs.
• IT personnel work with business stakeholders to develop Disaster Recovery Plans (DRP) to recover business-critical systems and services within RPOs.
• Business stakeholders work with IT personnel to develop Business Continuity Plans (BCPs) to ensure business functions are sustainable both during and after an incident within RTOs.
• The data backup function is formally assigned with defined roles and responsibilities.
• on at least an annual basis, BC/DR personnel conduct real-world exercises to validate the viability of disaster recovery and contingency plans, in conjunction with stakeholders and any required vendors. | Business Continuity & Disaster Recovery (BCD) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to conduct tests and/ or exercises to evaluate the contingency plan's effectiveness and the organization’s readiness to execute the plan. | CC7.5
A1.3 | CC7.5-POF6
A1.3-POF1
A1.3-POF2 | null | null | null | null | null | DSS04.04 | null | BCR-06
BCR-10 | null | SO22 | null | null | null | 8.5
8.6 | null | null | 17.1.3 | 5.29
5.30 | 17.1.3 | null | 6.14.1.3 | null | null | null | null | null | null | null | PR.PO-P8 | null | null | null | CP-4 | CP-4 | CP-4 | CP-4 | CP-4 | null | CP-4 | CP-4 | CP-4 | null | null | CP-4 | CP-4 | CP-4 | null | CP-4 | CP-4 | null | null | CP-4 | CP-4 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | K.9.3 | null | null | null | null | null | RESPONSE-4.I.MIL2
RESPONSE-4.N.MIL3 | COMM:SG3.SP2
SC:SG4.SP1
SC:SG5.SP1
SC:SG5.SP2
SC:SG5.SP3
SC:SG5.SP4 | null | null | null | null | null | null | null | null | CP-4 | null | null | null | null | null | null | null | CP-4 | CP-4 | CP-4 | CP-4 | CP-4 | CP-4 | CP-4 | CP-4 | CP-4 | CP-4 | null | null | null | null | null | 164.308(a)(7)(ii)(D) | null | null | null | CP-4 | null | CIP-009-6
R2 | 8-615 | null | null | null | null | null | null | CP-4 | CP-4 | CP-4 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | CP-4 | CP-4 | CP-4 | null | null | null | 3.7.4(87)
3.7.4(89)
3.7.4(89)(a)
3.7.4(89)(b)
3.7.4(89)(c)
3.7.4(90) | Art 11.4
Art 11.6(a)
Art 11.6(b)
Art 24.1
Art 24.2
Art 24.3
Art 24.4
Art 24.5
Art 24.6 | null | null | null | null | null | null | null | null | null | null | null | null | 10.4 | PS-02
PS-06
BCM-04 | null | null | null | 25.4
25.6
25.7
25.9
25.23 | null | null | null | null | null | null | null | null | null | null | null | null | TPC-70 | null | null | 3-1-1-6 | null | null | null | null | 7.5.3 [OP.CONT.3] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 43
44
45
46 | null | null | null | null | null | null | null | null | 17.1.3 | null | null | null | null | null | null | null | 8.2.3
8.3.1
8.3.2
8.3.3(a)
8.3.3(b)
8.3.4 | null | null | null | null | null | null | null | 2.8 | 2.9.3 | null | null | null | null | null | null | null | null | null | null | x | null | null | x | R-AM-3
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-IR-3
R-SA-1
R-SA-2 | null | null | null | null | null | null | R-AM-3 | null | null | null | null | null | null | null | null | null | null | null | null | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | null | null | null | R-IR-3 | null | R-SA-1 | R-SA-2 | NT-1
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | NT-1 | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | NT-9 | NT-10 | NT-11 | NT-12 | NT-13 | NT-14 | MT-1 | MT-2 | MT-3 | MT-4 | MT-5 | MT-6 | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Business Continuity & Disaster Recovery | Coordinated Testing with Related Plans | BCD-04.1 | Mechanisms exist to coordinate contingency plan testing with internal and external elements responsible for related plans. | - Playbooks
- Enterprise-wide Continuity of Operations Plan (COOP) | null | Does the organization coordinate contingency plan testing with internal and external elements responsible for related plans? | 3 | Recover | null | X | null | There is no evidence of a capability to coordinate contingency plan testing with internal and external elements responsible for related plans. | Business Continuity & Disaster Recovery (BCD) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• IT personnel work with business stakeholders to identify business-critical systems and services, including internal teams and third-party service providers.
• IT personnel develop limited Disaster Recovery Plans (DRP) to recover business-critical systems and services.
• Business stakeholders develop limited Business Continuity Plans (BCPs) to ensure business-critical functions are sustainable both during and after an incident within Recovery Time Objectives (RTOs).
• Backups are performed ad-hoc and focus on business-critical systems.
• Limited technologies exist to support near real-time network infrastructure failover (e.g., redundant ISPs, redundant power, etc.). | Business Continuity & Disaster Recovery (BCD) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Business Continuity / Disaster Recovery (BC/DR) management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for BC/DR management.
• BC/DR roles are formally assigned as an additional duty to existing IT/cybersecurity personnel.
• Recovery Time Objectives (RTOs) identify business-critical systems and services, which are given priority of service in alternate processing and storage sites.
• IT personnel develop Disaster Recovery Plans (DRP) to recover business-critical systems and services.
• Data/process owners conduct a Business Impact Analysis (BIA) at least annually, or after any major technology or process change, to identify assets critical to the business in need of protection, as well as single points of failure.
• IT/cybersecurity personnel work with business stakeholders to develop Business Continuity Plans (BCPs) to ensure business functions are sustainable both during and after an incident within Recovery Time Objectives (RTOs).
• IT personnel use a backup methodology (e.g., grandfather, father & s on rotation) to store backups in a secondary location, separate from the primary storage site.
• IT personnel configure business-critical systems to transfer backup data to the alternate storage site at a rate that is capable of meeting Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs). | Business Continuity & Disaster Recovery (BCD) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A formal Business Continuity & Disaster Recovery (BC/DR) program exists with defined roles and responsibilities to restore functionality in the event of a catastrophe, emergency, or significant disruptive incident that is handled in accordance with the Continuity of Operations Plan (COOP).
• BC/DR personnel work with business stakeholders to identify business-critical systems, services, internal teams and third-party service providers.
• Application/system/process owners conduct a Business Impact Analysis (BIA) at least annually, or after any major technology or process change, to identify assets critical to the business in need of protection, as well as single points of failure.
• Recovery Time Objectives (RTOs) are defined.
• Recovery Point Objectives (RPOs) are defined.
• Controls are assigned to sensitive/regulated assets to comply with specific BC/DR requirements to facilitate recovery operations in accordance with RTOs and RPOs.
• IT personnel work with business stakeholders to develop Disaster Recovery Plans (DRP) to recover business-critical systems and services within RPOs.
• Business stakeholders work with IT personnel to develop Business Continuity Plans (BCPs) to ensure business functions are sustainable both during and after an incident within RTOs.
• The data backup function is formally assigned with defined roles and responsibilities. | Business Continuity & Disaster Recovery (BCD) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to coordinate contingency plan testing with internal and external elements responsible for related plans. | null | null | null | null | null | null | null | null | null | null | null | SO22 | null | null | null | 8.5
8.6 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | PR.PO-P8 | null | null | null | CP-4(1) | null | CP-4(1) | CP-4(1) | CP-4(1) | null | null | CP-4(1) | CP-4(1) | null | null | null | CP-4(1) | CP-4(1) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | K.9.2 | null | null | null | null | null | RESPONSE-4.N.MIL3 | null | null | null | null | null | null | null | null | null | CP-4(1) | null | null | null | null | null | null | null | CP-4(1) | null | CP-4(1) | CP-4(1) | null | CP-4(1) | null | CP-4(1) | CP-4(1) | null | null | null | null | null | null | null | null | null | null | CP-4(1) | null | null | null | null | null | null | null | null | null | null | null | CP-4(1) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | CP-4(1) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 25.6
25.7 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 8.3.4 | null | null | null | null | null | null | null | 2.8 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1 | null | null | null | null | R-AM-1 | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | null | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | null | null | null | R-IR-1 | R-IR-2 | R-IR-3 | R-IR-4 | R-SA-1 | null | NT-7
MT-1
MT-2
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | null | null | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Business Continuity & Disaster Recovery | Alternate Storage & Processing Sites | BCD-04.2 | Mechanisms exist to test contingency plans at alternate storage & processing sites to both familiarize contingency personnel with the facility and evaluate the capabilities of the alternate processing site to support contingency operations. | null | null | Does the organization test contingency plans at alternate storage & processing sites to both familiarize contingency personnel with the facility and evaluate the capabilities of the alternate processing site to support contingency operations? | 5 | Recover | null | X | null | There is no evidence of a capability to test contingency plans at alternate storage & processing sites to both familiarize contingency personnel with the facility and evaluate the capabilities of the alternate processing site to support contingency operations. | SP-CMM1 is N/A, since a structured process is required to test contingency plans at alternate storage & processing sites to both familiarize contingency personnel with the facility and evaluate the capabilities of the alternate processing site to support contingency operations. | Business Continuity & Disaster Recovery (BCD) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Business Continuity / Disaster Recovery (BC/DR) management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for BC/DR management.
• BC/DR roles are formally assigned as an additional duty to existing IT/cybersecurity personnel.
• Recovery Time Objectives (RTOs) identify business-critical systems and services, which are given priority of service in alternate processing and storage sites.
• IT personnel develop Disaster Recovery Plans (DRP) to recover business-critical systems and services.
• Data/process owners conduct a Business Impact Analysis (BIA) at least annually, or after any major technology or process change, to identify assets critical to the business in need of protection, as well as single points of failure.
• IT/cybersecurity personnel work with business stakeholders to develop Business Continuity Plans (BCPs) to ensure business functions are sustainable both during and after an incident within Recovery Time Objectives (RTOs).
• IT personnel use a backup methodology (e.g., grandfather, father & s on rotation) to store backups in a secondary location, separate from the primary storage site.
• IT personnel configure business-critical systems to transfer backup data to the alternate storage site at a rate that is capable of meeting Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs).
• on at least an annual basis, IT/cybersecurity personnel conduct tabletop exercises to validate disaster recovery and contingency plans, in conjunction with stakeholders and any required vendors. | Business Continuity & Disaster Recovery (BCD) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A formal Business Continuity & Disaster Recovery (BC/DR) program exists with defined roles and responsibilities to restore functionality in the event of a catastrophe, emergency, or significant disruptive incident that is handled in accordance with the Continuity of Operations Plan (COOP).
• BC/DR personnel work with business stakeholders to identify business-critical systems, services, internal teams and third-party service providers.
• Application/system/process owners conduct a Business Impact Analysis (BIA) at least annually, or after any major technology or process change, to identify assets critical to the business in need of protection, as well as single points of failure.
• Recovery Time Objectives (RTOs) are defined.
• Recovery Point Objectives (RPOs) are defined.
• Controls are assigned to sensitive/regulated assets to comply with specific BC/DR requirements to facilitate recovery operations in accordance with RTOs and RPOs.
• IT personnel work with business stakeholders to develop Disaster Recovery Plans (DRP) to recover business-critical systems and services within RPOs.
• Business stakeholders work with IT personnel to develop Business Continuity Plans (BCPs) to ensure business functions are sustainable both during and after an incident within RTOs.
• The data backup function is formally assigned with defined roles and responsibilities.
• on at least an annual basis, BC/DR personnel conduct real-world exercises to validate the viability of disaster recovery and contingency plans, in conjunction with stakeholders and any required vendors. | Business Continuity & Disaster Recovery (BCD) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to test contingency plans at alternate storage & processing sites to both familiarize contingency personnel with the facility and evaluate the capabilities of the alternate processing site to support contingency operations. | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | CP-4(2) | null | null | CP-4(2) | CP-4(2) | null | null | null | CP-4(2) | null | null | null | null | CP-4(2) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | K.9.6 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | CP-4(2) | null | null | CP-4(2) | null | CP-4(2) | null | null | CP-4(2) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 3-1-1-1 | null | null | null | null | null | null | null | null | null | null | null | null | null | B5.b | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 8.2.4 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1 | null | null | null | null | R-AM-1 | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | null | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | null | null | null | R-IR-1 | R-IR-2 | R-IR-3 | R-IR-4 | R-SA-1 | null | NT-1
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | NT-1 | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | NT-9 | NT-10 | NT-11 | NT-12 | NT-13 | NT-14 | MT-1 | MT-2 | MT-3 | MT-4 | MT-5 | MT-6 | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Business Continuity & Disaster Recovery | Contingency Plan Root Cause Analysis (RCA) & Lessons Learned | BCD-05 | Mechanisms exist to conduct a Root Cause Analysis (RCA) and "lessons learned" activity every time the contingency plan is activated. | - Standardized Operating Procedures (SOP)
- Disaster Recovery Plan (DRP)
- Business Continuity Plan (BCP)
- Continuity of Operations Plan (COOP) | E-BCM-04 | Does the organization conduct a Root Cause Analysis (RCA) and "lessons learned" activity every time the contingency plan is activated? | 9 | Detect | null | X | X | There is no evidence of a capability to conduct a Root Cause Analysis (RCA) and "lessons learned" activity every time the contingency plan is activated. | Business Continuity & Disaster Recovery (BCD) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• IT personnel work with business stakeholders to identify business-critical systems and services, including internal teams and third-party service providers.
• IT personnel develop limited Disaster Recovery Plans (DRP) to recover business-critical systems and services.
• Business stakeholders develop limited Business Continuity Plans (BCPs) to ensure business-critical functions are sustainable both during and after an incident within Recovery Time Objectives (RTOs).
• Backups are performed ad-hoc and focus on business-critical systems.
• Limited technologies exist to support near real-time network infrastructure failover (e.g., redundant ISPs, redundant power, etc.).
• Informal Root Cause Analysis (RCA) are performed to address insufficiencies in existing processes to prevent reoccurrences. | Business Continuity & Disaster Recovery (BCD) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Business Continuity / Disaster Recovery (BC/DR) management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for BC/DR management.
• BC/DR roles are formally assigned as an additional duty to existing IT/cybersecurity personnel.
• Recovery Time Objectives (RTOs) identify business-critical systems and services, which are given priority of service in alternate processing and storage sites.
• IT personnel develop Disaster Recovery Plans (DRP) to recover business-critical systems and services.
• Data/process owners conduct a Business Impact Analysis (BIA) at least annually, or after any major technology or process change, to identify assets critical to the business in need of protection, as well as single points of failure.
• IT/cybersecurity personnel work with business stakeholders to develop Business Continuity Plans (BCPs) to ensure business functions are sustainable both during and after an incident within Recovery Time Objectives (RTOs).
• IT personnel use a backup methodology (e.g., grandfather, father & s on rotation) to store backups in a secondary location, separate from the primary storage site.
• IT personnel configure business-critical systems to transfer backup data to the alternate storage site at a rate that is capable of meeting Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs).
• A formal Root Cause Analysis (RCA) is performed that documents the findings in a report for both technical and business leadership management. | Business Continuity & Disaster Recovery (BCD) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A formal Business Continuity & Disaster Recovery (BC/DR) program exists with defined roles and responsibilities to restore functionality in the event of a catastrophe, emergency, or significant disruptive incident that is handled in accordance with the Continuity of Operations Plan (COOP).
• BC/DR personnel work with business stakeholders to identify business-critical systems, services, internal teams and third-party service providers.
• Application/system/process owners conduct a Business Impact Analysis (BIA) at least annually, or after any major technology or process change, to identify assets critical to the business in need of protection, as well as single points of failure.
• Recovery Time Objectives (RTOs) are defined.
• Recovery Point Objectives (RPOs) are defined.
• Controls are assigned to sensitive/regulated assets to comply with specific BC/DR requirements to facilitate recovery operations in accordance with RTOs and RPOs.
• IT personnel work with business stakeholders to develop Disaster Recovery Plans (DRP) to recover business-critical systems and services within RPOs.
• Business stakeholders work with IT personnel to develop Business Continuity Plans (BCPs) to ensure business functions are sustainable both during and after an incident within RTOs.
• The data backup function is formally assigned with defined roles and responsibilities.
• A formal Root Cause Analysis (RCA) is performed to document the findings in a report for both technical and business leadership management.
• Findings from RCA are submitted to a risk register, or similar tracking mechanism and assigned owners for remediation. | See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to conduct a Root Cause Analysis (RCA) and "lessons learned" activity every time the contingency plan is activated. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to conduct a Root Cause Analysis (RCA) and "lessons learned" activity every time the contingency plan is activated. | CC7.5 | CC7.4-POF10
CC7.5-POF3 | null | null | null | null | null | DSS04.08 | null | null | null | SO20
SO22 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | CP-4 | CP-4 | CP-4 | CP-4 | CP-4 | null | CP-4 | CP-4 | CP-4 | null | null | CP-4 | CP-4 | CP-4 | null | CP-4 | CP-4 | null | null | CP-4 | CP-4 | null | null | null | null | null | null | RC.IM-1 | ID.IM-03 | null | null | null | null | null | null | null | null | null | null | null | null | J.2.6 | null | null | null | null | null | RESPONSE-4.O.MIL3 | COMM:SG3.SP2
SC:SG5.SP2
SC:SG5.SP3
SC:SG5.SP4
SC:SG6.SP2 | null | null | null | null | null | null | null | null | CP-4 | null | null | null | null | null | null | null | CP-4 | CP-4 | CP-4 | CP-4 | CP-4 | CP-4 | CP-4 | CP-4 | CP-4 | CP-4 | null | D5.IR.Pl.Int.4 | null | null | null | null | null | null | null | CP-4 | null | null | 8-615 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | CP-4 | CP-4 | CP-4 | null | null | null | 3.7.4(88)
3.7.4(90) | Art 13.2
Art 13.2(a)
Art 13.2(b)
Art 13.2(c)
Art 13.2(d)
Art 13.3 | null | null | null | null | null | null | null | null | null | null | null | null | null | BCM-04 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | D2.a | D2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 7.8.1
7.8.2
7.8.3 | null | null | null | null | null | null | null | 5.9 | null | null | null | null | null | null | null | null | null | null | null | x | null | null | x | R-AM-3
R-BC-1
R-BC-3
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-4
R-GV-5
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1 | null | null | null | null | null | null | R-AM-3 | R-BC-1 | null | R-BC-3 | null | null | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | R-EX-6 | R-EX-7 | R-GV-1 | R-GV-2 | null | R-GV-4 | R-GV-5 | null | null | null | R-IR-1 | R-IR-2 | R-IR-3 | R-IR-4 | R-SA-1 | null | NT-1
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | NT-1 | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | NT-9 | NT-10 | NT-11 | NT-12 | NT-13 | NT-14 | MT-1 | MT-2 | MT-3 | MT-4 | MT-5 | MT-6 | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Business Continuity & Disaster Recovery | Contingency Planning & Updates | BCD-06 | Mechanisms exist to keep contingency plans current with business needs, technology changes and feedback from contingency plan testing activities. | - Offline / offsite documentation | E-BCM-05 | Does the organization keep contingency plans current with business needs, technology changes and feedback from contingency plan testing activities? | 8 | Recover | null | X | X | There is no evidence of a capability to keep contingency plans current with business needs, technology changes and feedback from contingency plan testing activities. | Business Continuity & Disaster Recovery (BCD) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• IT personnel work with business stakeholders to identify business-critical systems and services, including internal teams and third-party service providers.
• IT personnel develop limited Disaster Recovery Plans (DRP) to recover business-critical systems and services.
• Business stakeholders develop limited Business Continuity Plans (BCPs) to ensure business-critical functions are sustainable both during and after an incident within Recovery Time Objectives (RTOs).
• Backups are performed ad-hoc and focus on business-critical systems.
• Limited technologies exist to support near real-time network infrastructure failover (e.g., redundant ISPs, redundant power, etc.).
• IT personnel work with business stakeholders to identify alternative or compensating controls to address control deficiencies, if the primary means of implementing the security function is unavailable or compromised. | Business Continuity & Disaster Recovery (BCD) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Business Continuity / Disaster Recovery (BC/DR) management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for BC/DR management.
• BC/DR roles are formally assigned as an additional duty to existing IT/cybersecurity personnel.
• Recovery Time Objectives (RTOs) identify business-critical systems and services, which are given priority of service in alternate processing and storage sites.
• IT personnel develop Disaster Recovery Plans (DRP) to recover business-critical systems and services.
• Data/process owners conduct a Business Impact Analysis (BIA) at least annually, or after any major technology or process change, to identify assets critical to the business in need of protection, as well as single points of failure.
• IT/cybersecurity personnel work with business stakeholders to develop Business Continuity Plans (BCPs) to ensure business functions are sustainable both during and after an incident within Recovery Time Objectives (RTOs).
• IT personnel use a backup methodology (e.g., grandfather, father & s on rotation) to store backups in a secondary location, separate from the primary storage site.
• IT personnel configure business-critical systems to transfer backup data to the alternate storage site at a rate that is capable of meeting Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs).
• on at least an annual basis, or after any major technology or process change, the data/process owner updates the data mapping documentation. | Business Continuity & Disaster Recovery (BCD) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A formal Business Continuity & Disaster Recovery (BC/DR) program exists with defined roles and responsibilities to restore functionality in the event of a catastrophe, emergency, or significant disruptive incident that is handled in accordance with the Continuity of Operations Plan (COOP).
• BC/DR personnel work with business stakeholders to identify business-critical systems, services, internal teams and third-party service providers.
• Application/system/process owners conduct a Business Impact Analysis (BIA) at least annually, or after any major technology or process change, to identify assets critical to the business in need of protection, as well as single points of failure.
• Recovery Time Objectives (RTOs) are defined.
• Recovery Point Objectives (RPOs) are defined.
• Controls are assigned to sensitive/regulated assets to comply with specific BC/DR requirements to facilitate recovery operations in accordance with RTOs and RPOs.
• IT personnel work with business stakeholders to develop Disaster Recovery Plans (DRP) to recover business-critical systems and services within RPOs.
• Business stakeholders work with IT personnel to develop Business Continuity Plans (BCPs) to ensure business functions are sustainable both during and after an incident within RTOs.
• The data backup function is formally assigned with defined roles and responsibilities.
• on at least an annual basis, or after any major technology or process change, the data/process owner updates the data mapping documentation. | Business Continuity & Disaster Recovery (BCD) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to keep contingency plans current with business needs, technology changes and feedback from contingency plan testing activities. | CC7.5 | CC7.5-POF4
CC7.5-POF5 | null | null | null | null | null | DSS04.05 | null | BCR-05 | null | SO19
SO20 | null | null | null | 6.3
7.5
7.5.1
7.5.3
7.5.3.1
7.5.3.2
8.4
8.4.1
8.4.2
8.4.2.1
8.4.2.2
8.4.4
8.4.4.1
8.4.4.2
8.4.4.3
8.4.5
8.6
10.1
10.1.1
10.1.2
10.1.3
10.2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | CP-2 | CP-2 | CP-2 | CP-2 | CP-2 | null | CP-2 | CP-2 | CP-2 | null | null | CP-2 | CP-2 | CP-2 | null | CP-2 | CP-2 | null | null | CP-2 | CP-2 | null | null | null | null | null | null | RC.IM-2 | null | null | null | null | null | null | null | null | null | null | null | null | null | K.1.3 | null | null | null | null | null | RESPONSE-4.P.MIL3 | SC:SG2.SP1
SC:SG3.SP2
SC:SG3.SP3
SC:SG7.SP2 | null | null | null | null | null | null | null | null | CP-2 | null | null | null | null | null | null | null | CP-2 | CP-2 | CP-2 | CP-2 | CP-2 | CP-2 | CP-2 | CP-2 | CP-2 | CP-2 | null | D5.IR.Pl.Int.4
D5.IR.Te.Int.5 | null | null | null | null | null | null | null | CP-2 | null | CIP-009-6
R3 | 8-614 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | CP-2 | CP-2 | CP-2 | null | null | null | 3.7.4(88)
3.7.4(90) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | BCM-04 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 3-1-4 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | null | null | x | R-AM-3
R-BC-1
R-BC-3
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-4
R-GV-5
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1 | null | null | null | null | null | null | R-AM-3 | R-BC-1 | null | R-BC-3 | null | null | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | R-EX-6 | R-EX-7 | R-GV-1 | R-GV-2 | null | R-GV-4 | R-GV-5 | null | null | null | R-IR-1 | R-IR-2 | R-IR-3 | R-IR-4 | R-SA-1 | null | NT-7
MT-1
MT-2
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | null | null | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Business Continuity & Disaster Recovery | Alternative Security Measures | BCD-07 | Mechanisms exist to implement alternative or compensating controls to satisfy security functions when the primary means of implementing the security function is unavailable or compromised. | - Business Impact Analysis (BIA)
- Criticality assessments | null | Does the organization implement alternative or compensating controls to satisfy security functions when the primary means of implementing the security function is unavailable or compromised? | 9 | Protect | null | X | X | There is no evidence of a capability to implement alternative or compensating controls to satisfy security functions when the primary means of implementing the security function is unavailable or compromised. | Business Continuity & Disaster Recovery (BCD) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• IT personnel work with business stakeholders to identify business-critical systems and services, including internal teams and third-party service providers.
• IT personnel develop limited Disaster Recovery Plans (DRP) to recover business-critical systems and services.
• Business stakeholders develop limited Business Continuity Plans (BCPs) to ensure business-critical functions are sustainable both during and after an incident within Recovery Time Objectives (RTOs).
• Backups are performed ad-hoc and focus on business-critical systems.
• Limited technologies exist to support near real-time network infrastructure failover (e.g., redundant ISPs, redundant power, etc.).
• IT personnel work with business stakeholders to identify alternative or compensating controls to address control deficiencies, if the primary means of implementing the security function is unavailable or compromised. | Business Continuity & Disaster Recovery (BCD) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Business Continuity / Disaster Recovery (BC/DR) management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for BC/DR management.
• BC/DR roles are formally assigned as an additional duty to existing IT/cybersecurity personnel.
• Recovery Time Objectives (RTOs) identify business-critical systems and services, which are given priority of service in alternate processing and storage sites.
• IT personnel develop Disaster Recovery Plans (DRP) to recover business-critical systems and services.
• Data/process owners conduct a Business Impact Analysis (BIA) at least annually, or after any major technology or process change, to identify assets critical to the business in need of protection, as well as single points of failure.
• IT/cybersecurity personnel work with business stakeholders to develop Business Continuity Plans (BCPs) to ensure business functions are sustainable both during and after an incident within Recovery Time Objectives (RTOs).
• IT personnel use a backup methodology (e.g., grandfather, father & s on rotation) to store backups in a secondary location, separate from the primary storage site.
• IT personnel configure business-critical systems to transfer backup data to the alternate storage site at a rate that is capable of meeting Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs). | Business Continuity & Disaster Recovery (BCD) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A formal Business Continuity & Disaster Recovery (BC/DR) program exists with defined roles and responsibilities to restore functionality in the event of a catastrophe, emergency, or significant disruptive incident that is handled in accordance with the Continuity of Operations Plan (COOP).
• BC/DR personnel work with business stakeholders to identify business-critical systems, services, internal teams and third-party service providers.
• Application/system/process owners conduct a Business Impact Analysis (BIA) at least annually, or after any major technology or process change, to identify assets critical to the business in need of protection, as well as single points of failure.
• Recovery Time Objectives (RTOs) are defined.
• Recovery Point Objectives (RPOs) are defined.
• Controls are assigned to sensitive/regulated assets to comply with specific BC/DR requirements to facilitate recovery operations in accordance with RTOs and RPOs.
• IT personnel work with business stakeholders to develop Disaster Recovery Plans (DRP) to recover business-critical systems and services within RPOs.
• Business stakeholders work with IT personnel to develop Business Continuity Plans (BCPs) to ensure business functions are sustainable both during and after an incident within RTOs.
• The data backup function is formally assigned with defined roles and responsibilities. | See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to implement alternative or compensating controls to satisfy security functions when the primary means of implementing the security function is unavailable or compromised. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to implement alternative or compensating controls to satisfy security functions when the primary means of implementing the security function is unavailable or compromised. | CC9.1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | CP-13 | null | null | null | CP-13 | null | null | null | null | CP-13 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | K.3.3
| null | null | null | null | null | null | EC:SG2.SP2
SC:SG1.SP1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 8-605
8-607
8-610 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 1518 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | R-AM-3
R-BC-1
R-BC-2
R-BC-4
R-BC-5
R-EX-5
R-EX-6
R-EX-7
R-GV-2
R-IR-3 | null | null | null | null | null | null | R-AM-3 | R-BC-1 | R-BC-2 | null | R-BC-4 | R-BC-5 | null | null | null | null | R-EX-5 | R-EX-6 | R-EX-7 | null | R-GV-2 | null | null | null | null | null | null | null | null | R-IR-3 | null | null | null | NT-1
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | NT-1 | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | NT-9 | NT-10 | NT-11 | NT-12 | NT-13 | NT-14 | MT-1 | MT-2 | MT-3 | MT-4 | MT-5 | MT-6 | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Business Continuity & Disaster Recovery | Alternate Storage Site | BCD-08 | Mechanisms exist to establish an alternate storage site that includes both the assets and necessary agreements to permit the storage and recovery of system backup information. | - SunGard
- AWS
- Azure | null | Does the organization establish an alternate storage site that includes both the assets and necessary agreements to permit the storage and recovery of system backup information? | 9 | Protect | null | X | X | There is no evidence of a capability to establish an alternate storage site that includes both the assets and necessary agreements to permit the storage and recovery of system backup information. | SP-CMM1 is N/A, since a structured process is required to establish an alternate storage site that includes both the assets and necessary agreements to permit the storage and recovery of system backup information. | Business Continuity & Disaster Recovery (BCD) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Business Continuity / Disaster Recovery (BC/DR) management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for BC/DR management.
• BC/DR roles are formally assigned as an additional duty to existing IT/cybersecurity personnel.
• Recovery Time Objectives (RTOs) identify business-critical systems and services, which are given priority of service in alternate processing and storage sites.
• IT personnel develop Disaster Recovery Plans (DRP) to recover business-critical systems and services.
• Data/process owners conduct a Business Impact Analysis (BIA) at least annually, or after any major technology or process change, to identify assets critical to the business in need of protection, as well as single points of failure.
• IT/cybersecurity personnel work with business stakeholders to develop Business Continuity Plans (BCPs) to ensure business functions are sustainable both during and after an incident within Recovery Time Objectives (RTOs).
• IT personnel use a backup methodology (e.g., grandfather, father & s on rotation) to store backups in a secondary location, separate from the primary storage site.
• IT personnel configure business-critical systems to transfer backup data to the alternate site at a rate that is capable of meeting Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs).
• the organization acquires space to serve as the alternate site that is in a different geographic zone from the inaccessible facility (e.g., dedicated facility or cloud instance).Roles and responsibilities are formally assigned to restore the primary site in the event of a catastrophe, emergency, or similar-type disruptive incident in accordance with the Continuity of Operations (COOP) plan.
• IT personnel backup copies of business-critical software, licenses/keys and other security-related information to the alternate site.
• IT personnel configure business-critical systems to be able to failover to an alternate location than the primary system which can be activated without loss of information or disruption to operations.
• A dedicated alternate site is identified, documented, equipped to match the processing capabilities of the primary site and not used for existing production activities .
• IT personnel maintain network connectivity for data communications from the alternate site toother business critical locations in order to support business processes.
• IT personnel maintain redundant network connectivity from the alternate site to the business locations providing the ability for data communications to support business processes.
• IT personnel maintain technologies compatible with existing network and infrastructure configuration. the organization either owns the facility or contracts with a third-party provider for off-site storage. | Business Continuity & Disaster Recovery (BCD) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A formal Business Continuity & Disaster Recovery (BC/DR) program exists with defined roles and responsibilities to restore functionality in the event of a catastrophe, emergency, or significant disruptive incident that is handled in accordance with the Continuity of Operations Plan (COOP).
• BC/DR personnel work with business stakeholders to identify business-critical systems, services, internal teams and third-party service providers.
• Application/system/process owners conduct a Business Impact Analysis (BIA) at least annually, or after any major technology or process change, to identify assets critical to the business in need of protection, as well as single points of failure.
• Recovery Time Objectives (RTOs) are defined.
• Recovery Point Objectives (RPOs) are defined.
• Controls are assigned to sensitive/regulated assets to comply with specific BC/DR requirements to facilitate recovery operations in accordance with RTOs and RPOs.
• IT personnel work with business stakeholders to develop Disaster Recovery Plans (DRP) to recover business-critical systems and services within RPOs.
• Business stakeholders work with IT personnel to develop Business Continuity Plans (BCPs) to ensure business functions are sustainable both during and after an incident within RTOs.
• The data backup function is formally assigned with defined roles and responsibilities.
• IT personnel configure business-critical systems to transfer backup data to an alternate site at a rate that is capable of meeting RTOs and RPOs.
• organization acquires space to serve as the alternate site that is in a different geographic zone from the inaccessible facility (e.g., dedicated facility or cloud instance).
• IT personnel backup copies of business-critical software, licenses/keys and other security-related information to the alternate site.
• IT personnel configure business-critical systems to be able to failover to an alternate location than the primary system which can be activated without loss of information or disruption to operations.
• Data centers have alternate telecommunications services from providers that are separated from primary service providers to reduce susceptibility to the same threats.
• Dedicated alternate storage and/ or processing sites are identified and documented.
• IT personnel maintain network connectivity from the alternate site to the business locations providing the ability for data communications to support business processes. | See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to establish an alternate storage site that includes both the assets and necessary agreements to permit the storage and recovery of system backup information. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to establish an alternate storage site that includes both the assets and necessary agreements to permit the storage and recovery of system backup information. | A1.2 | A1.2-POF9 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 17.2.1 | 8.14 | 17.2.1 | null | 6.14.1.3
6.14.2
6.14.2.1 | null | null | null | T1070, T1070.001, T1070.002, T1119, T1486, T1565, T1565.001 | null | null | null | null | null | null | null | CP-6 | null | CP-6 | CP-6 | CP-6
PE-23 | null | null | CP-6 | CP-6 | PE-23 | null | null | CP-6 | CP-6 | null | CP-6 | null | null | null | CP-6 | CP-6 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | K.3.3
| null | null | null | null | null | null | EC:SG4.SP1 | null | null | null | null | null | null | null | null | CP-6 | null | null | null | null | null | null | null | CP-6 | null | CP-6 | CP-6 | null | CP-6 | null | CP-6 | CP-6 | null | null | null | null | null | null | 164.310(a)(2)(i) | null | null | null | 2.B.7
2.B.7.1
2.B.7.2
2.B.7.3 | null | null | 8-603 | null | null | null | null | null | null | null | CP-6 | CP-6 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | CP-6 | null | CP-6 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 10.5 | PSS-12 | null | null | null | 11.7
25.7
25.10 | null | null | null | null | null | null | null | null | null | null | null | 3-1-1-1 | null | null | null | null | null | null | null | null | 8.1.8 [MP.IF.8]
8.3.4 [MP.EQ.4]
8.4.4 [MP.COM.4]
8.8.4 [MP.S.4] | null | null | null | null | B5.b | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 17.2.1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | null | null | x | R-AM-1
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-GV-1
R-IR-4 | null | null | null | null | R-AM-1 | null | R-AM-3 | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | null | R-GV-1 | null | null | null | null | null | null | null | null | null | null | R-IR-4 | null | null | NT-1
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | NT-1 | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | NT-9 | NT-10 | NT-11 | NT-12 | NT-13 | NT-14 | MT-1 | MT-2 | MT-3 | MT-4 | MT-5 | MT-6 | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Business Continuity & Disaster Recovery | Separation from Primary Site | BCD-08.1 | Mechanisms exist to separate the alternate storage site from the primary storage site to reduce susceptibility to similar threats. | - SunGard
- AWS
- Azure | null | Does the organization separate the alternate storage site from the primary storage site to reduce susceptibility to similar threats? | 7 | Protect | null | X | X | There is no evidence of a capability to separate the alternate storage site from the primary storage site to reduce susceptibility to similar threats. | SP-CMM1 is N/A, since a structured process is required to separate the alternate storage site from the primary storage site to reduce susceptibility to similar threats. | Business Continuity & Disaster Recovery (BCD) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Business Continuity / Disaster Recovery (BC/DR) management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for BC/DR management.
• BC/DR roles are formally assigned as an additional duty to existing IT/cybersecurity personnel.
• Recovery Time Objectives (RTOs) identify business-critical systems and services, which are given priority of service in alternate processing and storage sites.
• IT personnel develop Disaster Recovery Plans (DRP) to recover business-critical systems and services.
• Data/process owners conduct a Business Impact Analysis (BIA) at least annually, or after any major technology or process change, to identify assets critical to the business in need of protection, as well as single points of failure.
• IT/cybersecurity personnel work with business stakeholders to develop Business Continuity Plans (BCPs) to ensure business functions are sustainable both during and after an incident within Recovery Time Objectives (RTOs).
• IT personnel use a backup methodology (e.g., grandfather, father & s on rotation) to store backups in a secondary location, separate from the primary storage site.
• IT personnel configure business-critical systems to transfer backup data to the alternate storage site at a rate that is capable of meeting Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs).
• organization acquires space to serve as the alternate site that is in a different geographic zone from the inaccessible facility (e.g., dedicated facility or cloud instance). | Business Continuity & Disaster Recovery (BCD) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A formal Business Continuity & Disaster Recovery (BC/DR) program exists with defined roles and responsibilities to restore functionality in the event of a catastrophe, emergency, or significant disruptive incident that is handled in accordance with the Continuity of Operations Plan (COOP).
• BC/DR personnel work with business stakeholders to identify business-critical systems, services, internal teams and third-party service providers.
• Application/system/process owners conduct a Business Impact Analysis (BIA) at least annually, or after any major technology or process change, to identify assets critical to the business in need of protection, as well as single points of failure.
• Recovery Time Objectives (RTOs) are defined.
• Recovery Point Objectives (RPOs) are defined.
• Controls are assigned to sensitive/regulated assets to comply with specific BC/DR requirements to facilitate recovery operations in accordance with RTOs and RPOs.
• IT personnel work with business stakeholders to develop Disaster Recovery Plans (DRP) to recover business-critical systems and services within RPOs.
• Business stakeholders work with IT personnel to develop Business Continuity Plans (BCPs) to ensure business functions are sustainable both during and after an incident within RTOs.
• The data backup function is formally assigned with defined roles and responsibilities.
• organization acquires space to serve as the alternate site that is in a different geographic zone from the inaccessible facility (e.g., dedicated facility or cloud instance). | See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to separate the alternate storage site from the primary storage site to reduce susceptibility to similar threats. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to separate the alternate storage site from the primary storage site to reduce susceptibility to similar threats. | A1.2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | CP-6(1) | null | CP-6(1) | CP-6(1) | CP-6(1) | null | null | CP-6(1) | CP-6(1) | null | null | null | CP-6(1) | CP-6(1) | null | CP-6(1) | null | null | null | CP-6(1) | CP-6(1) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | K.8.2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | CP-6(1) | null | null | null | null | null | null | null | CP-6(1) | null | CP-6(1) | CP-6(1) | null | CP-6(1) | null | CP-6(1) | CP-6(1) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | CP-6(1) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | CP-6(1) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | OPS-09 | null | null | null | 25.11 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | B5.b | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | R-AM-3
R-BC-1
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-GV-1 | null | null | null | null | null | null | R-AM-3 | R-BC-1 | null | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | null | R-GV-1 | null | null | null | null | null | null | null | null | null | null | null | null | null | NT-7
MT-1
MT-2
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | null | null | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Business Continuity & Disaster Recovery | Accessibility | BCD-08.2 | Mechanisms exist to identify and mitigate potential accessibility problems to the alternate storage site in the event of an area-wide disruption or disaster. | - SunGard
- AWS
- Azure | null | Does the organization identify and mitigate potential accessibility problems to the alternate storage site in the event of an area-wide disruption or disaster? | 5 | Protect | null | X | null | There is no evidence of a capability to identify and mitigate potential accessibility problems to the alternate storage site in the event of an area-wide disruption or disaster. | SP-CMM1 is N/A, since a structured process is required to identify and mitigate potential accessibility problems to the alternate storage site in the event of an area-wide disruption or disaster. | Business Continuity & Disaster Recovery (BCD) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Business Continuity / Disaster Recovery (BC/DR) management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for BC/DR management.
• BC/DR roles are formally assigned as an additional duty to existing IT/cybersecurity personnel.
• Recovery Time Objectives (RTOs) identify business-critical systems and services, which are given priority of service in alternate processing and storage sites.
• IT personnel develop Disaster Recovery Plans (DRP) to recover business-critical systems and services.
• Data/process owners conduct a Business Impact Analysis (BIA) at least annually, or after any major technology or process change, to identify assets critical to the business in need of protection, as well as single points of failure.
• IT/cybersecurity personnel work with business stakeholders to develop Business Continuity Plans (BCPs) to ensure business functions are sustainable both during and after an incident within Recovery Time Objectives (RTOs).
• IT personnel use a backup methodology (e.g., grandfather, father & s on rotation) to store backups in a secondary location, separate from the primary storage site.
• IT personnel configure business-critical systems to transfer backup data to the alternate storage site at a rate that is capable of meeting Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs). | Business Continuity & Disaster Recovery (BCD) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A formal Business Continuity & Disaster Recovery (BC/DR) program exists with defined roles and responsibilities to restore functionality in the event of a catastrophe, emergency, or significant disruptive incident that is handled in accordance with the Continuity of Operations Plan (COOP).
• BC/DR personnel work with business stakeholders to identify business-critical systems, services, internal teams and third-party service providers.
• Application/system/process owners conduct a Business Impact Analysis (BIA) at least annually, or after any major technology or process change, to identify assets critical to the business in need of protection, as well as single points of failure.
• Recovery Time Objectives (RTOs) are defined.
• Recovery Point Objectives (RPOs) are defined.
• Controls are assigned to sensitive/regulated assets to comply with specific BC/DR requirements to facilitate recovery operations in accordance with RTOs and RPOs.
• IT personnel work with business stakeholders to develop Disaster Recovery Plans (DRP) to recover business-critical systems and services within RPOs.
• Business stakeholders work with IT personnel to develop Business Continuity Plans (BCPs) to ensure business functions are sustainable both during and after an incident within RTOs.
• The data backup function is formally assigned with defined roles and responsibilities. | See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to identify and mitigate potential accessibility problems to the alternate storage site in the event of an area-wide disruption or disaster. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to identify and mitigate potential accessibility problems to the alternate storage site in the event of an area-wide disruption or disaster. | A1.2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | CP-6(3) | null | CP-6(3) | CP-6(3) | CP-6(3) | null | null | CP-6(3) | CP-6(3) | null | null | null | CP-6(3) | CP-6(3) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | K.8.1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | CP-6(3) | null | null | null | null | null | null | null | CP-6(3) | null | CP-6(3) | CP-6(3) | null | CP-6(3) | null | CP-6(3) | CP-6(3) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | CP-6(3) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | CP-6(3) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 25.13 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | R-AC-4
R-AM-3
R-BC-1
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-GV-1 | null | null | null | R-AC-4 | null | null | R-AM-3 | R-BC-1 | null | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | null | R-GV-1 | null | null | null | null | null | null | null | null | null | null | null | null | null | NT-1
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | NT-1 | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | NT-9 | NT-10 | NT-11 | NT-12 | NT-13 | NT-14 | MT-1 | MT-2 | MT-3 | MT-4 | MT-5 | MT-6 | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Business Continuity & Disaster Recovery | Alternate Processing Site | BCD-09 | Mechanisms exist to establish an alternate processing site that provides security measures equivalent to that of the primary site. | - SunGard
- AWS
- Azure | null | Does the organization establish an alternate processing site that provides security measures equivalent to that of the primary site? | 9 | Protect | null | X | X | There is no evidence of a capability to establish an alternate processing site that provides security measures equivalent to that of the primary site. | SP-CMM1 is N/A, since a structured process is required to establish an alternate processing site that provides security measures equivalent to that of the primary site. | Business Continuity & Disaster Recovery (BCD) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Business Continuity / Disaster Recovery (BC/DR) management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for BC/DR management.
• BC/DR roles are formally assigned as an additional duty to existing IT/cybersecurity personnel.
• Recovery Time Objectives (RTOs) identify business-critical systems and services, which are given priority of service in alternate processing and storage sites.
• IT personnel develop Disaster Recovery Plans (DRP) to recover business-critical systems and services.
• Data/process owners conduct a Business Impact Analysis (BIA) at least annually, or after any major technology or process change, to identify assets critical to the business in need of protection, as well as single points of failure.
• IT/cybersecurity personnel work with business stakeholders to develop Business Continuity Plans (BCPs) to ensure business functions are sustainable both during and after an incident within Recovery Time Objectives (RTOs).
• IT personnel use a backup methodology (e.g., grandfather, father & s on rotation) to store backups in a secondary location, separate from the primary storage site.
• IT personnel configure business-critical systems to transfer backup data to the alternate site at a rate that is capable of meeting Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs).
• the organization acquires space to serve as the alternate site that is in a different geographic zone from the inaccessible facility (e.g., dedicated facility or cloud instance).Roles and responsibilities are formally assigned to restore the primary site in the event of a catastrophe, emergency, or similar-type disruptive incident in accordance with the Continuity of Operations (COOP) plan.
• IT personnel backup copies of business-critical software, licenses/keys and other security-related information to the alternate site.
• IT personnel configure business-critical systems to be able to failover to an alternate location than the primary system which can be activated without loss of information or disruption to operations.
• A dedicated alternate site is identified, documented, equipped to match the processing capabilities of the primary site and not used for existing production activities .
• IT personnel maintain network connectivity for data communications from the alternate site toother business critical locations in order to support business processes.
• IT personnel maintain redundant network connectivity from the alternate site to the business locations providing the ability for data communications to support business processes.
• IT personnel maintain technologies compatible with existing network and infrastructure configuration. the organization either owns the facility or contracts with a third-party provider for off-site storage. | Business Continuity & Disaster Recovery (BCD) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A formal Business Continuity & Disaster Recovery (BC/DR) program exists with defined roles and responsibilities to restore functionality in the event of a catastrophe, emergency, or significant disruptive incident that is handled in accordance with the Continuity of Operations Plan (COOP).
• BC/DR personnel work with business stakeholders to identify business-critical systems, services, internal teams and third-party service providers.
• Application/system/process owners conduct a Business Impact Analysis (BIA) at least annually, or after any major technology or process change, to identify assets critical to the business in need of protection, as well as single points of failure.
• Recovery Time Objectives (RTOs) are defined.
• Recovery Point Objectives (RPOs) are defined.
• Controls are assigned to sensitive/regulated assets to comply with specific BC/DR requirements to facilitate recovery operations in accordance with RTOs and RPOs.
• IT personnel work with business stakeholders to develop Disaster Recovery Plans (DRP) to recover business-critical systems and services within RPOs.
• Business stakeholders work with IT personnel to develop Business Continuity Plans (BCPs) to ensure business functions are sustainable both during and after an incident within RTOs.
• The data backup function is formally assigned with defined roles and responsibilities.
• IT personnel configure business-critical systems to transfer backup data to an alternate site at a rate that is capable of meeting RTOs and RPOs.
• organization acquires space to serve as the alternate site that is in a different geographic zone from the inaccessible facility (e.g., dedicated facility or cloud instance).
• IT personnel backup copies of business-critical software, licenses/keys and other security-related information to the alternate site.
• IT personnel configure business-critical systems to be able to failover to an alternate location than the primary system which can be activated without loss of information or disruption to operations.
• Data centers have alternate telecommunications services from providers that are separated from primary service providers to reduce susceptibility to the same threats.
• Dedicated alternate storage and/ or processing sites are identified and documented.
• IT personnel maintain network connectivity from the alternate site to the business locations providing the ability for data communications to support business processes. | See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to establish an alternate processing site that provides security measures equivalent to that of the primary site. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to establish an alternate processing site that provides security measures equivalent to that of the primary site. | A1.2 | A1.2-POF10 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 17.2.1 | 8.14 | 17.2.1 | null | 6.14
6.14.1
6.14.1.1 | null | null | null | T1070, T1070.001, T1070.002, T1119, T1485, T1486, T1490, T1491, T1491.001, T1491.002, T1561, T1561.001, T1561.002, T1565, T1565.001 | null | null | null | null | null | null | null | CP-7 | null | CP-7 | CP-7 | CP-7
PE-23 | null | null | CP-7 | CP-7 | PE-23 | null | null | CP-7 | CP-7 | null | CP-7 | null | null | null | CP-7 | CP-7 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | K.1.4 | null | null | null | null | null | null | EC:SG4.SP1 | null | null | null | null | null | null | null | null | CP-7 | null | null | null | null | null | null | null | CP-7 | null | CP-7 | CP-7 | null | CP-7 | null | CP-7 | CP-7 | null | null | null | null | null | null | 164.310(a)(2)(i) | null | null | null | 2.B.7
2.B.7.1
2.B.7.2
2.B.7.3 | null | null | 8-603 | null | null | null | null | null | null | null | CP-7 | CP-7 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | CP-7 | null | null | null | null | Art 12.5
Art 12.5(a)
Art 12.5(b)
Art 12.5(c) | null | null | null | null | null | null | null | null | null | null | null | null | 10.5 | PSS-12 | null | null | null | 11.7
25.7
25.10 | null | null | null | null | null | null | null | null | null | null | null | 3-1-1-1 | null | null | null | null | null | null | null | null | 8.1.8 [MP.IF.8]
8.3.4 [MP.EQ.4]
8.8.4 [MP.S.4] | null | null | null | null | B5.b | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 17.2.1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | null | null | x | R-AM-1
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-GV-1
R-IR-4 | null | null | null | null | R-AM-1 | null | R-AM-3 | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | null | R-GV-1 | null | null | null | null | null | null | null | null | null | null | R-IR-4 | null | null | NT-1
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | NT-1 | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | NT-9 | NT-10 | NT-11 | NT-12 | NT-13 | NT-14 | MT-1 | MT-2 | MT-3 | MT-4 | MT-5 | MT-6 | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Business Continuity & Disaster Recovery | Separation from Primary Site | BCD-09.1 | Mechanisms exist to separate the alternate processing site from the primary processing site to reduce susceptibility to similar threats. | - SunGard
- AWS
- Azure | null | Does the organization separate the alternate processing site from the primary processing site to reduce susceptibility to similar threats? | 7 | Protect | null | X | null | There is no evidence of a capability to separate the alternate processing site from the primary processing site to reduce susceptibility to similar threats. | SP-CMM1 is N/A, since a structured process is required to separate the alternate processing site from the primary processing site to reduce susceptibility to similar threats. | Business Continuity & Disaster Recovery (BCD) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Business Continuity / Disaster Recovery (BC/DR) management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for BC/DR management.
• BC/DR roles are formally assigned as an additional duty to existing IT/cybersecurity personnel.
• Recovery Time Objectives (RTOs) identify business-critical systems and services, which are given priority of service in alternate processing and storage sites.
• IT personnel develop Disaster Recovery Plans (DRP) to recover business-critical systems and services.
• Data/process owners conduct a Business Impact Analysis (BIA) at least annually, or after any major technology or process change, to identify assets critical to the business in need of protection, as well as single points of failure.
• IT/cybersecurity personnel work with business stakeholders to develop Business Continuity Plans (BCPs) to ensure business functions are sustainable both during and after an incident within Recovery Time Objectives (RTOs).
• IT personnel use a backup methodology (e.g., grandfather, father & s on rotation) to store backups in a secondary location, separate from the primary storage site.
• IT personnel configure business-critical systems to transfer backup data to the alternate storage site at a rate that is capable of meeting Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs).
• organization acquires space to serve as the alternate site that is in a different geographic zone from the inaccessible facility (e.g., dedicated facility or cloud instance). | Business Continuity & Disaster Recovery (BCD) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A formal Business Continuity & Disaster Recovery (BC/DR) program exists with defined roles and responsibilities to restore functionality in the event of a catastrophe, emergency, or significant disruptive incident that is handled in accordance with the Continuity of Operations Plan (COOP).
• BC/DR personnel work with business stakeholders to identify business-critical systems, services, internal teams and third-party service providers.
• Application/system/process owners conduct a Business Impact Analysis (BIA) at least annually, or after any major technology or process change, to identify assets critical to the business in need of protection, as well as single points of failure.
• Recovery Time Objectives (RTOs) are defined.
• Recovery Point Objectives (RPOs) are defined.
• Controls are assigned to sensitive/regulated assets to comply with specific BC/DR requirements to facilitate recovery operations in accordance with RTOs and RPOs.
• IT personnel work with business stakeholders to develop Disaster Recovery Plans (DRP) to recover business-critical systems and services within RPOs.
• Business stakeholders work with IT personnel to develop Business Continuity Plans (BCPs) to ensure business functions are sustainable both during and after an incident within RTOs.
• The data backup function is formally assigned with defined roles and responsibilities.
• organization acquires space to serve as the alternate site that is in a different geographic zone from the inaccessible facility (e.g., dedicated facility or cloud instance). | See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to separate the alternate processing site from the primary processing site to reduce susceptibility to similar threats. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to separate the alternate processing site from the primary processing site to reduce susceptibility to similar threats. | A1.2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | CP-7(1) | null | CP-7(1) | CP-7(1) | CP-7(1) | null | null | CP-7(1) | CP-7(1) | null | null | null | CP-7(1) | CP-7(1) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | K.8.2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | CP-7(1) | null | null | null | null | null | null | null | CP-7(1) | null | CP-7(1) | CP-7(1) | null | CP-7(1) | null | CP-7(1) | CP-7(1) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | CP-7(1) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | CP-7(1) | null | null | null | null | Art 12.5(a) | null | null | null | null | null | null | null | null | null | null | null | null | null | OPS-09 | null | null | null | 25.11 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | B5.b | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | R-AM-3
R-BC-1
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-GV-1 | null | null | null | null | null | null | R-AM-3 | R-BC-1 | null | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | null | R-GV-1 | null | null | null | null | null | null | null | null | null | null | null | null | null | NT-7
MT-1
MT-2
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | null | null | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Business Continuity & Disaster Recovery | Accessibility | BCD-09.2 | Mechanisms exist to identify and mitigate potential accessibility problems to the alternate processing site and possible mitigation actions, in the event of an area-wide disruption or disaster. | - Business Continuity Plan (BCP)
- Continuity of Operations Plan (COOP) | null | Does the organization identify and mitigate potential accessibility problems to the alternate processing site and possible mitigation actions, in the event of an area-wide disruption or disaster? | 5 | Recover | null | X | null | There is no evidence of a capability to identify and mitigate potential accessibility problems to the alternate processing site and possible mitigation actions, in the event of an area-wide disruption or disaster. | SP-CMM1 is N/A, since a structured process is required to identify and mitigate potential accessibility problems to the alternate processing site and possible mitigation actions, in the event of an area-wide disruption or disaster. | Business Continuity & Disaster Recovery (BCD) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Business Continuity / Disaster Recovery (BC/DR) management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for BC/DR management.
• BC/DR roles are formally assigned as an additional duty to existing IT/cybersecurity personnel.
• Recovery Time Objectives (RTOs) identify business-critical systems and services, which are given priority of service in alternate processing and storage sites.
• IT personnel develop Disaster Recovery Plans (DRP) to recover business-critical systems and services.
• Data/process owners conduct a Business Impact Analysis (BIA) at least annually, or after any major technology or process change, to identify assets critical to the business in need of protection, as well as single points of failure.
• IT/cybersecurity personnel work with business stakeholders to develop Business Continuity Plans (BCPs) to ensure business functions are sustainable both during and after an incident within Recovery Time Objectives (RTOs).
• IT personnel use a backup methodology (e.g., grandfather, father & s on rotation) to store backups in a secondary location, separate from the primary storage site.
• IT personnel configure business-critical systems to transfer backup data to the alternate storage site at a rate that is capable of meeting Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs). | Business Continuity & Disaster Recovery (BCD) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A formal Business Continuity & Disaster Recovery (BC/DR) program exists with defined roles and responsibilities to restore functionality in the event of a catastrophe, emergency, or significant disruptive incident that is handled in accordance with the Continuity of Operations Plan (COOP).
• BC/DR personnel work with business stakeholders to identify business-critical systems, services, internal teams and third-party service providers.
• Application/system/process owners conduct a Business Impact Analysis (BIA) at least annually, or after any major technology or process change, to identify assets critical to the business in need of protection, as well as single points of failure.
• Recovery Time Objectives (RTOs) are defined.
• Recovery Point Objectives (RPOs) are defined.
• Controls are assigned to sensitive/regulated assets to comply with specific BC/DR requirements to facilitate recovery operations in accordance with RTOs and RPOs.
• IT personnel work with business stakeholders to develop Disaster Recovery Plans (DRP) to recover business-critical systems and services within RPOs.
• Business stakeholders work with IT personnel to develop Business Continuity Plans (BCPs) to ensure business functions are sustainable both during and after an incident within RTOs.
• The data backup function is formally assigned with defined roles and responsibilities. | See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to identify and mitigate potential accessibility problems to the alternate processing site and possible mitigation actions, in the event of an area-wide disruption or disaster. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to identify and mitigate potential accessibility problems to the alternate processing site and possible mitigation actions, in the event of an area-wide disruption or disaster. | A1.2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | CP-7(2) | null | CP-7(2) | CP-7(2) | CP-7(2) | null | null | CP-7(2) | CP-7(2) | null | null | null | CP-7(2) | CP-7(2) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | K.14.2.1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | CP-7(2) | null | null | null | null | null | null | null | CP-7(2) | null | CP-7(2) | CP-7(2) | null | CP-7(2) | null | CP-7(2) | CP-7(2) | null | null | null | null | null | null | 164.310(a)(2)(i) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | CP-7(2) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | CP-7(2) | null | null | null | null | Art 12.5(c) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 25.13 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | R-AC-4
R-AM-3
R-BC-1
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-GV-1 | null | null | null | R-AC-4 | null | null | R-AM-3 | R-BC-1 | null | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | null | R-GV-1 | null | null | null | null | null | null | null | null | null | null | null | null | null | NT-1
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | NT-1 | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | NT-9 | NT-10 | NT-11 | NT-12 | NT-13 | NT-14 | MT-1 | MT-2 | MT-3 | MT-4 | MT-5 | MT-6 | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Business Continuity & Disaster Recovery | Alternate Site Priority of Service | BCD-09.3 | Mechanisms exist to address priority-of-service provisions in alternate processing and storage sites that support availability requirements, including Recovery Time Objectives (RTOs). | - Hot / warm / cold site contracts | E-TPM-04 | Does the organization address priority-of-service provisions in alternate processing and storage sites that support availability requirements, including Recovery Time Objectives (RTOs)? | 6 | Recover | null | X | null | There is no evidence of a capability to address priority-of-service provisions in alternate processing and storage sites that support availability requirements, including Recovery Time Objectives (RTOs). | SP-CMM1 is N/A, since a structured process is required to address priority-of-service provisions in alternate processing and storage sites that support availability requirements, including Recovery Time Objectives (RTOs). | Business Continuity & Disaster Recovery (BCD) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Business Continuity / Disaster Recovery (BC/DR) management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for BC/DR management.
• BC/DR roles are formally assigned as an additional duty to existing IT/cybersecurity personnel.
• Recovery Time Objectives (RTOs) identify business-critical systems and services, which are given priority of service in alternate processing and storage sites.
• IT personnel develop Disaster Recovery Plans (DRP) to recover business-critical systems and services.
• Data/process owners conduct a Business Impact Analysis (BIA) at least annually, or after any major technology or process change, to identify assets critical to the business in need of protection, as well as single points of failure.
• IT/cybersecurity personnel work with business stakeholders to develop Business Continuity Plans (BCPs) to ensure business functions are sustainable both during and after an incident within Recovery Time Objectives (RTOs).
• IT personnel use a backup methodology (e.g., grandfather, father & s on rotation) to store backups in a secondary location, separate from the primary storage site.
• IT personnel configure business-critical systems to transfer backup data to the alternate storage site at a rate that is capable of meeting Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs). | Business Continuity & Disaster Recovery (BCD) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A formal Business Continuity & Disaster Recovery (BC/DR) program exists with defined roles and responsibilities to restore functionality in the event of a catastrophe, emergency, or significant disruptive incident that is handled in accordance with the Continuity of Operations Plan (COOP).
• BC/DR personnel work with business stakeholders to identify business-critical systems, services, internal teams and third-party service providers.
• Application/system/process owners conduct a Business Impact Analysis (BIA) at least annually, or after any major technology or process change, to identify assets critical to the business in need of protection, as well as single points of failure.
• Recovery Time Objectives (RTOs) are defined.
• Recovery Point Objectives (RPOs) are defined.
• Controls are assigned to sensitive/regulated assets to comply with specific BC/DR requirements to facilitate recovery operations in accordance with RTOs and RPOs.
• IT personnel work with business stakeholders to develop Disaster Recovery Plans (DRP) to recover business-critical systems and services within RPOs.
• Business stakeholders work with IT personnel to develop Business Continuity Plans (BCPs) to ensure business functions are sustainable both during and after an incident within RTOs.
• The data backup function is formally assigned with defined roles and responsibilities. | See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to address priority-of-service provisions in alternate processing and storage sites that support availability requirements, including Recovery Time Objectives (RTOs). | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to address priority-of-service provisions in alternate processing and storage sites that support availability requirements, including Recovery Time Objectives (RTOs). | A1.2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | CP-7(3) | null | CP-7(3) | CP-7(3) | CP-7(3) | null | null | CP-7(3) | CP-7(3) | null | null | null | CP-7(3) | CP-7(3) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | K.1.49 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | CP-7(3) | null | null | null | null | null | null | null | CP-7(3) | null | CP-7(3) | CP-7(3) | null | CP-7(3) | null | CP-7(3) | CP-7(3) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | CP-7(3) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | CP-7(3) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 25.12
21.14 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | R-AM-3
R-BC-1
R-BC-3
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-GV-1 | null | null | null | null | null | null | R-AM-3 | R-BC-1 | null | R-BC-3 | null | null | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | null | null | null | R-GV-1 | null | null | null | null | null | null | null | null | null | null | null | null | null | NT-1
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | NT-1 | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | NT-9 | NT-10 | NT-11 | NT-12 | NT-13 | NT-14 | MT-1 | MT-2 | MT-3 | MT-4 | MT-5 | MT-6 | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Business Continuity & Disaster Recovery | Preparation for Use | BCD-09.4 | Mechanisms exist to prepare the alternate processing alternate to support essential missions and business functions so that the alternate site is capable of being used as the primary site. | null | null | Does the organization prepare the alternate processing alternate to support essential missions and business functions so that the alternate site is capable of being used as the primary site? | 5 | Protect | null | X | null | There is no evidence of a capability to prepare the alternate processing alternate to support essential missions and business functions so that the alternate site is capable of being used as the primary site. | SP-CMM1 is N/A, since a structured process is required to prepare the alternate processing alternate to support essential missions and business functions so that the alternate site is capable of being used as the primary site. | Business Continuity & Disaster Recovery (BCD) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Business Continuity / Disaster Recovery (BC/DR) management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for BC/DR management.
• BC/DR roles are formally assigned as an additional duty to existing IT/cybersecurity personnel.
• Recovery Time Objectives (RTOs) identify business-critical systems and services, which are given priority of service in alternate processing and storage sites.
• IT personnel develop Disaster Recovery Plans (DRP) to recover business-critical systems and services.
• Data/process owners conduct a Business Impact Analysis (BIA) at least annually, or after any major technology or process change, to identify assets critical to the business in need of protection, as well as single points of failure.
• IT/cybersecurity personnel work with business stakeholders to develop Business Continuity Plans (BCPs) to ensure business functions are sustainable both during and after an incident within Recovery Time Objectives (RTOs).
• IT personnel use a backup methodology (e.g., grandfather, father & s on rotation) to store backups in a secondary location, separate from the primary storage site.
• IT personnel configure business-critical systems to transfer backup data to the alternate storage site at a rate that is capable of meeting Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs). | Business Continuity & Disaster Recovery (BCD) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A formal Business Continuity & Disaster Recovery (BC/DR) program exists with defined roles and responsibilities to restore functionality in the event of a catastrophe, emergency, or significant disruptive incident that is handled in accordance with the Continuity of Operations Plan (COOP).
• BC/DR personnel work with business stakeholders to identify business-critical systems, services, internal teams and third-party service providers.
• Application/system/process owners conduct a Business Impact Analysis (BIA) at least annually, or after any major technology or process change, to identify assets critical to the business in need of protection, as well as single points of failure.
• Recovery Time Objectives (RTOs) are defined.
• Recovery Point Objectives (RPOs) are defined.
• Controls are assigned to sensitive/regulated assets to comply with specific BC/DR requirements to facilitate recovery operations in accordance with RTOs and RPOs.
• IT personnel work with business stakeholders to develop Disaster Recovery Plans (DRP) to recover business-critical systems and services within RPOs.
• Business stakeholders work with IT personnel to develop Business Continuity Plans (BCPs) to ensure business functions are sustainable both during and after an incident within RTOs.
• The data backup function is formally assigned with defined roles and responsibilities. | See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to prepare the alternate processing alternate to support essential missions and business functions so that the alternate site is capable of being used as the primary site. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to prepare the alternate processing alternate to support essential missions and business functions so that the alternate site is capable of being used as the primary site. | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | CP-7(4) | null | null | CP-7(4) | CP-7(4) | null | null | null | CP-7(4) | null | null | null | null | CP-7(4) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | K.9.6 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | CP-7(4) | null | null | CP-7(4) | null | CP-7(4) | null | null | CP-7(4) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | R-AM-3
R-BC-1
R-BC-3
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-GV-1 | null | null | null | null | null | null | R-AM-3 | R-BC-1 | null | R-BC-3 | null | null | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | null | null | null | R-GV-1 | null | null | null | null | null | null | null | null | null | null | null | null | null | NT-1
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | NT-1 | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | NT-9 | NT-10 | NT-11 | NT-12 | NT-13 | NT-14 | MT-1 | MT-2 | MT-3 | MT-4 | MT-5 | MT-6 | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Business Continuity & Disaster Recovery | Inability to Return to Primary Site | BCD-09.5 | Mechanisms exist to plan and prepare for both natural and manmade circumstances that preclude returning to the primary processing site. | null | null | Does the organization plan and prepare for both natural and manmade circumstances that preclude returning to the primary processing site? | 5 | Protect | X | X | null | There is no evidence of a capability to plan and prepare for both natural and manmade circumstances that preclude returning to the primary processing site. | Business Continuity & Disaster Recovery (BCD) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• IT personnel work with business stakeholders to identify business-critical systems and services, including internal teams and third-party service providers.
• IT personnel develop limited Disaster Recovery Plans (DRP) to recover business-critical systems and services.
• Business stakeholders develop limited Business Continuity Plans (BCPs) to ensure business-critical functions are sustainable both during and after an incident within Recovery Time Objectives (RTOs).
• Backups are performed ad-hoc and focus on business-critical systems.
• Limited technologies exist to support near real-time network infrastructure failover (e.g., redundant ISPs, redundant power, etc.). | Business Continuity & Disaster Recovery (BCD) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Business Continuity / Disaster Recovery (BC/DR) management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for BC/DR management.
• BC/DR roles are formally assigned as an additional duty to existing IT/cybersecurity personnel.
• Recovery Time Objectives (RTOs) identify business-critical systems and services, which are given priority of service in alternate processing and storage sites.
• IT personnel develop Disaster Recovery Plans (DRP) to recover business-critical systems and services.
• Data/process owners conduct a Business Impact Analysis (BIA) at least annually, or after any major technology or process change, to identify assets critical to the business in need of protection, as well as single points of failure.
• IT/cybersecurity personnel work with business stakeholders to develop Business Continuity Plans (BCPs) to ensure business functions are sustainable both during and after an incident within Recovery Time Objectives (RTOs).
• IT personnel use a backup methodology (e.g., grandfather, father & s on rotation) to store backups in a secondary location, separate from the primary storage site.
• IT personnel configure business-critical systems to transfer backup data to the alternate storage site at a rate that is capable of meeting Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs).
• BC/DR personnel and business stakeholders designate alternative decision-makers if primary decision-makers are unavailable. | Business Continuity & Disaster Recovery (BCD) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A formal Business Continuity & Disaster Recovery (BC/DR) program exists with defined roles and responsibilities to restore functionality in the event of a catastrophe, emergency, or significant disruptive incident that is handled in accordance with the Continuity of Operations Plan (COOP).
• BC/DR personnel work with business stakeholders to identify business-critical systems, services, internal teams and third-party service providers.
• Application/system/process owners conduct a Business Impact Analysis (BIA) at least annually, or after any major technology or process change, to identify assets critical to the business in need of protection, as well as single points of failure.
• Recovery Time Objectives (RTOs) are defined.
• Recovery Point Objectives (RPOs) are defined.
• Controls are assigned to sensitive/regulated assets to comply with specific BC/DR requirements to facilitate recovery operations in accordance with RTOs and RPOs.
• IT personnel work with business stakeholders to develop Disaster Recovery Plans (DRP) to recover business-critical systems and services within RPOs.
• Business stakeholders work with IT personnel to develop Business Continuity Plans (BCPs) to ensure business functions are sustainable both during and after an incident within RTOs.
• The data backup function is formally assigned with defined roles and responsibilities.
• Human Resources (HR), Legal and Procurement departments implement and manage a formal process that enables business-critical personnel to be both redeployed to other roles during a disruptive event, but also appropriately supports the employee(s) throughout the role transition and back into the their original role when the disruptive event is over.
• BC/DR function formally assigns business-critical roles that require redundancies and/ or cross training.
• BC/DR personnel and business stakeholders designate alternative decision-makers if primary decision-makers are unavailable. | See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to plan and prepare for both natural and manmade circumstances that preclude returning to the primary processing site. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to plan and prepare for both natural and manmade circumstances that preclude returning to the primary processing site. | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | CP-7(6) | null | null | null | CP-7(6) | null | null | null | null | CP-7(6) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | K.1.17 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | R-AM-3
R-BC-1
R-BC-3
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-GV-1 | null | null | null | null | null | null | R-AM-3 | R-BC-1 | null | R-BC-3 | null | null | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | null | null | null | R-GV-1 | null | null | null | null | null | null | null | null | null | null | null | null | null | NT-1
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | NT-1 | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | NT-9 | NT-10 | NT-11 | NT-12 | NT-13 | NT-14 | MT-1 | MT-2 | MT-3 | MT-4 | MT-5 | MT-6 | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Business Continuity & Disaster Recovery | Telecommunications Services Availability | BCD-10 | Mechanisms exist to reduce the likelihood of a single point of failure with primary telecommunications services. | - Alternate telecommunications services are maintained with multiple ISP / network providers | null | Does the organization reduce the likelihood of a single point of failure with primary telecommunications services? | 6 | Recover | null | X | X | There is no evidence of a capability to reduce the likelihood of a single point of failure with primary telecommunications services. | SP-CMM1 is N/A, since a structured process is required to reduce the likelihood of a single point of failure with primary telecommunications services. | Business Continuity & Disaster Recovery (BCD) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Business Continuity / Disaster Recovery (BC/DR) management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for BC/DR management.
• BC/DR roles are formally assigned as an additional duty to existing IT/cybersecurity personnel.
• Recovery Time Objectives (RTOs) identify business-critical systems and services, which are given priority of service in alternate processing and storage sites.
• IT personnel develop Disaster Recovery Plans (DRP) to recover business-critical systems and services.
• Data/process owners conduct a Business Impact Analysis (BIA) at least annually, or after any major technology or process change, to identify assets critical to the business in need of protection, as well as single points of failure.
• IT/cybersecurity personnel work with business stakeholders to develop Business Continuity Plans (BCPs) to ensure business functions are sustainable both during and after an incident within Recovery Time Objectives (RTOs).
• IT personnel use a backup methodology (e.g., grandfather, father & s on rotation) to store backups in a secondary location, separate from the primary storage site.
• IT personnel configure business-critical systems to transfer backup data to the alternate storage site at a rate that is capable of meeting Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs). | Business Continuity & Disaster Recovery (BCD) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A formal Business Continuity & Disaster Recovery (BC/DR) program exists with defined roles and responsibilities to restore functionality in the event of a catastrophe, emergency, or significant disruptive incident that is handled in accordance with the Continuity of Operations Plan (COOP).
• BC/DR personnel work with business stakeholders to identify business-critical systems, services, internal teams and third-party service providers.
• Application/system/process owners conduct a Business Impact Analysis (BIA) at least annually, or after any major technology or process change, to identify assets critical to the business in need of protection, as well as single points of failure.
• Recovery Time Objectives (RTOs) are defined.
• Recovery Point Objectives (RPOs) are defined.
• Controls are assigned to sensitive/regulated assets to comply with specific BC/DR requirements to facilitate recovery operations in accordance with RTOs and RPOs.
• IT personnel work with business stakeholders to develop Disaster Recovery Plans (DRP) to recover business-critical systems and services within RPOs.
• Business stakeholders work with IT personnel to develop Business Continuity Plans (BCPs) to ensure business functions are sustainable both during and after an incident within RTOs.
• The data backup function is formally assigned with defined roles and responsibilities.
• Data centers contractually-require telecommunications service providers to have contingency plans that meet organizational contingency requirements. | See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to reduce the likelihood of a single point of failure with primary telecommunications services. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to reduce the likelihood of a single point of failure with primary telecommunications services. | A1.2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | CP-8
CP-8(2)
CP-11 | null | CP-8
CP-8(2) | CP-8
CP-8(2) | CP-8
CP-8(2)
CP-11 | null | null | CP-8
CP-8(2) | CP-8
CP-8(2) | CP-11 | null | null | CP-8
CP-8(2) | CP-8
CP-8(2) | null | CP-8
CP-11 | null | null | null | CP-8
CP-11 | CP-8
CP-11 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | K.3.2 | null | null | null | null | null | null | EC:SG4.SP4 | null | null | null | null | null | null | null | null | CP-8
CP-8(2) | null | null | null | null | null | null | null | CP-8
CP-8(2) | null | CP-8
CP-8(2) | CP-8
CP-8(2) | null | CP-8
CP-8(2) | null | CP-8
CP-8(2) | CP-8
CP-8(2) | null | null | null | null | null | null | null | null | null | null | null | null | null | 8-601
8-603
8-615 | null | null | null | null | null | null | null | CP-8 | CP-8
CP-8(2) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | CP-11 | null | CP-8
CP-8(2) | null | null | null | 3.7.5(91) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 21.14
25.16 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | B5.b | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | R-AM-3
R-BC-1
R-BC-3
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-GV-1 | null | null | null | null | null | null | R-AM-3 | R-BC-1 | null | R-BC-3 | null | null | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | null | null | null | R-GV-1 | null | null | null | null | null | null | null | null | null | null | null | null | null | NT-1
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | NT-1 | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | NT-9 | NT-10 | NT-11 | NT-12 | NT-13 | NT-14 | MT-1 | MT-2 | MT-3 | MT-4 | MT-5 | MT-6 | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Business Continuity & Disaster Recovery | Telecommunications Priority of Service Provisions | BCD-10.1 | Mechanisms exist to formalize primary and alternate telecommunications service agreements contain priority-of-service provisions that support availability requirements, including Recovery Time Objectives (RTOs). | - Hot / warm / cold site contracts | E-TPM-04 | Does the organization formalize primary and alternate telecommunications service agreements contain priority-of-service provisions that support availability requirements, including Recovery Time Objectives (RTOs)? | 6 | Recover | null | X | null | There is no evidence of a capability to formalize primary and alternate telecommunications service agreements contain priority-of-service provisions that support availability requirements, including Recovery Time Objectives (RTOs). | SP-CMM1 is N/A, since a structured process is required to formalize primary and alternate telecommunications service agreements contain priority-of-service provisions that support availability requirements, including Recovery Time Objectives (RTOs). | Business Continuity & Disaster Recovery (BCD) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Business Continuity / Disaster Recovery (BC/DR) management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for BC/DR management.
• BC/DR roles are formally assigned as an additional duty to existing IT/cybersecurity personnel.
• Recovery Time Objectives (RTOs) identify business-critical systems and services, which are given priority of service in alternate processing and storage sites.
• IT personnel develop Disaster Recovery Plans (DRP) to recover business-critical systems and services.
• Data/process owners conduct a Business Impact Analysis (BIA) at least annually, or after any major technology or process change, to identify assets critical to the business in need of protection, as well as single points of failure.
• IT/cybersecurity personnel work with business stakeholders to develop Business Continuity Plans (BCPs) to ensure business functions are sustainable both during and after an incident within Recovery Time Objectives (RTOs).
• IT personnel use a backup methodology (e.g., grandfather, father & s on rotation) to store backups in a secondary location, separate from the primary storage site.
• IT personnel configure business-critical systems to transfer backup data to the alternate storage site at a rate that is capable of meeting Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs). | Business Continuity & Disaster Recovery (BCD) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A formal Business Continuity & Disaster Recovery (BC/DR) program exists with defined roles and responsibilities to restore functionality in the event of a catastrophe, emergency, or significant disruptive incident that is handled in accordance with the Continuity of Operations Plan (COOP).
• BC/DR personnel work with business stakeholders to identify business-critical systems, services, internal teams and third-party service providers.
• Application/system/process owners conduct a Business Impact Analysis (BIA) at least annually, or after any major technology or process change, to identify assets critical to the business in need of protection, as well as single points of failure.
• Recovery Time Objectives (RTOs) are defined.
• Recovery Point Objectives (RPOs) are defined.
• Controls are assigned to sensitive/regulated assets to comply with specific BC/DR requirements to facilitate recovery operations in accordance with RTOs and RPOs.
• IT personnel work with business stakeholders to develop Disaster Recovery Plans (DRP) to recover business-critical systems and services within RPOs.
• Business stakeholders work with IT personnel to develop Business Continuity Plans (BCPs) to ensure business functions are sustainable both during and after an incident within RTOs.
• The data backup function is formally assigned with defined roles and responsibilities.
• Data centers contractually-require telecommunications service providers to have contingency plans that meet organizational contingency requirements. | See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to formalize primary and alternate telecommunications service agreements contain priority-of-service provisions that support availability requirements, including Recovery Time Objectives (RTOs). | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to formalize primary and alternate telecommunications service agreements contain priority-of-service provisions that support availability requirements, including Recovery Time Objectives (RTOs). | A1.2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | CP-8(1) | null | CP-8(1) | CP-8(1) | CP-8(1) | null | null | CP-8(1) | CP-8(1) | null | null | null | CP-8(1) | CP-8(1) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | K.1.54 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | CP-8(1) | null | null | null | null | null | null | null | CP-8(1) | null | CP-8(1) | CP-8(1) | null | CP-8(1) | null | CP-8(1) | CP-8(1) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | CP-8(1) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | CP-8(1) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 21.14
25.17 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | R-AM-3
R-BC-1
R-BC-3
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-GV-1 | null | null | null | null | null | null | R-AM-3 | R-BC-1 | null | R-BC-3 | null | null | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | null | null | null | R-GV-1 | null | null | null | null | null | null | null | null | null | null | null | null | null | NT-7
MT-1
MT-2
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | null | null | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Business Continuity & Disaster Recovery | Separation of Primary / Alternate Providers | BCD-10.2 | Mechanisms exist to obtain alternate telecommunications services from providers that are separated from primary service providers to reduce susceptibility to the same threats. | null | null | Does the organization obtain alternate telecommunications services from providers that are separated from primary service providers to reduce susceptibility to the same threats? | 5 | Protect | null | X | X | There is no evidence of a capability to obtain alternate telecommunications services from providers that are separated from primary service providers to reduce susceptibility to the same threats. | SP-CMM1 is N/A, since a structured process is required to obtain alternate telecommunications services from providers that are separated from primary service providers to reduce susceptibility to the same threats. | Business Continuity & Disaster Recovery (BCD) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Business Continuity / Disaster Recovery (BC/DR) management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for BC/DR management.
• BC/DR roles are formally assigned as an additional duty to existing IT/cybersecurity personnel.
• Recovery Time Objectives (RTOs) identify business-critical systems and services, which are given priority of service in alternate processing and storage sites.
• IT personnel develop Disaster Recovery Plans (DRP) to recover business-critical systems and services.
• Data/process owners conduct a Business Impact Analysis (BIA) at least annually, or after any major technology or process change, to identify assets critical to the business in need of protection, as well as single points of failure.
• IT/cybersecurity personnel work with business stakeholders to develop Business Continuity Plans (BCPs) to ensure business functions are sustainable both during and after an incident within Recovery Time Objectives (RTOs).
• IT personnel use a backup methodology (e.g., grandfather, father & s on rotation) to store backups in a secondary location, separate from the primary storage site.
• IT personnel configure business-critical systems to transfer backup data to the alternate storage site at a rate that is capable of meeting Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs). | Business Continuity & Disaster Recovery (BCD) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A formal Business Continuity & Disaster Recovery (BC/DR) program exists with defined roles and responsibilities to restore functionality in the event of a catastrophe, emergency, or significant disruptive incident that is handled in accordance with the Continuity of Operations Plan (COOP).
• BC/DR personnel work with business stakeholders to identify business-critical systems, services, internal teams and third-party service providers.
• Application/system/process owners conduct a Business Impact Analysis (BIA) at least annually, or after any major technology or process change, to identify assets critical to the business in need of protection, as well as single points of failure.
• Recovery Time Objectives (RTOs) are defined.
• Recovery Point Objectives (RPOs) are defined.
• Controls are assigned to sensitive/regulated assets to comply with specific BC/DR requirements to facilitate recovery operations in accordance with RTOs and RPOs.
• IT personnel work with business stakeholders to develop Disaster Recovery Plans (DRP) to recover business-critical systems and services within RPOs.
• Business stakeholders work with IT personnel to develop Business Continuity Plans (BCPs) to ensure business functions are sustainable both during and after an incident within RTOs.
• The data backup function is formally assigned with defined roles and responsibilities. | See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to obtain alternate telecommunications services from providers that are separated from primary service providers to reduce susceptibility to the same threats. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to obtain alternate telecommunications services from providers that are separated from primary service providers to reduce susceptibility to the same threats. | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | CP-8(3) | null | null | CP-8(3) | CP-8(3) | null | null | null | CP-8(3) | null | null | null | null | CP-8(3) | null | CP-8(3) | null | null | null | CP-8(3) | CP-8(3) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | K.2.6 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | CP-8(3) | null | null | CP-8(3) | null | CP-8(3) | null | null | CP-8(3) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | R-AM-3
R-BC-1
R-BC-3
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-GV-1 | null | null | null | null | null | null | R-AM-3 | R-BC-1 | null | R-BC-3 | null | null | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | null | null | null | R-GV-1 | null | null | null | null | null | null | null | null | null | null | null | null | null | NT-1
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | NT-1 | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | NT-9 | NT-10 | NT-11 | NT-12 | NT-13 | NT-14 | MT-1 | MT-2 | MT-3 | MT-4 | MT-5 | MT-6 | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Business Continuity & Disaster Recovery | Provider Contingency Plan | BCD-10.3 | Mechanisms exist to contractually-require external service providers to have contingency plans that meet organizational contingency requirements. | null | null | Does the organization contractually-require external service providers to have contingency plans that meet organizational contingency requirements? | 5 | Protect | null | X | X | There is no evidence of a capability to contractually-require telecommunications service providers to have contingency plans that meet organizational contingency requirements. | SP-CMM1 is N/A, since a structured process is required to contractually-require telecommunications service providers to have contingency plans that meet organizational contingency requirements. | Business Continuity & Disaster Recovery (BCD) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Business Continuity / Disaster Recovery (BC/DR) management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for BC/DR management.
• BC/DR roles are formally assigned as an additional duty to existing IT/cybersecurity personnel.
• Recovery Time Objectives (RTOs) identify business-critical systems and services, which are given priority of service in alternate processing and storage sites.
• IT personnel develop Disaster Recovery Plans (DRP) to recover business-critical systems and services.
• Data/process owners conduct a Business Impact Analysis (BIA) at least annually, or after any major technology or process change, to identify assets critical to the business in need of protection, as well as single points of failure.
• IT/cybersecurity personnel work with business stakeholders to develop Business Continuity Plans (BCPs) to ensure business functions are sustainable both during and after an incident within Recovery Time Objectives (RTOs).
• IT personnel use a backup methodology (e.g., grandfather, father & s on rotation) to store backups in a secondary location, separate from the primary storage site.
• IT personnel configure business-critical systems to transfer backup data to the alternate storage site at a rate that is capable of meeting Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs). | Business Continuity & Disaster Recovery (BCD) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A formal Business Continuity & Disaster Recovery (BC/DR) program exists with defined roles and responsibilities to restore functionality in the event of a catastrophe, emergency, or significant disruptive incident that is handled in accordance with the Continuity of Operations Plan (COOP).
• BC/DR personnel work with business stakeholders to identify business-critical systems, services, internal teams and third-party service providers.
• Application/system/process owners conduct a Business Impact Analysis (BIA) at least annually, or after any major technology or process change, to identify assets critical to the business in need of protection, as well as single points of failure.
• Recovery Time Objectives (RTOs) are defined.
• Recovery Point Objectives (RPOs) are defined.
• Controls are assigned to sensitive/regulated assets to comply with specific BC/DR requirements to facilitate recovery operations in accordance with RTOs and RPOs.
• IT personnel work with business stakeholders to develop Disaster Recovery Plans (DRP) to recover business-critical systems and services within RPOs.
• Business stakeholders work with IT personnel to develop Business Continuity Plans (BCPs) to ensure business functions are sustainable both during and after an incident within RTOs.
• The data backup function is formally assigned with defined roles and responsibilities.
• Data centers contractually-require telecommunications service providers to have contingency plans that meet organizational contingency requirements. | See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to contractually-require telecommunications service providers to have contingency plans that meet organizational contingency requirements. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to contractually-require telecommunications service providers to have contingency plans that meet organizational contingency requirements. | null | null | null | null | null | null | null | null | null | BCR-03 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | CP-8(4) | null | null | CP-8(4) | CP-8(4) | null | null | null | CP-8(4) | null | null | null | null | CP-8(4) | null | CP-8(4) | null | null | null | CP-8(4) | CP-8(4) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | K.2.3 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | CP-8(4) | null | null | CP-8(4) | null | CP-8(4) | null | null | CP-8(4) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 3.7.3(86) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | R-AM-3
R-BC-1
R-BC-3
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-GV-1 | null | null | null | null | null | null | R-AM-3 | R-BC-1 | null | R-BC-3 | null | null | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | null | null | null | R-GV-1 | null | null | null | null | null | null | null | null | null | null | null | null | null | NT-1
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | NT-1 | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | NT-9 | NT-10 | NT-11 | NT-12 | NT-13 | NT-14 | MT-1 | MT-2 | MT-3 | MT-4 | MT-5 | MT-6 | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | - spelling correction "contingency" |
Business Continuity & Disaster Recovery | Alternate Communications Paths | BCD-10.4 | Mechanisms exist to maintain command and control capabilities via alternate communications channels and designating alternative decision makers if primary decision makers are unavailable. | null | null | Does the organization maintain command and control capabilities via alternate communications channels and designating alternative decision makers if primary decision makers are unavailable? | 5 | Protect | X | X | X | There is no evidence of a capability to maintain command and control capabilities via alternate communications channels and designating alternative decision makers if primary decision makers are unavailable. | SP-CMM1 is N/A, since a structured process is required to maintain command and control capabilities via alternate communications channels and designating alternative decision makers if primary decision makers are unavailable. | Business Continuity & Disaster Recovery (BCD) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Business Continuity / Disaster Recovery (BC/DR) management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for BC/DR management.
• BC/DR roles are formally assigned as an additional duty to existing IT/cybersecurity personnel.
• Recovery Time Objectives (RTOs) identify business-critical systems and services, which are given priority of service in alternate processing and storage sites.
• IT personnel develop Disaster Recovery Plans (DRP) to recover business-critical systems and services.
• Data/process owners conduct a Business Impact Analysis (BIA) at least annually, or after any major technology or process change, to identify assets critical to the business in need of protection, as well as single points of failure.
• IT/cybersecurity personnel work with business stakeholders to develop Business Continuity Plans (BCPs) to ensure business functions are sustainable both during and after an incident within Recovery Time Objectives (RTOs).
• IT personnel use a backup methodology (e.g., grandfather, father & s on rotation) to store backups in a secondary location, separate from the primary storage site.
• IT personnel configure business-critical systems to transfer backup data to the alternate storage site at a rate that is capable of meeting Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs). | Business Continuity & Disaster Recovery (BCD) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A formal Business Continuity & Disaster Recovery (BC/DR) program exists with defined roles and responsibilities to restore functionality in the event of a catastrophe, emergency, or significant disruptive incident that is handled in accordance with the Continuity of Operations Plan (COOP).
• BC/DR personnel work with business stakeholders to identify business-critical systems, services, internal teams and third-party service providers.
• Application/system/process owners conduct a Business Impact Analysis (BIA) at least annually, or after any major technology or process change, to identify assets critical to the business in need of protection, as well as single points of failure.
• Recovery Time Objectives (RTOs) are defined.
• Recovery Point Objectives (RPOs) are defined.
• Controls are assigned to sensitive/regulated assets to comply with specific BC/DR requirements to facilitate recovery operations in accordance with RTOs and RPOs.
• IT personnel work with business stakeholders to develop Disaster Recovery Plans (DRP) to recover business-critical systems and services within RPOs.
• Business stakeholders work with IT personnel to develop Business Continuity Plans (BCPs) to ensure business functions are sustainable both during and after an incident within RTOs.
• The data backup function is formally assigned with defined roles and responsibilities. | See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to maintain command and control capabilities via alternate communications channels and designating alternative decision makers if primary decision makers are unavailable. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to maintain command and control capabilities via alternate communications channels and designating alternative decision makers if primary decision makers are unavailable. | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | SC-47 | null | null | null | null | SC-47 | null | null | null | SC-47 | null | SC-47 | null | null | SC-47 | SC-47 | SC-47 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | K.4 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 3.7.5(91) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | R-AM-3
R-BC-1
R-EX-1
R-GV-1
R-GV-4
R-GV-5
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1 | null | null | null | null | null | null | R-AM-3 | R-BC-1 | null | null | null | null | R-EX-1 | null | null | null | null | null | null | R-GV-1 | null | null | R-GV-4 | R-GV-5 | null | null | null | R-IR-1 | R-IR-2 | R-IR-3 | R-IR-4 | R-SA-1 | null | NT-1
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-8
MT-9
MT-12
MT-13
MT-14
MT-15 | NT-1 | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | NT-9 | NT-10 | NT-11 | NT-12 | NT-13 | NT-14 | null | null | null | null | null | null | null | MT-8 | MT-9 | null | null | MT-12 | MT-13 | MT-14 | MT-15 | null | - Added NIST 800-53 R5 mapping for SC-47 |
Business Continuity & Disaster Recovery | Data Backups | BCD-11 | Mechanisms exist to create recurring backups of data, software and/or system images, as well as verify the integrity of these backups, to ensure the availability of the data to satisfying Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs). | - Backup technologies & procedures
- Offline storage | E-BCM-10
E-BCM-11
E-BCM-12
E-BCM-13 | Does the organization create recurring backups of data, software and/or system images, as well as verify the integrity of these backups, to ensure the availability of the data to satisfying Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs)? | 10 | Protect | X | X | X | There is no evidence of a capability to create recurring backups of data, software and/ or system images, as well as verify the integrity of these backups, to ensure the availability of the data to satisfying Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs). | Business Continuity & Disaster Recovery (BCD) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• IT personnel work with business stakeholders to identify business-critical systems and services, including internal teams and third-party service providers.
• IT personnel develop limited Disaster Recovery Plans (DRP) to recover business-critical systems and services.
• Business stakeholders develop limited Business Continuity Plans (BCPs) to ensure business-critical functions are sustainable both during and after an incident within Recovery Time Objectives (RTOs).
• Backups are performed ad-hoc and focus on business-critical systems.
• Limited technologies exist to support near real-time network infrastructure failover (e.g., redundant ISPs, redundant power, etc.).
• IT personnel use a backup methodology (e.g., grandfather, father & s on rotation) to create backups to support business needs (e.g., Recovery Time Objectives).
• Backups of sensitive/regulated data are cryptographically protected to prevent the unauthorized disclosure and modification of backup information. | Business Continuity & Disaster Recovery (BCD) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Business Continuity / Disaster Recovery (BC/DR) management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for BC/DR management.
• BC/DR roles are formally assigned as an additional duty to existing IT/cybersecurity personnel.
• Recovery Time Objectives (RTOs) identify business-critical systems and services, which are given priority of service in alternate processing and storage sites.
• IT personnel develop Disaster Recovery Plans (DRP) to recover business-critical systems and services.
• Data/process owners conduct a Business Impact Analysis (BIA) at least annually, or after any major technology or process change, to identify assets critical to the business in need of protection, as well as single points of failure.
• IT/cybersecurity personnel work with business stakeholders to develop Business Continuity Plans (BCPs) to ensure business functions are sustainable both during and after an incident within Recovery Time Objectives (RTOs).
• IT personnel use a backup methodology (e.g., grandfather, father & s on rotation) to store backups in a secondary location, separate from the primary storage site.
• IT personnel configure business-critical systems to transfer backup data to the alternate storage site at a rate that is capable of meeting Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs).
• Technologies exist to conduct full, incremental or differential backups (e.g., tape/disk, hybrid cloud or direct-to-cloud).
• IT personnel use technology to re-image, or configure, assets from configuration-controlled and integrity-protected images or scripts (infrastructure as code).
• Backups for sensitive/regulated data are cryptographically protected (encrypted and integrity checked) to prevent the unauthorized disclosure and modification of backup information. | Business Continuity & Disaster Recovery (BCD) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A formal Business Continuity & Disaster Recovery (BC/DR) program exists with defined roles and responsibilities to restore functionality in the event of a catastrophe, emergency, or significant disruptive incident that is handled in accordance with the Continuity of Operations Plan (COOP).
• BC/DR personnel work with business stakeholders to identify business-critical systems, services, internal teams and third-party service providers.
• Application/system/process owners conduct a Business Impact Analysis (BIA) at least annually, or after any major technology or process change, to identify assets critical to the business in need of protection, as well as single points of failure.
• Recovery Time Objectives (RTOs) are defined.
• Recovery Point Objectives (RPOs) are defined.
• Controls are assigned to sensitive/regulated assets to comply with specific BC/DR requirements to facilitate recovery operations in accordance with RTOs and RPOs.
• IT personnel work with business stakeholders to develop Disaster Recovery Plans (DRP) to recover business-critical systems and services within RPOs.
• Business stakeholders work with IT personnel to develop Business Continuity Plans (BCPs) to ensure business functions are sustainable both during and after an incident within RTOs.
• The data backup function is formally assigned with defined roles and responsibilities.
• IT personnel use a backup methodology (e.g., grandfather, father & s on rotation) to store backups in a secondary location, separate from the primary storage site.
• IT personnel configure business-critical systems to transfer backup data to the alternate storage site at a rate that is capable of meeting Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs).
• Technologies exist to conduct full, incremental or differential backups (e.g., tape/disk, hybrid cloud or direct-to-cloud).
• IT personnel use technology to re-image, or configure, assets from configuration-controlled and integrity-protected images or scripts (infrastructure as code).
• Logical and physical access controls restricts access to backups from privileged users to prevent unauthorized restore of sensitive data.
• A random sampling of backups is tested at least semi-annually to verify integrity and recoverability of backed up data.
• Backups for sensitive/regulated data are cryptographically protected (encrypted and integrity checked) to prevent the unauthorized disclosure and modification of backup information. | Business Continuity & Disaster Recovery (BCD) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to create recurring backups of data, software and/ or system images, as well as verify the integrity of these backups, to ensure the availability of the data to satisfying Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs). | CC7.5
A1.2 | A1.2-POF7
A1.2-POF8 | null | 11.2 | 11.2 | 11.2 | 11.2 | APO14.10
DSS04.07 | null | BCR-08 | null | null | null | CR 7.3 (11.5.1) | null | null | null | null | 12.3.1 | 8.13 | 12.3.1 | null | 6.9.3
6.9.3.1 | null | null | null | T1003, T1003.003, T1005, T1025, T1070, T1070.001, T1070.002, T1119, T1485, T1486, T1490, T1491, T1491.001, T1491.002, T1561, T1561.001, T1561.002, T1565, T1565.001, T1565.003 | null | null | null | PR.PO-P3 | null | null | null | CP-9
SC-28(2) | CP-9 | CP-9 | CP-9 | CP-9
SC-28(2) | null | CP-9 | CP-9 | CP-9 | SC-28(2) | null | CP-9 | CP-9 | CP-9 | null | null | null | null | null | null | null | 3.8.9 | 3.8.9 | 3.8.9 | null | 3.14.5e | null | PR.IP-4 | PR.DS-11 | null | null | 9.4.1.1
9.4.1.2 | 9.4.1.1 | 9.4.1.1 | 9.4.1.1 | 9.4.1.1 | 9.4.1.1 | 9.4.1.1 | 9.4.1.1
9.4.1.2 | 9.4.1.1
9.4.1.2 | 9.4.1.1 | K.1 | null | null | null | null | null | RESPONSE-4.B.MIL1
RESPONSE-4.J.MIL2 | KIM:SG6.SP1 | 7.3 | null | null | MP.L2-3.8.9 | MP.L2-3.8.9
TBD - 3.14.5e | null | MP.L2-3.8.9 | MP.L2-3.8.9 | CP-9 | null | null | null | null | null | null | null | CP-9 | CP-9 | CP-9 | CP-9 | CP-9 | CP-9 | CP-9 | CP-9 | CP-9 | CP-9 | null | null | null | null | null | 164.308(a)(7)(ii)(A)
164.310(d)(2)(iv) | null | 4.M.D | 4.M.D | 2.B.5
CP-9 | null | null | 8-603
8-612 | null | 6.10 | null | null | null | null | CP-9 | CP-9 | CP-9 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | CP-9 | CP-9 | CP-9 | null | null | null | 3.5(57) | Art 12.1
Art 12.1(a)
Art 12.1(b)
Art 12.2 | null | null | null | null | null | null | null | null | null | null | null | null | 8.7 | OPS-06 | null | null | null | 25.9 | null | null | null | null | null | null | null | null | null | null | null | 2-8-1-2
2-8-1-3 | TPC-64 | null | 2-9-3 | 2-8
2-8-1
2-8-1-1
2-8-1-2
2-8-1-3
2-8-1-4
2-8-2 | null | null | null | null | 8.7.7 [MP.INFO.7] | null | null | null | null | B5.c | null | null | null | null | Principle 8.1
Principle 8.2
Principle 8.3 | Principle 8.1
Principle 8.2
Principle 8.3 | Principle 8.1
Principle 8.2
Principle 8.3 | null | null | 1547
1548
1511
1810
1811 | null | null | null | null | null | null | null | null | null | null | 12.3.1 | null | null | 6.4.6.C.01 | null | null | null | null | 8.4.1
8.4.2 | null | null | null | null | null | 6.14 | null | null | null | null | null | null | null | null | null | null | null | null | null | x | Lockton | null | x | R-AM-3
R-BC-1
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-GV-1 | null | null | null | null | null | null | R-AM-3 | R-BC-1 | null | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | null | R-GV-1 | null | null | null | null | null | null | null | null | null | null | null | null | null | NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | NT-9 | NT-10 | NT-11 | NT-12 | NT-13 | NT-14 | MT-1 | MT-2 | MT-3 | MT-4 | MT-5 | MT-6 | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Business Continuity & Disaster Recovery | Testing for Reliability & Integrity | BCD-11.1 | Mechanisms exist to routinely test backups that verify the reliability of the backup process, as well as the integrity and availability of the data. | - CimTrak Integrity Suite (https://www.cimcor.com/cimtrak/) | null | Does the organization routinely test backups that verify the reliability of the backup process, as well as the integrity and availability of the data? | 9 | Recover | X | X | X | There is no evidence of a capability to routinely test backups that verify the reliability of the backup process, as well as the integrity and availability of the data. | Business Continuity & Disaster Recovery (BCD) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• IT personnel work with business stakeholders to identify business-critical systems and services, including internal teams and third-party service providers.
• IT personnel develop limited Disaster Recovery Plans (DRP) to recover business-critical systems and services.
• Business stakeholders develop limited Business Continuity Plans (BCPs) to ensure business-critical functions are sustainable both during and after an incident within Recovery Time Objectives (RTOs).
• Backups are performed ad-hoc and focus on business-critical systems.
• Limited technologies exist to support near real-time network infrastructure failover (e.g., redundant ISPs, redundant power, etc.).
• A random sampling of backups is tested at least annually to verify integrity and recoverability of backed up data.
• Backup media for sensitive/regulated data is encrypted and integrity checked. | Business Continuity & Disaster Recovery (BCD) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Business Continuity / Disaster Recovery (BC/DR) management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for BC/DR management.
• BC/DR roles are formally assigned as an additional duty to existing IT/cybersecurity personnel.
• Recovery Time Objectives (RTOs) identify business-critical systems and services, which are given priority of service in alternate processing and storage sites.
• IT personnel develop Disaster Recovery Plans (DRP) to recover business-critical systems and services.
• Data/process owners conduct a Business Impact Analysis (BIA) at least annually, or after any major technology or process change, to identify assets critical to the business in need of protection, as well as single points of failure.
• IT/cybersecurity personnel work with business stakeholders to develop Business Continuity Plans (BCPs) to ensure business functions are sustainable both during and after an incident within Recovery Time Objectives (RTOs).
• IT personnel use a backup methodology (e.g., grandfather, father & s on rotation) to store backups in a secondary location, separate from the primary storage site.
• IT personnel configure business-critical systems to transfer backup data to the alternate storage site at a rate that is capable of meeting Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs).
• IT personnel perform a random sampling of backups is tested at least semi-annually to verify integrity and recoverability of backed up data. | Business Continuity & Disaster Recovery (BCD) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A formal Business Continuity & Disaster Recovery (BC/DR) program exists with defined roles and responsibilities to restore functionality in the event of a catastrophe, emergency, or significant disruptive incident that is handled in accordance with the Continuity of Operations Plan (COOP).
• BC/DR personnel work with business stakeholders to identify business-critical systems, services, internal teams and third-party service providers.
• Application/system/process owners conduct a Business Impact Analysis (BIA) at least annually, or after any major technology or process change, to identify assets critical to the business in need of protection, as well as single points of failure.
• Recovery Time Objectives (RTOs) are defined.
• Recovery Point Objectives (RPOs) are defined.
• Controls are assigned to sensitive/regulated assets to comply with specific BC/DR requirements to facilitate recovery operations in accordance with RTOs and RPOs.
• IT personnel work with business stakeholders to develop Disaster Recovery Plans (DRP) to recover business-critical systems and services within RPOs.
• Business stakeholders work with IT personnel to develop Business Continuity Plans (BCPs) to ensure business functions are sustainable both during and after an incident within RTOs.
• The data backup function is formally assigned with defined roles and responsibilities.
• A random sampling of backups is tested at least semi-annually to verify integrity and recoverability of backed up data. | Business Continuity & Disaster Recovery (BCD) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to routinely test backups that verify the reliability of the backup process, as well as the integrity and availability of the data. | CC7.5
A1.2 | A1.3-POF2 | null | 11.3
11.5 | 11.3 | 11.3
11.5 | 11.3
11.5 | null | null | BCR-06
BCR-08 | null | SO22 | null | CR 7.3 (11.5.3(1)) | null | null | null | null | 12.3.1 | 8.13 | 12.3.1 | null | null | null | null | null | null | null | null | null | PR.DS-P6 | null | null | null | CP-9(1) | null | CP-9(1) | CP-9(1) | CP-9(1) | null | null | CP-9(1) | CP-9(1) | null | null | null | CP-9(1) | CP-9(1) | null | null | null | null | null | null | null | null | null | null | null | null | null | PR.IP-4 | null | null | null | null | null | null | null | null | null | null | null | null | null | K.1.16 | null | null | null | null | null | RESPONSE-4.B.MIL1
RESPONSE-4.J.MIL2 | null | null | null | null | null | null | null | null | null | CP-9(1) | null | null | null | null | null | null | null | CP-9(1) | null | CP-9(1) | CP-9(1) | null | CP-9(1) | null | CP-9(1) | CP-9(1) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | CP-9(1) | CP-9(1) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | CP-9(1) | null | null | null | null | Art 12.2
Art 12.7 | null | null | null | null | null | null | null | null | null | null | null | null | null | OPS-06
OPS-07
OPS-08 | null | null | null | 25.9
25.19 | null | null | null | null | null | null | null | null | null | null | null | 2-8-2 | null | null | 2-9-3-3 | null | null | null | null | null | null | null | null | null | null | B5.c | null | null | null | null | Principle 8.4 | Principle 8.4 | Principle 8.4 | null | null | 1515 | null | null | null | null | null | null | null | null | null | null | 12.3.1 | null | null | null | null | null | null | null | 8.4.3 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | Lockton | null | x | R-AM-3
R-BC-1
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-GV-1 | null | null | null | null | null | null | R-AM-3 | R-BC-1 | null | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | null | R-GV-1 | null | null | null | null | null | null | null | null | null | null | null | null | null | NT-7
MT-1
MT-2
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | null | null | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Business Continuity & Disaster Recovery | Separate Storage for Critical Information | BCD-11.2 | Mechanisms exist to store backup copies of critical software and other security-related information in a separate facility or in a fire-rated container that is not collocated with the system being backed up. | - IronMountain | E-AST-08
E-BCM-11
E-BCM-12
E-BCM-13 | Does the organization store backup copies of critical software and other security-related information in a separate facility or in a fire-rated container that is not collocated with the system being backed up? | 8 | Protect | null | X | X | There is no evidence of a capability to store backup copies of critical software and other security-related information in a separate facility or in a fire-rated container that is not collocated with the system being backed up. | Business Continuity & Disaster Recovery (BCD) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• IT personnel work with business stakeholders to identify business-critical systems and services, including internal teams and third-party service providers.
• IT personnel develop limited Disaster Recovery Plans (DRP) to recover business-critical systems and services.
• Business stakeholders develop limited Business Continuity Plans (BCPs) to ensure business-critical functions are sustainable both during and after an incident within Recovery Time Objectives (RTOs).
• Backups are performed ad-hoc and focus on business-critical systems.
• Limited technologies exist to support near real-time network infrastructure failover (e.g., redundant ISPs, redundant power, etc.).
• Backup copies of software or licenses/product keys are stored locally in a fire-rated container. | Business Continuity & Disaster Recovery (BCD) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Business Continuity / Disaster Recovery (BC/DR) management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for BC/DR management.
• BC/DR roles are formally assigned as an additional duty to existing IT/cybersecurity personnel.
• Recovery Time Objectives (RTOs) identify business-critical systems and services, which are given priority of service in alternate processing and storage sites.
• IT personnel develop Disaster Recovery Plans (DRP) to recover business-critical systems and services.
• Data/process owners conduct a Business Impact Analysis (BIA) at least annually, or after any major technology or process change, to identify assets critical to the business in need of protection, as well as single points of failure.
• IT/cybersecurity personnel work with business stakeholders to develop Business Continuity Plans (BCPs) to ensure business functions are sustainable both during and after an incident within Recovery Time Objectives (RTOs).
• IT personnel use a backup methodology (e.g., grandfather, father & s on rotation) to store backups in a secondary location, separate from the primary storage site.
• IT personnel configure business-critical systems to transfer backup data to the alternate storage site at a rate that is capable of meeting Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs). | Business Continuity & Disaster Recovery (BCD) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A formal Business Continuity & Disaster Recovery (BC/DR) program exists with defined roles and responsibilities to restore functionality in the event of a catastrophe, emergency, or significant disruptive incident that is handled in accordance with the Continuity of Operations Plan (COOP).
• BC/DR personnel work with business stakeholders to identify business-critical systems, services, internal teams and third-party service providers.
• Application/system/process owners conduct a Business Impact Analysis (BIA) at least annually, or after any major technology or process change, to identify assets critical to the business in need of protection, as well as single points of failure.
• Recovery Time Objectives (RTOs) are defined.
• Recovery Point Objectives (RPOs) are defined.
• Controls are assigned to sensitive/regulated assets to comply with specific BC/DR requirements to facilitate recovery operations in accordance with RTOs and RPOs.
• IT personnel work with business stakeholders to develop Disaster Recovery Plans (DRP) to recover business-critical systems and services within RPOs.
• Business stakeholders work with IT personnel to develop Business Continuity Plans (BCPs) to ensure business functions are sustainable both during and after an incident within RTOs.
• The data backup function is formally assigned with defined roles and responsibilities. | See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to store backup copies of critical software and other security-related information in a separate facility or in a fire-rated container that is not collocated with the system being backed up. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to store backup copies of critical software and other security-related information in a separate facility or in a fire-rated container that is not collocated with the system being backed up. | A1.2 | A1.2-POF9 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 12.3.1 | 8.13 | 12.3.1 | null | null | null | null | null | null | null | null | null | null | null | null | null | CP-9(3) | null | null | CP-9(3) | CP-9(3) | null | null | null | CP-9(3) | null | null | null | null | CP-9(3) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 9.4.1.1 | 9.4.1.1 | 9.4.1.1 | 9.4.1.1 | 9.4.1.1 | 9.4.1.1 | 9.4.1.1 | 9.4.1.1 | 9.4.1.1 | 9.4.1.1 | K.4 | null | null | null | null | null | RESPONSE-4.K.MIL2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | CP-9(3) | null | CP-9(3) | CP-9(3) | null | CP-9(3) | null | null | CP-9(3) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | CP-9(3) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | CP-9(3) | null | CP-9(3) | null | null | null | 3.5(58) | Art 12.3 | null | null | null | null | null | null | null | null | null | null | null | null | null | OPS-06
PSS-12 | null | null | null | 25.20 | null | null | null | null | null | null | null | null | null | null | null | null | TPC-38 | null | null | 2-8-1-4 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 1811 | null | null | null | null | null | null | null | null | null | null | 12.3.1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | null | null | x | R-AM-3
R-BC-1
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-GV-1 | null | null | null | null | null | null | R-AM-3 | R-BC-1 | null | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | null | R-GV-1 | null | null | null | null | null | null | null | null | null | null | null | null | null | NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | NT-9 | NT-10 | NT-11 | NT-12 | NT-13 | NT-14 | MT-1 | MT-2 | MT-3 | MT-4 | MT-5 | MT-6 | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Business Continuity & Disaster Recovery | Information System Imaging | BCD-11.3 | Mechanisms exist to reimage assets from configuration-controlled and integrity-protected images that represent a secure, operational state. | - CimTrak Integrity Suite (https://www.cimcor.com/cimtrak/)
- Acronis
- Docker (https://www.docker.com/)
- VMWare | null | Does the organization reimage assets from configuration-controlled and integrity-protected images that represent a secure, operational state? | 8 | Recover | null | null | X | There is no evidence of a capability to reimage assets from configuration-controlled and integrity-protected images that represent a secure, operational state. | Business Continuity & Disaster Recovery (BCD) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• IT personnel work with business stakeholders to identify business-critical systems and services, including internal teams and third-party service providers.
• IT personnel develop limited Disaster Recovery Plans (DRP) to recover business-critical systems and services.
• Business stakeholders develop limited Business Continuity Plans (BCPs) to ensure business-critical functions are sustainable both during and after an incident within Recovery Time Objectives (RTOs).
• Backups are performed ad-hoc and focus on business-critical systems.
• Limited technologies exist to support near real-time network infrastructure failover (e.g., redundant ISPs, redundant power, etc.).
• IT personnel have a limited capability to re-image, or configure, assets from configuration-controlled and integrity-protected images or scripts (infrastructure as code).Limited technologies exist to conduct full, incremental or differential backups (e.g., tape/disk, hybrid cloud or direct-to-cloud). | Business Continuity & Disaster Recovery (BCD) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Business Continuity / Disaster Recovery (BC/DR) management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for BC/DR management.
• BC/DR roles are formally assigned as an additional duty to existing IT/cybersecurity personnel.
• Recovery Time Objectives (RTOs) identify business-critical systems and services, which are given priority of service in alternate processing and storage sites.
• IT personnel develop Disaster Recovery Plans (DRP) to recover business-critical systems and services.
• Data/process owners conduct a Business Impact Analysis (BIA) at least annually, or after any major technology or process change, to identify assets critical to the business in need of protection, as well as single points of failure.
• IT/cybersecurity personnel work with business stakeholders to develop Business Continuity Plans (BCPs) to ensure business functions are sustainable both during and after an incident within Recovery Time Objectives (RTOs).
• IT personnel use a backup methodology (e.g., grandfather, father & s on rotation) to store backups in a secondary location, separate from the primary storage site.
• IT personnel configure business-critical systems to transfer backup data to the alternate storage site at a rate that is capable of meeting Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs).
• IT personnel use technology to re-image, or configure, assets from configuration-controlled and integrity-protected images or scripts (infrastructure as code). | Business Continuity & Disaster Recovery (BCD) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A formal Business Continuity & Disaster Recovery (BC/DR) program exists with defined roles and responsibilities to restore functionality in the event of a catastrophe, emergency, or significant disruptive incident that is handled in accordance with the Continuity of Operations Plan (COOP).
• BC/DR personnel work with business stakeholders to identify business-critical systems, services, internal teams and third-party service providers.
• Application/system/process owners conduct a Business Impact Analysis (BIA) at least annually, or after any major technology or process change, to identify assets critical to the business in need of protection, as well as single points of failure.
• Recovery Time Objectives (RTOs) are defined.
• Recovery Point Objectives (RPOs) are defined.
• Controls are assigned to sensitive/regulated assets to comply with specific BC/DR requirements to facilitate recovery operations in accordance with RTOs and RPOs.
• IT personnel work with business stakeholders to develop Disaster Recovery Plans (DRP) to recover business-critical systems and services within RPOs.
• Business stakeholders work with IT personnel to develop Business Continuity Plans (BCPs) to ensure business functions are sustainable both during and after an incident within RTOs.
• The data backup function is formally assigned with defined roles and responsibilities.
• IT personnel use technology to re-image, or configure, assets from configuration-controlled and integrity-protected images or scripts (infrastructure as code). | Business Continuity & Disaster Recovery (BCD) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to reimage assets from configuration-controlled and integrity-protected images that represent a secure, operational state. | A1.2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | V.1.5 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | OPS-09 | null | null | null | 25.12
25.22 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | null | null | null | R-AM-3
R-BC-1
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-GV-1
R-IR-1
R-IR-4 | null | null | null | null | null | null | R-AM-3 | R-BC-1 | null | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | null | R-GV-1 | null | null | null | null | null | null | null | R-IR-1 | null | null | R-IR-4 | null | null | NT-7
MT-1
MT-2
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | null | null | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Business Continuity & Disaster Recovery | Cryptographic Protection | BCD-11.4 | Cryptographic mechanisms exist to prevent the unauthorized disclosure and/or modification of backup information. | - Backup technologies & procedures | null | Are cryptographic mechanisms utilized to prevent the unauthorized disclosure and/or modification of backup information? | 9 | Protect | null | null | X | There is no evidence of a capability to Cryptographic prevent the unauthorized disclosure and/ or modification of backup information. | Business Continuity & Disaster Recovery (BCD) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• IT personnel work with business stakeholders to identify business-critical systems and services, including internal teams and third-party service providers.
• IT personnel develop limited Disaster Recovery Plans (DRP) to recover business-critical systems and services.
• Business stakeholders develop limited Business Continuity Plans (BCPs) to ensure business-critical functions are sustainable both during and after an incident within Recovery Time Objectives (RTOs).
• Backups are performed ad-hoc and focus on business-critical systems.
• Limited technologies exist to support near real-time network infrastructure failover (e.g., redundant ISPs, redundant power, etc.). | Business Continuity & Disaster Recovery (BCD) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Business Continuity / Disaster Recovery (BC/DR) management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for BC/DR management.
• BC/DR roles are formally assigned as an additional duty to existing IT/cybersecurity personnel.
• Recovery Time Objectives (RTOs) identify business-critical systems and services, which are given priority of service in alternate processing and storage sites.
• IT personnel develop Disaster Recovery Plans (DRP) to recover business-critical systems and services.
• Data/process owners conduct a Business Impact Analysis (BIA) at least annually, or after any major technology or process change, to identify assets critical to the business in need of protection, as well as single points of failure.
• IT/cybersecurity personnel work with business stakeholders to develop Business Continuity Plans (BCPs) to ensure business functions are sustainable both during and after an incident within Recovery Time Objectives (RTOs).
• IT personnel use a backup methodology (e.g., grandfather, father & s on rotation) to store backups in a secondary location, separate from the primary storage site.
• IT personnel configure business-critical systems to transfer backup data to the alternate storage site at a rate that is capable of meeting Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs).
• Backups for sensitive/regulated data are cryptographically protected (encrypted and integrity checked) to prevent the unauthorized disclosure and modification of backup information. | Business Continuity & Disaster Recovery (BCD) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A formal Business Continuity & Disaster Recovery (BC/DR) program exists with defined roles and responsibilities to restore functionality in the event of a catastrophe, emergency, or significant disruptive incident that is handled in accordance with the Continuity of Operations Plan (COOP).
• BC/DR personnel work with business stakeholders to identify business-critical systems, services, internal teams and third-party service providers.
• Application/system/process owners conduct a Business Impact Analysis (BIA) at least annually, or after any major technology or process change, to identify assets critical to the business in need of protection, as well as single points of failure.
• Recovery Time Objectives (RTOs) are defined.
• Recovery Point Objectives (RPOs) are defined.
• Controls are assigned to sensitive/regulated assets to comply with specific BC/DR requirements to facilitate recovery operations in accordance with RTOs and RPOs.
• IT personnel work with business stakeholders to develop Disaster Recovery Plans (DRP) to recover business-critical systems and services within RPOs.
• Business stakeholders work with IT personnel to develop Business Continuity Plans (BCPs) to ensure business functions are sustainable both during and after an incident within RTOs.
• The data backup function is formally assigned with defined roles and responsibilities.
• Backups for sensitive/regulated data are cryptographically protected (encrypted and integrity checked) to prevent the unauthorized disclosure and modification of backup information. | Business Continuity & Disaster Recovery (BCD) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to Cryptographic prevent the unauthorized disclosure and/ or modification of backup information. | A1.2 | null | null | 11.3 | 11.3 | 11.3 | 11.3 | null | null | null | null | null | null | null | null | null | null | null | 12.3.1 | 8.13 | 12.3.1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | CP-9(8)
SC-28(1) | null | null | CP-9(8) | CP-9(8) | null | null | null | CP-9(8) | CP-9(8) | null | null | null | null | null | null | null | 3.8.9 | 3.8.9 | 3.8.9 | A.03.08.09 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | D.1.6 | null | null | null | null | null | null | null | null | null | null | MP.L2-3.8.9 | MP.L2-3.8.9 | null | MP.L2-3.8.9 | MP.L2-3.8.9 | null | null | null | null | null | null | null | null | null | null | null | null | null | CP-9(8) | null | CP-9(8) | CP-9(8) | null | null | null | null | null | null | null | null | null | null | 2.B.5
CP-9(8) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 25.18 | null | null | null | null | null | null | null | null | null | null | null | 2-8-1-3 | TPC-65 | null | null | 2-8-1-4 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Principle 8.3 | Principle 8.3 | Principle 8.3 | null | null | null | null | null | null | null | null | null | null | null | null | null | 12.3.1 | null | null | null | null | null | null | null | 8.4.4 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | null | null | x | R-AC-4
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-7
R-GV-2
R-GV-4
R-GV-5
R-IR-4 | null | null | null | R-AC-4 | null | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | null | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | R-EX-7 | null | R-GV-2 | null | R-GV-4 | R-GV-5 | null | null | null | null | null | null | R-IR-4 | null | null | NT-7
MT-1
MT-2
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | null | null | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Business Continuity & Disaster Recovery | Test Restoration Using Sampling | BCD-11.5 | Mechanisms exist to utilize sampling of available backups to test recovery capabilities as part of business continuity plan testing. | null | null | Does the organization utilize sampling of available backups to test recovery capabilities as part of business continuity plan testing? | 5 | Protect | null | X | null | There is no evidence of a capability to utilize sampling of available backups to test recovery capabilities as part of business continuity plan testing. | Business Continuity & Disaster Recovery (BCD) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• IT personnel work with business stakeholders to identify business-critical systems and services, including internal teams and third-party service providers.
• IT personnel develop limited Disaster Recovery Plans (DRP) to recover business-critical systems and services.
• Business stakeholders develop limited Business Continuity Plans (BCPs) to ensure business-critical functions are sustainable both during and after an incident within Recovery Time Objectives (RTOs).
• Backups are performed ad-hoc and focus on business-critical systems.
• Limited technologies exist to support near real-time network infrastructure failover (e.g., redundant ISPs, redundant power, etc.). | Business Continuity & Disaster Recovery (BCD) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Business Continuity / Disaster Recovery (BC/DR) management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for BC/DR management.
• BC/DR roles are formally assigned as an additional duty to existing IT/cybersecurity personnel.
• Recovery Time Objectives (RTOs) identify business-critical systems and services, which are given priority of service in alternate processing and storage sites.
• IT personnel develop Disaster Recovery Plans (DRP) to recover business-critical systems and services.
• Data/process owners conduct a Business Impact Analysis (BIA) at least annually, or after any major technology or process change, to identify assets critical to the business in need of protection, as well as single points of failure.
• IT/cybersecurity personnel work with business stakeholders to develop Business Continuity Plans (BCPs) to ensure business functions are sustainable both during and after an incident within Recovery Time Objectives (RTOs).
• IT personnel use a backup methodology (e.g., grandfather, father & s on rotation) to store backups in a secondary location, separate from the primary storage site.
• IT personnel configure business-critical systems to transfer backup data to the alternate storage site at a rate that is capable of meeting Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs).
• A random sampling of backups is tested at least semi-annually to verify integrity and recoverability of backed up data. | Business Continuity & Disaster Recovery (BCD) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A formal Business Continuity & Disaster Recovery (BC/DR) program exists with defined roles and responsibilities to restore functionality in the event of a catastrophe, emergency, or significant disruptive incident that is handled in accordance with the Continuity of Operations Plan (COOP).
• BC/DR personnel work with business stakeholders to identify business-critical systems, services, internal teams and third-party service providers.
• Application/system/process owners conduct a Business Impact Analysis (BIA) at least annually, or after any major technology or process change, to identify assets critical to the business in need of protection, as well as single points of failure.
• Recovery Time Objectives (RTOs) are defined.
• Recovery Point Objectives (RPOs) are defined.
• Controls are assigned to sensitive/regulated assets to comply with specific BC/DR requirements to facilitate recovery operations in accordance with RTOs and RPOs.
• IT personnel work with business stakeholders to develop Disaster Recovery Plans (DRP) to recover business-critical systems and services within RPOs.
• Business stakeholders work with IT personnel to develop Business Continuity Plans (BCPs) to ensure business functions are sustainable both during and after an incident within RTOs.
• The data backup function is formally assigned with defined roles and responsibilities.
• A random sampling of backups is tested at least semi-annually to verify integrity and recoverability of backed up data. | Business Continuity & Disaster Recovery (BCD) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to utilize sampling of available backups to test recovery capabilities as part of business continuity plan testing. | null | null | null | null | null | null | null | null | null | BCR-06
BCR-08 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | CP-9(2) | null | null | CP-9(2) | CP-9(2) | null | null | null | CP-9(2) | null | null | null | null | CP-9(2) | null | null | null | null | null | null | null | null | null | null | null | null | null | PR.IP-10 | null | null | null | null | null | null | null | null | null | null | null | null | null | K.1.38 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | CP-9(2) | null | null | CP-9(2) | null | CP-9(2) | null | null | CP-9(2) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Art 12.2
Art 12.7 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 3-1-1-3 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Lockton | null | x | R-AC-4
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-7
R-GV-2
R-GV-4
R-GV-5
R-IR-4 | null | null | null | R-AC-4 | null | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | null | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | R-EX-7 | null | R-GV-2 | null | R-GV-4 | R-GV-5 | null | null | null | null | null | null | R-IR-4 | null | null | NT-7
MT-1
MT-2
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | null | null | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Business Continuity & Disaster Recovery | Transfer to Alternate Storage Site | BCD-11.6 | Mechanisms exist to transfer backup data to the alternate storage site at a rate that is capable of meeting both Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs). | null | null | Does the organization transfer backup data to the alternate storage site at a rate that is capable of meeting both Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs)? | 5 | Protect | null | X | X | There is no evidence of a capability to transfer backup data to the alternate storage site at a rate that is capable of meeting both Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs). | SP-CMM1 is N/A, since a structured process is required to transfer backup data to the alternate storage site at a rate that is capable of meeting both Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs). | Business Continuity & Disaster Recovery (BCD) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Business Continuity / Disaster Recovery (BC/DR) management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for BC/DR management.
• BC/DR roles are formally assigned as an additional duty to existing IT/cybersecurity personnel.
• Recovery Time Objectives (RTOs) identify business-critical systems and services, which are given priority of service in alternate processing and storage sites.
• IT personnel develop Disaster Recovery Plans (DRP) to recover business-critical systems and services.
• Data/process owners conduct a Business Impact Analysis (BIA) at least annually, or after any major technology or process change, to identify assets critical to the business in need of protection, as well as single points of failure.
• IT/cybersecurity personnel work with business stakeholders to develop Business Continuity Plans (BCPs) to ensure business functions are sustainable both during and after an incident within Recovery Time Objectives (RTOs).
• IT personnel use a backup methodology (e.g., grandfather, father & s on rotation) to store backups in a secondary location, separate from the primary storage site.
• IT personnel configure business-critical systems to transfer backup data to the alternate storage site at a rate that is capable of meeting Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs). | Business Continuity & Disaster Recovery (BCD) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A formal Business Continuity & Disaster Recovery (BC/DR) program exists with defined roles and responsibilities to restore functionality in the event of a catastrophe, emergency, or significant disruptive incident that is handled in accordance with the Continuity of Operations Plan (COOP).
• BC/DR personnel work with business stakeholders to identify business-critical systems, services, internal teams and third-party service providers.
• Application/system/process owners conduct a Business Impact Analysis (BIA) at least annually, or after any major technology or process change, to identify assets critical to the business in need of protection, as well as single points of failure.
• Recovery Time Objectives (RTOs) are defined.
• Recovery Point Objectives (RPOs) are defined.
• Controls are assigned to sensitive/regulated assets to comply with specific BC/DR requirements to facilitate recovery operations in accordance with RTOs and RPOs.
• IT personnel work with business stakeholders to develop Disaster Recovery Plans (DRP) to recover business-critical systems and services within RPOs.
• Business stakeholders work with IT personnel to develop Business Continuity Plans (BCPs) to ensure business functions are sustainable both during and after an incident within RTOs.
• The data backup function is formally assigned with defined roles and responsibilities.
• The organization either owns the facility or contracts with a third-party provider for off-site storage. | Business Continuity & Disaster Recovery (BCD) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to transfer backup data to the alternate storage site at a rate that is capable of meeting both Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs). | null | A1.2-POF9 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | CP-9(5) | null | null | CP-9(5) | CP-9(5) | null | null | null | CP-9(5) | null | null | null | null | CP-9(5) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | K.1.54 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | CP-9(5) | null | null | CP-9(5) | null | CP-9(5) | null | null | CP-9(5) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Art 12.3 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 2-8-1-4 | null | null | null | null | null | null | null | null | null | B5.c | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | R-AM-3
R-BC-1
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-GV-1 | null | null | null | null | null | null | R-AM-3 | R-BC-1 | null | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | null | R-GV-1 | null | null | null | null | null | null | null | null | null | null | null | null | null | NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | NT-9 | NT-10 | NT-11 | NT-12 | NT-13 | NT-14 | MT-1 | MT-2 | MT-3 | MT-4 | MT-5 | MT-6 | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Business Continuity & Disaster Recovery | Redundant Secondary System | BCD-11.7 | Mechanisms exist to maintain a failover system, which is not collocated with the primary system, application and/or service, which can be activated with little-to-no loss of information or disruption to operations. | null | null | Does the organization maintain a failover system, which is not collocated with the primary system, application and/or service, which can be activated with little-to-no loss of information or disruption to operations? | 5 | Protect | X | X | X | There is no evidence of a capability to maintain a failover system, which is not collocated with the primary system, application and/ or service, which can be activated with little-to-no loss of information or disruption to operations. | SP-CMM1 is N/A, since a structured process is required to maintain a failover system, which is not collocated with the primary system, application and/ or service, which can be activated with little-to-no loss of information or disruption to operations. | Business Continuity & Disaster Recovery (BCD) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Business Continuity / Disaster Recovery (BC/DR) management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for BC/DR management.
• BC/DR roles are formally assigned as an additional duty to existing IT/cybersecurity personnel.
• Recovery Time Objectives (RTOs) identify business-critical systems and services, which are given priority of service in alternate processing and storage sites.
• IT personnel develop Disaster Recovery Plans (DRP) to recover business-critical systems and services.
• Data/process owners conduct a Business Impact Analysis (BIA) at least annually, or after any major technology or process change, to identify assets critical to the business in need of protection, as well as single points of failure.
• IT/cybersecurity personnel work with business stakeholders to develop Business Continuity Plans (BCPs) to ensure business functions are sustainable both during and after an incident within Recovery Time Objectives (RTOs).
• IT personnel use a backup methodology (e.g., grandfather, father & s on rotation) to store backups in a secondary location, separate from the primary storage site.
• IT personnel configure business-critical systems to transfer backup data to the alternate storage site at a rate that is capable of meeting Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs).
• Technologies exist to support business-critical application and services failover.
• Technologies exist to support network infrastructure failover (e.g., redundant ISPs, redundant power, etc.). | Business Continuity & Disaster Recovery (BCD) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A formal Business Continuity & Disaster Recovery (BC/DR) program exists with defined roles and responsibilities to restore functionality in the event of a catastrophe, emergency, or significant disruptive incident that is handled in accordance with the Continuity of Operations Plan (COOP).
• BC/DR personnel work with business stakeholders to identify business-critical systems, services, internal teams and third-party service providers.
• Application/system/process owners conduct a Business Impact Analysis (BIA) at least annually, or after any major technology or process change, to identify assets critical to the business in need of protection, as well as single points of failure.
• Recovery Time Objectives (RTOs) are defined.
• Recovery Point Objectives (RPOs) are defined.
• Controls are assigned to sensitive/regulated assets to comply with specific BC/DR requirements to facilitate recovery operations in accordance with RTOs and RPOs.
• IT personnel work with business stakeholders to develop Disaster Recovery Plans (DRP) to recover business-critical systems and services within RPOs.
• Business stakeholders work with IT personnel to develop Business Continuity Plans (BCPs) to ensure business functions are sustainable both during and after an incident within RTOs.
• The data backup function is formally assigned with defined roles and responsibilities.
• Technologies exist to support business-critical application and services failover.
• Technologies exist to support network infrastructure failover (e.g., redundant ISPs, redundant power, etc.). | See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to maintain a failover system, which is not collocated with the primary system, application and/ or service, which can be activated with little-to-no loss of information or disruption to operations. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to maintain a failover system, which is not collocated with the primary system, application and/ or service, which can be activated with little-to-no loss of information or disruption to operations. | null | null | null | null | null | null | null | null | null | BCR-03
BCR-11 | null | null | null | null | null | null | null | null | 17.2.1 | 8.14 | 17.2.1 | null | null | null | null | null | null | null | null | null | null | null | null | null | CP-9(6) | null | null | null | CP-9(6) | null | null | null | null | CP-9(6) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | K.1.43 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Art 12.4 | null | null | null | null | null | null | null | null | null | null | null | null | null | PS-02 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 3-1-1-2 | null | null | null | null | null | null | null | null | null | B5.b | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 17.2.1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | R-AM-3
R-BC-1
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-GV-1 | null | null | null | null | null | null | R-AM-3 | R-BC-1 | null | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | null | R-GV-1 | null | null | null | null | null | null | null | null | null | null | null | null | null | NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | NT-9 | NT-10 | NT-11 | NT-12 | NT-13 | NT-14 | MT-1 | MT-2 | MT-3 | MT-4 | MT-5 | MT-6 | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | - wordsmithed control |
Business Continuity & Disaster Recovery | Dual Authorization For Backup Media Destruction | BCD-11.8 | Mechanisms exist to implement and enforce dual authorization for the deletion or destruction of sensitive backup media and data. | null | null | Does the organization implement and enforce dual authorization for the deletion or destruction of sensitive backup media and data? | 5 | Protect | null | X | null | There is no evidence of a capability to implement and enforce dual authorization for the deletion or destruction of sensitive backup media and data. | SP-CMM1 is N/A, since a structured process is required to implement and enforce dual authorization for the deletion or destruction of sensitive backup media and data. | SP-CMM2 is N/A, since a well-defined process is required to implement and enforce dual authorization for the deletion or destruction of sensitive backup media and data. | Business Continuity & Disaster Recovery (BCD) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A formal Business Continuity & Disaster Recovery (BC/DR) program exists with defined roles and responsibilities to restore functionality in the event of a catastrophe, emergency, or significant disruptive incident that is handled in accordance with the Continuity of Operations Plan (COOP).
• BC/DR personnel work with business stakeholders to identify business-critical systems, services, internal teams and third-party service providers.
• Application/system/process owners conduct a Business Impact Analysis (BIA) at least annually, or after any major technology or process change, to identify assets critical to the business in need of protection, as well as single points of failure.
• Recovery Time Objectives (RTOs) are defined.
• Recovery Point Objectives (RPOs) are defined.
• Controls are assigned to sensitive/regulated assets to comply with specific BC/DR requirements to facilitate recovery operations in accordance with RTOs and RPOs.
• IT personnel work with business stakeholders to develop Disaster Recovery Plans (DRP) to recover business-critical systems and services within RPOs.
• Business stakeholders work with IT personnel to develop Business Continuity Plans (BCPs) to ensure business functions are sustainable both during and after an incident within RTOs.
• The data backup function is formally assigned with defined roles and responsibilities.
• Logical and physical access controls restricts access to backups from privileged users to prevent unauthorized restore of sensitive data.
• IT personnel implement and enforce dual authorization for the deletion or destruction of sensitive/regulated backup media and data. | See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to implement and enforce dual authorization for the deletion or destruction of sensitive backup media and data. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to implement and enforce dual authorization for the deletion or destruction of sensitive backup media and data. | null | null | null | null | null | null | null | null | null | null | null | null | null | CR 2.1 (6.3.3(4)) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | CP-9(7) | null | null | null | CP-9(7) | null | null | null | null | CP-9(7) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 3.1.1e | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | D.3.8.1 | null | null | null | null | null | null | null | null | null | null | null | TBD - 3.1.1e | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | R-AC-1
R-AC-2
R-AM-1
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-GV-2
R-GV-3
R-GV-6
R-GV-7
R-IR-1 | R-AC-1 | R-AC-2 | null | null | R-AM-1 | null | R-AM-3 | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | null | null | null | null | R-GV-2 | R-GV-3 | null | null | R-GV-6 | R-GV-7 | null | R-IR-1 | null | null | null | null | null | NT-7
MT-1
MT-2
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | null | null | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Business Continuity & Disaster Recovery | Backup Access | BCD-11.9 | Mechanisms exist to restrict access to backups to privileged users with assigned roles for data backup and recovery operations. | null | null | Does the organization restrict access to backups to privileged users with assigned roles for data backup and recovery operations? | 9 | Protect | null | X | X | There is no evidence of a capability to restrict access to backups to privileged users with assigned roles for data backup and recovery operations. | SP-CMM1 is N/A, since a structured process is required to restrict access to backups to privileged users with assigned roles for data backup and recovery operations. | SP-CMM2 is N/A, since a well-defined process is required to restrict access to backups to privileged users with assigned roles for data backup and recovery operations. | Business Continuity & Disaster Recovery (BCD) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A formal Business Continuity & Disaster Recovery (BC/DR) program exists with defined roles and responsibilities to restore functionality in the event of a catastrophe, emergency, or significant disruptive incident that is handled in accordance with the Continuity of Operations Plan (COOP).
• BC/DR personnel work with business stakeholders to identify business-critical systems, services, internal teams and third-party service providers.
• Application/system/process owners conduct a Business Impact Analysis (BIA) at least annually, or after any major technology or process change, to identify assets critical to the business in need of protection, as well as single points of failure.
• Recovery Time Objectives (RTOs) are defined.
• Recovery Point Objectives (RPOs) are defined.
• Controls are assigned to sensitive/regulated assets to comply with specific BC/DR requirements to facilitate recovery operations in accordance with RTOs and RPOs.
• IT personnel work with business stakeholders to develop Disaster Recovery Plans (DRP) to recover business-critical systems and services within RPOs.
• Business stakeholders work with IT personnel to develop Business Continuity Plans (BCPs) to ensure business functions are sustainable both during and after an incident within RTOs.
• The data backup function is formally assigned with defined roles and responsibilities.
• Logical and physical access controls restricts access to backups from privileged users to prevent unauthorized restore of sensitive data. | See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to restrict access to backups to privileged users with assigned roles for data backup and recovery operations. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to restrict access to backups to privileged users with assigned roles for data backup and recovery operations. | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | TPC-50 | null | null | null | null | null | null | null | null | null | null | null | null | B5.c | null | null | null | null | Principle 8.5 | Principle 8.5 | Principle 8.5 | null | null | 1812
1813 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-6
R-GV-7
R-GV-8 | null | null | null | R-AC-4 | R-AM-1 | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | R-EX-6 | R-EX-7 | R-GV-1 | R-GV-2 | null | null | null | R-GV-6 | R-GV-7 | R-GV-8 | null | null | null | null | null | null | MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Business Continuity & Disaster Recovery | Backup Modification and/or Destruction | BCD-11.10 | Mechanisms exist to restrict access to modify and/or delete backups to privileged users with assigned data backup and recovery operations roles. | null | null | Does the organization restrict access to modify and/or delete backups to privileged users with assigned data backup and recovery operations roles? | 9 | Protect | null | X | X | There is no evidence of a capability to restrict access to modify and/ or delete backups to privileged users with assigned data backup and recovery operations roles. | SP-CMM1 is N/A, since a structured process is required to restrict access to modify and/ or delete backups to privileged users with assigned data backup and recovery operations roles. | SP-CMM2 is N/A, since a well-defined process is required to restrict access to modify and/ or delete backups to privileged users with assigned data backup and recovery operations roles. | Business Continuity & Disaster Recovery (BCD) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A formal Business Continuity & Disaster Recovery (BC/DR) program exists with defined roles and responsibilities to restore functionality in the event of a catastrophe, emergency, or significant disruptive incident that is handled in accordance with the Continuity of Operations Plan (COOP).
• BC/DR personnel work with business stakeholders to identify business-critical systems, services, internal teams and third-party service providers.
• Application/system/process owners conduct a Business Impact Analysis (BIA) at least annually, or after any major technology or process change, to identify assets critical to the business in need of protection, as well as single points of failure.
• Recovery Time Objectives (RTOs) are defined.
• Recovery Point Objectives (RPOs) are defined.
• Controls are assigned to sensitive/regulated assets to comply with specific BC/DR requirements to facilitate recovery operations in accordance with RTOs and RPOs.
• IT personnel work with business stakeholders to develop Disaster Recovery Plans (DRP) to recover business-critical systems and services within RPOs.
• Business stakeholders work with IT personnel to develop Business Continuity Plans (BCPs) to ensure business functions are sustainable both during and after an incident within RTOs.
• The data backup function is formally assigned with defined roles and responsibilities.
• Logical and physical access controls restricts access to backups from privileged users to prevent unauthorized restore of sensitive data. | See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to restrict access to modify and/ or delete backups to privileged users with assigned data backup and recovery operations roles. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to restrict access to modify and/ or delete backups to privileged users with assigned data backup and recovery operations roles. | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Principle 8.6 | Principle 8.6
Principle 8.7
Principle 8.8 | Principle 8.6
Principle 8.7
Principle 8.8 | null | null | 1814 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-6
R-GV-7
R-GV-8 | null | null | null | R-AC-4 | R-AM-1 | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | R-EX-6 | R-EX-7 | R-GV-1 | R-GV-2 | null | null | null | R-GV-6 | R-GV-7 | R-GV-8 | null | null | null | null | null | null | MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Business Continuity & Disaster Recovery | Information System Recovery & Reconstitution | BCD-12 | Mechanisms exist to ensure the secure recovery and reconstitution of systems to a known state after a disruption, compromise or failure. | - CimTrak Integrity Suite (https://www.cimcor.com/cimtrak/) | null | Does the organization ensure the secure recovery and reconstitution of systems to a known state after a disruption, compromise or failure? | 9 | Protect | X | X | X | There is no evidence of a capability to ensure the secure recovery and reconstitution of systems to a known state after a disruption, compromise or failure. | Business Continuity & Disaster Recovery (BCD) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• IT personnel work with business stakeholders to identify business-critical systems and services, including internal teams and third-party service providers.
• IT personnel develop limited Disaster Recovery Plans (DRP) to recover business-critical systems and services.
• Business stakeholders develop limited Business Continuity Plans (BCPs) to ensure business-critical functions are sustainable both during and after an incident within Recovery Time Objectives (RTOs).
• Backups are performed ad-hoc and focus on business-critical systems.
• Limited technologies exist to support near real-time network infrastructure failover (e.g., redundant ISPs, redundant power, etc.). | Business Continuity & Disaster Recovery (BCD) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Business Continuity / Disaster Recovery (BC/DR) management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for BC/DR management.
• BC/DR roles are formally assigned as an additional duty to existing IT/cybersecurity personnel.
• Recovery Time Objectives (RTOs) identify business-critical systems and services, which are given priority of service in alternate processing and storage sites.
• IT personnel develop Disaster Recovery Plans (DRP) to recover business-critical systems and services.
• Data/process owners conduct a Business Impact Analysis (BIA) at least annually, or after any major technology or process change, to identify assets critical to the business in need of protection, as well as single points of failure.
• IT/cybersecurity personnel work with business stakeholders to develop Business Continuity Plans (BCPs) to ensure business functions are sustainable both during and after an incident within Recovery Time Objectives (RTOs).
• IT personnel use a backup methodology (e.g., grandfather, father & s on rotation) to store backups in a secondary location, separate from the primary storage site.
• IT personnel configure business-critical systems to transfer backup data to the alternate storage site at a rate that is capable of meeting Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs). | Business Continuity & Disaster Recovery (BCD) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A formal Business Continuity & Disaster Recovery (BC/DR) program exists with defined roles and responsibilities to restore functionality in the event of a catastrophe, emergency, or significant disruptive incident that is handled in accordance with the Continuity of Operations Plan (COOP).
• BC/DR personnel work with business stakeholders to identify business-critical systems, services, internal teams and third-party service providers.
• Application/system/process owners conduct a Business Impact Analysis (BIA) at least annually, or after any major technology or process change, to identify assets critical to the business in need of protection, as well as single points of failure.
• Recovery Time Objectives (RTOs) are defined.
• Recovery Point Objectives (RPOs) are defined.
• Controls are assigned to sensitive/regulated assets to comply with specific BC/DR requirements to facilitate recovery operations in accordance with RTOs and RPOs.
• IT personnel work with business stakeholders to develop Disaster Recovery Plans (DRP) to recover business-critical systems and services within RPOs.
• Business stakeholders work with IT personnel to develop Business Continuity Plans (BCPs) to ensure business functions are sustainable both during and after an incident within RTOs.
• The data backup function is formally assigned with defined roles and responsibilities.
• Recoveries are performed into an isolated, non-production environment. | Business Continuity & Disaster Recovery (BCD) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to ensure the secure recovery and reconstitution of systems to a known state after a disruption, compromise or failure. | CC7.5
A1.2 | null | null | 11.3 | 11.3 | 11.3 | 11.3 | null | null | null | OPA-06
OPA-07 | null | null | CR 7.4 (11.6.1) | null | null | null | null | null | null | null | null | null | null | null | null | T1485, T1486, T1490, T1491, T1491.001, T1491.002, T1561, T1561.001, T1561.002, T1565, T1565.001 | null | null | null | null | null | null | null | CP-10 | CP-10 | CP-10 | CP-10 | CP-10 | null | CP-10 | CP-10 | CP-10 | null | null | CP-10 | CP-10 | CP-10 | null | null | null | null | null | null | null | null | null | null | null | null | null | PR.IP-4 | RC.RP-03
RC.RP-05 | null | null | null | null | null | null | null | null | null | null | null | null | K.8.1 | null | null | null | null | null | null | SC:SG3.SP1 | null | null | null | null | null | null | null | null | CP-10 | null | null | null | null | null | null | null | CP-10 | CP-10 | CP-10 | CP-10 | CP-10 | CP-10 | CP-10 | CP-10 | CP-10 | CP-10 | null | D5.IR.Pl.B.5
D5.IR.Te.E.3 | null | null | null | null | null | null | null | CP-10 | null | null | 8-613 | null | null | null | null | null | null | CP-10 | CP-10 | CP-10 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | CP-10 | CP-10 | CP-10 | null | null | null | 3.7.3(83) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 25.9
25.12
25.22 | null | null | null | null | null | null | null | null | null | null | null | 2-8-2 | null | null | 2-4-3-3 | null | null | null | null | null | null | null | null | null | null | B5.c | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | null | null | x | R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-4
R-GV-5
R-IR-1
R-IR-2
R-IR-4 | null | null | null | R-AC-4 | R-AM-1 | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | R-EX-6 | R-EX-7 | R-GV-1 | R-GV-2 | null | R-GV-4 | R-GV-5 | null | null | null | R-IR-1 | R-IR-2 | null | R-IR-4 | null | null | NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | NT-9 | NT-10 | NT-11 | NT-12 | NT-13 | NT-14 | MT-1 | MT-2 | MT-3 | MT-4 | MT-5 | MT-6 | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Business Continuity & Disaster Recovery | Transaction Recovery | BCD-12.1 | Mechanisms exist to utilize specialized backup mechanisms that will allow transaction recovery for transaction-based applications and services in accordance with Recovery Point Objectives (RPOs). | null | null | Does the organization utilize specialized backup mechanisms that will allow transaction recovery for transaction-based applications and services in accordance with Recovery Point Objectives (RPOs)? | 9 | Recover | X | X | X | There is no evidence of a capability to utilize specialized backup mechanisms that will allow transaction recovery for transaction-based applications and services in accordance with Recovery Point Objectives (RPOs). | SP-CMM1 is N/A, since a structured process is required to utilize specialized backup mechanisms that will allow transaction recovery for transaction-based applications and services in accordance with Recovery Point Objectives (RPOs). | Business Continuity & Disaster Recovery (BCD) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Business Continuity / Disaster Recovery (BC/DR) management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for BC/DR management.
• BC/DR roles are formally assigned as an additional duty to existing IT/cybersecurity personnel.
• Recovery Time Objectives (RTOs) identify business-critical systems and services, which are given priority of service in alternate processing and storage sites.
• IT personnel develop Disaster Recovery Plans (DRP) to recover business-critical systems and services.
• Data/process owners conduct a Business Impact Analysis (BIA) at least annually, or after any major technology or process change, to identify assets critical to the business in need of protection, as well as single points of failure.
• IT/cybersecurity personnel work with business stakeholders to develop Business Continuity Plans (BCPs) to ensure business functions are sustainable both during and after an incident within Recovery Time Objectives (RTOs).
• IT personnel use a backup methodology (e.g., grandfather, father & s on rotation) to store backups in a secondary location, separate from the primary storage site.
• IT personnel configure business-critical systems to transfer backup data to the alternate storage site at a rate that is capable of meeting Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs). | Business Continuity & Disaster Recovery (BCD) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A formal Business Continuity & Disaster Recovery (BC/DR) program exists with defined roles and responsibilities to restore functionality in the event of a catastrophe, emergency, or significant disruptive incident that is handled in accordance with the Continuity of Operations Plan (COOP).
• BC/DR personnel work with business stakeholders to identify business-critical systems, services, internal teams and third-party service providers.
• Application/system/process owners conduct a Business Impact Analysis (BIA) at least annually, or after any major technology or process change, to identify assets critical to the business in need of protection, as well as single points of failure.
• Recovery Time Objectives (RTOs) are defined.
• Recovery Point Objectives (RPOs) are defined.
• Controls are assigned to sensitive/regulated assets to comply with specific BC/DR requirements to facilitate recovery operations in accordance with RTOs and RPOs.
• IT personnel work with business stakeholders to develop Disaster Recovery Plans (DRP) to recover business-critical systems and services within RPOs.
• Business stakeholders work with IT personnel to develop Business Continuity Plans (BCPs) to ensure business functions are sustainable both during and after an incident within RTOs.
• The data backup function is formally assigned with defined roles and responsibilities.
• Recoveries are performed into an isolated, non-production environment. | Business Continuity & Disaster Recovery (BCD) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to utilize specialized backup mechanisms that will allow transaction recovery for transaction-based applications and services in accordance with Recovery Point Objectives (RPOs). | A1.2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | CP-10(2) | null | CP-10(2) | CP-10(2) | CP-10(2) | null | null | CP-10(2) | CP-10(2) | null | null | null | CP-10(2) | CP-10(2) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | K.2.1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | CP-10(2) | null | null | null | null | null | null | null | CP-10(2) | null | CP-10(2) | CP-10(2) | null | CP-10(2) | null | CP-10(2) | CP-10(2) | null | null | null | null | null | null | null | null | null | null | CP-10(2) | null | null | null | null | null | null | null | null | null | null | CP-10(2) | CP-10(2) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | CP-10(2) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 25.9
25.21 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 2-4-3-3 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-4
R-GV-5
R-IR-1
R-IR-2
R-IR-4 | null | null | null | R-AC-4 | R-AM-1 | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | R-EX-6 | R-EX-7 | R-GV-1 | R-GV-2 | null | R-GV-4 | R-GV-5 | null | null | null | R-IR-1 | R-IR-2 | null | R-IR-4 | null | null | NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | NT-9 | NT-10 | NT-11 | NT-12 | NT-13 | NT-14 | MT-1 | MT-2 | MT-3 | MT-4 | MT-5 | MT-6 | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Business Continuity & Disaster Recovery | Failover Capability | BCD-12.2 | Mechanisms exist to implement real-time or near-real-time failover capability to maintain availability of critical systems, applications and/or services. | - Load balancers
- High Availability (HA) firewalls | null | Does the organization implement real-time or near-real-time failover capability to maintain availability of critical systems, applications and/or services? | 8 | Recover | X | X | X | There is no evidence of a capability to implement real-time or near-real-time failover capability to maintain availability of critical systems, applications and/ or services. | Business Continuity & Disaster Recovery (BCD) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• IT personnel work with business stakeholders to identify business-critical systems and services, including internal teams and third-party service providers.
• IT personnel develop limited Disaster Recovery Plans (DRP) to recover business-critical systems and services.
• Business stakeholders develop limited Business Continuity Plans (BCPs) to ensure business-critical functions are sustainable both during and after an incident within Recovery Time Objectives (RTOs).
• Backups are performed ad-hoc and focus on business-critical systems.
• Limited technologies exist to support near real-time network infrastructure failover (e.g., redundant ISPs, redundant power, etc.). | Business Continuity & Disaster Recovery (BCD) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Business Continuity / Disaster Recovery (BC/DR) management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for BC/DR management.
• BC/DR roles are formally assigned as an additional duty to existing IT/cybersecurity personnel.
• Recovery Time Objectives (RTOs) identify business-critical systems and services, which are given priority of service in alternate processing and storage sites.
• IT personnel develop Disaster Recovery Plans (DRP) to recover business-critical systems and services.
• Data/process owners conduct a Business Impact Analysis (BIA) at least annually, or after any major technology or process change, to identify assets critical to the business in need of protection, as well as single points of failure.
• IT/cybersecurity personnel work with business stakeholders to develop Business Continuity Plans (BCPs) to ensure business functions are sustainable both during and after an incident within Recovery Time Objectives (RTOs).
• IT personnel use a backup methodology (e.g., grandfather, father & s on rotation) to store backups in a secondary location, separate from the primary storage site.
• IT personnel configure business-critical systems to transfer backup data to the alternate storage site at a rate that is capable of meeting Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs).
• Technologies exist to support business-critical application and services failover.
• Technologies exist to support network infrastructure failover (e.g., redundant ISPs, redundant power, etc.). | Business Continuity & Disaster Recovery (BCD) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A formal Business Continuity & Disaster Recovery (BC/DR) program exists with defined roles and responsibilities to restore functionality in the event of a catastrophe, emergency, or significant disruptive incident that is handled in accordance with the Continuity of Operations Plan (COOP).
• BC/DR personnel work with business stakeholders to identify business-critical systems, services, internal teams and third-party service providers.
• Application/system/process owners conduct a Business Impact Analysis (BIA) at least annually, or after any major technology or process change, to identify assets critical to the business in need of protection, as well as single points of failure.
• Recovery Time Objectives (RTOs) are defined.
• Recovery Point Objectives (RPOs) are defined.
• Controls are assigned to sensitive/regulated assets to comply with specific BC/DR requirements to facilitate recovery operations in accordance with RTOs and RPOs.
• IT personnel work with business stakeholders to develop Disaster Recovery Plans (DRP) to recover business-critical systems and services within RPOs.
• Business stakeholders work with IT personnel to develop Business Continuity Plans (BCPs) to ensure business functions are sustainable both during and after an incident within RTOs.
• The data backup function is formally assigned with defined roles and responsibilities.
• Technologies exist to support business-critical application and services failover.
• Technologies exist to support network infrastructure failover (e.g., redundant ISPs, redundant power, etc.). | See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to implement real-time or near-real-time failover capability to maintain availability of critical systems, applications and/ or services. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to implement real-time or near-real-time failover capability to maintain availability of critical systems, applications and/ or services. | A1.2 | null | null | null | null | null | null | null | null | BCR-03
BCR-11 | OPA-06
OPA-07 | null | null | FR 7 (11.1)
CR 7.1 (11.3.1) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | PR.PT-P4 | null | null | null | CP-10(5) | null | null | null | SI-13 | null | null | null | null | SI-13 | null | null | null | SI-13 | null | null | null | null | null | null | null | null | null | null | null | null | null | PR.PT-5 | PR.IR-04 | null | null | null | null | null | null | null | null | null | null | null | null | K.1.1 | null | null | null | null | null | RESPONSE-4.C.MIL1
RESPONSE-4.L.MIL2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Art 12.4 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 12.26
25.12 | null | null | null | null | null | null | null | null | null | null | null | null | TPC-43 | null | null | null | null | null | null | null | null | null | null | null | null | B5.b | null | null | null | null | null | null | null | null | null | 1441 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-4
R-GV-5
R-IR-1
R-IR-2
R-IR-4 | null | null | null | R-AC-4 | R-AM-1 | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | R-EX-6 | R-EX-7 | R-GV-1 | R-GV-2 | null | R-GV-4 | R-GV-5 | null | null | null | R-IR-1 | R-IR-2 | null | R-IR-4 | null | null | NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | NT-9 | NT-10 | NT-11 | NT-12 | NT-13 | NT-14 | MT-1 | MT-2 | MT-3 | MT-4 | MT-5 | MT-6 | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | - Added NIST 800-53 R5 mapping for SI-13 |
Business Continuity & Disaster Recovery | Electronic Discovery (eDiscovery) | BCD-12.3 | Mechanisms exist to utilize electronic discovery (eDiscovery) that covers current and archived communication transactions. | null | null | Does the organization utilize electronic discovery (eDiscovery) that covers current and archived communication transactions? | 8 | Respond | X | X | X | There is no evidence of a capability to utilize electronic discovery (eDiscovery) that covers current and archived communication transactions. | Business Continuity & Disaster Recovery (BCD) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• IT personnel work with business stakeholders to identify business-critical systems and services, including internal teams and third-party service providers.
• IT personnel develop limited Disaster Recovery Plans (DRP) to recover business-critical systems and services.
• Business stakeholders develop limited Business Continuity Plans (BCPs) to ensure business-critical functions are sustainable both during and after an incident within Recovery Time Objectives (RTOs).
• Backups are performed ad-hoc and focus on business-critical systems.
• Limited technologies exist to support near real-time network infrastructure failover (e.g., redundant ISPs, redundant power, etc.).
• F or eDiscovery, IT personnel manually identify and collect Electronically Stored Information (ESI) in order to respond to a request from a lawsuit or investigation. | Business Continuity & Disaster Recovery (BCD) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Business Continuity / Disaster Recovery (BC/DR) management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for BC/DR management.
• BC/DR roles are formally assigned as an additional duty to existing IT/cybersecurity personnel.
• Recovery Time Objectives (RTOs) identify business-critical systems and services, which are given priority of service in alternate processing and storage sites.
• IT personnel develop Disaster Recovery Plans (DRP) to recover business-critical systems and services.
• Data/process owners conduct a Business Impact Analysis (BIA) at least annually, or after any major technology or process change, to identify assets critical to the business in need of protection, as well as single points of failure.
• IT/cybersecurity personnel work with business stakeholders to develop Business Continuity Plans (BCPs) to ensure business functions are sustainable both during and after an incident within Recovery Time Objectives (RTOs).
• IT personnel use a backup methodology (e.g., grandfather, father & s on rotation) to store backups in a secondary location, separate from the primary storage site.
• IT personnel configure business-critical systems to transfer backup data to the alternate storage site at a rate that is capable of meeting Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs).
• A documented eDiscovery process exists to support Federal Rules of Civil Procedure (FRCP) requirements for eDiscovery practices.
• F or eDiscovery, IT personnel use network and endpoint-based technologies to identify, collect and produce Electronically Stored Information (ESI) in response to a request from a lawsuit or investigation. | Business Continuity & Disaster Recovery (BCD) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A formal Business Continuity & Disaster Recovery (BC/DR) program exists with defined roles and responsibilities to restore functionality in the event of a catastrophe, emergency, or significant disruptive incident that is handled in accordance with the Continuity of Operations Plan (COOP).
• BC/DR personnel work with business stakeholders to identify business-critical systems, services, internal teams and third-party service providers.
• Application/system/process owners conduct a Business Impact Analysis (BIA) at least annually, or after any major technology or process change, to identify assets critical to the business in need of protection, as well as single points of failure.
• Recovery Time Objectives (RTOs) are defined.
• Recovery Point Objectives (RPOs) are defined.
• Controls are assigned to sensitive/regulated assets to comply with specific BC/DR requirements to facilitate recovery operations in accordance with RTOs and RPOs.
• IT personnel work with business stakeholders to develop Disaster Recovery Plans (DRP) to recover business-critical systems and services within RPOs.
• Business stakeholders work with IT personnel to develop Business Continuity Plans (BCPs) to ensure business functions are sustainable both during and after an incident within RTOs.
• The data backup function is formally assigned with defined roles and responsibilities.
• A documented eDiscovery process exists to support Federal Rules of Civil Procedure (FRCP) requirements for eDiscovery practices.
• IT personnel use network and endpoint-based technologies to identify, collect and produce Electronically Stored Information (ESI) in response to an eDiscovery request from a lawsuit or investigation.
• Predictive coding and other analytic software for e-discovery, such as Computer Assisted Review (CAR) or Technology Assisted Review (TAR), is used to reduce the number of documents required for review by attorneys and allow the legal team to prioritize the documents it does review. | Business Continuity & Disaster Recovery (BCD) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to utilize electronic discovery (eDiscovery) that covers current and archived communication transactions. | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | L.1.10 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 11.3.13.C.01
11.3.13.C.02
11.3.13.C.03 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | R-AM-3
R-BC-2
R-BC-3
R-EX-1
R-EX-2
R-EX-5
R-GV-1
R-GV-2
R-IR-1
R-IR-2
R-IR-4 | null | null | null | null | null | null | R-AM-3 | null | R-BC-2 | R-BC-3 | null | null | R-EX-1 | R-EX-2 | null | null | R-EX-5 | null | null | R-GV-1 | R-GV-2 | null | null | null | null | null | null | R-IR-1 | R-IR-2 | null | R-IR-4 | null | null | NT-7
MT-1
MT-2
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | null | null | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Business Continuity & Disaster Recovery | Restore Within Time Period | BCD-12.4 | Mechanisms exist to restore systems, applications and/or services within organization-defined restoration time-periods from configuration-controlled and integrity-protected information; representing a known, operational state for the asset. | - CimTrak Integrity Suite (https://www.cimcor.com/cimtrak/) | null | Does the organization restore systems, applications and/or services within organization-defined restoration time-periods from configuration-controlled and integrity-protected information; representing a known, operational state for the asset? | 5 | Respond | X | X | X | There is no evidence of a capability to restore systems, applications and/ or services within organization-defined restoration time-periods from configuration-controlled and integrity-protected information; representing a known, operational state for the asset. | SP-CMM1 is N/A, since a structured process is required to restore systems, applications and/ or services within organization-defined restoration time-periods from configuration-controlled and integrity-protected information; representing a known, operational state for the asset. | Business Continuity & Disaster Recovery (BCD) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Business Continuity / Disaster Recovery (BC/DR) management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for BC/DR management.
• BC/DR roles are formally assigned as an additional duty to existing IT/cybersecurity personnel.
• Recovery Time Objectives (RTOs) identify business-critical systems and services, which are given priority of service in alternate processing and storage sites.
• IT personnel develop Disaster Recovery Plans (DRP) to recover business-critical systems and services.
• Data/process owners conduct a Business Impact Analysis (BIA) at least annually, or after any major technology or process change, to identify assets critical to the business in need of protection, as well as single points of failure.
• IT/cybersecurity personnel work with business stakeholders to develop Business Continuity Plans (BCPs) to ensure business functions are sustainable both during and after an incident within Recovery Time Objectives (RTOs).
• IT personnel use a backup methodology (e.g., grandfather, father & s on rotation) to store backups in a secondary location, separate from the primary storage site.
• IT personnel configure business-critical systems to transfer backup data to the alternate storage site at a rate that is capable of meeting Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs). | Business Continuity & Disaster Recovery (BCD) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A formal Business Continuity & Disaster Recovery (BC/DR) program exists with defined roles and responsibilities to restore functionality in the event of a catastrophe, emergency, or significant disruptive incident that is handled in accordance with the Continuity of Operations Plan (COOP).
• BC/DR personnel work with business stakeholders to identify business-critical systems, services, internal teams and third-party service providers.
• Application/system/process owners conduct a Business Impact Analysis (BIA) at least annually, or after any major technology or process change, to identify assets critical to the business in need of protection, as well as single points of failure.
• Recovery Time Objectives (RTOs) are defined.
• Recovery Point Objectives (RPOs) are defined.
• Controls are assigned to sensitive/regulated assets to comply with specific BC/DR requirements to facilitate recovery operations in accordance with RTOs and RPOs.
• IT personnel work with business stakeholders to develop Disaster Recovery Plans (DRP) to recover business-critical systems and services within RPOs.
• Business stakeholders work with IT personnel to develop Business Continuity Plans (BCPs) to ensure business functions are sustainable both during and after an incident within RTOs.
• The data backup function is formally assigned with defined roles and responsibilities. | Business Continuity & Disaster Recovery (BCD) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to restore systems, applications and/ or services within organization-defined restoration time-periods from configuration-controlled and integrity-protected information; representing a known, operational state for the asset. | null | null | null | null | null | null | null | null | null | BCR-03 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | CP-10(4) | null | null | CP-10(4) | CP-10(4) | null | null | null | CP-10(4) | null | null | null | null | CP-10(4) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | K.8.1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | CP-10(4) | null | null | CP-10(4) | null | CP-10(4) | null | null | CP-10(4) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | R-AM-3
R-BC-1
R-BC-3
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-GV-1
R-GV-2
R-GV-4
R-GV-5
R-IR-2
R-IR-3
R-IR-4 | null | null | null | null | null | null | R-AM-3 | R-BC-1 | null | R-BC-3 | null | null | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | null | R-GV-1 | R-GV-2 | null | R-GV-4 | R-GV-5 | null | null | null | null | R-IR-2 | R-IR-3 | R-IR-4 | null | null | NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | NT-9 | NT-10 | NT-11 | NT-12 | NT-13 | NT-14 | MT-1 | MT-2 | MT-3 | MT-4 | MT-5 | MT-6 | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Business Continuity & Disaster Recovery | Backup & Restoration Hardware Protection | BCD-13 | Mechanisms exist to protect backup and restoration hardware and software. | null | null | Does the organization protect backup and restoration hardware and software? | 8 | Protect | X | X | X | There is no evidence of a capability to protect backup and restoration hardware and software. | Business Continuity & Disaster Recovery (BCD) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• IT personnel work with business stakeholders to identify business-critical systems and services, including internal teams and third-party service providers.
• IT personnel develop limited Disaster Recovery Plans (DRP) to recover business-critical systems and services.
• Business stakeholders develop limited Business Continuity Plans (BCPs) to ensure business-critical functions are sustainable both during and after an incident within Recovery Time Objectives (RTOs).
• Backups are performed ad-hoc and focus on business-critical systems.
• Limited technologies exist to support near real-time network infrastructure failover (e.g., redundant ISPs, redundant power, etc.). | Business Continuity & Disaster Recovery (BCD) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Business Continuity / Disaster Recovery (BC/DR) management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for BC/DR management.
• BC/DR roles are formally assigned as an additional duty to existing IT/cybersecurity personnel.
• Recovery Time Objectives (RTOs) identify business-critical systems and services, which are given priority of service in alternate processing and storage sites.
• IT personnel develop Disaster Recovery Plans (DRP) to recover business-critical systems and services.
• Data/process owners conduct a Business Impact Analysis (BIA) at least annually, or after any major technology or process change, to identify assets critical to the business in need of protection, as well as single points of failure.
• IT/cybersecurity personnel work with business stakeholders to develop Business Continuity Plans (BCPs) to ensure business functions are sustainable both during and after an incident within Recovery Time Objectives (RTOs).
• IT personnel use a backup methodology (e.g., grandfather, father & s on rotation) to store backups in a secondary location, separate from the primary storage site.
• IT personnel configure business-critical systems to transfer backup data to the alternate storage site at a rate that is capable of meeting Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs).
• IT personnel maintain technologies that are compatible with existing network and infrastructure configuration. | Business Continuity & Disaster Recovery (BCD) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A formal Business Continuity & Disaster Recovery (BC/DR) program exists with defined roles and responsibilities to restore functionality in the event of a catastrophe, emergency, or significant disruptive incident that is handled in accordance with the Continuity of Operations Plan (COOP).
• BC/DR personnel work with business stakeholders to identify business-critical systems, services, internal teams and third-party service providers.
• Application/system/process owners conduct a Business Impact Analysis (BIA) at least annually, or after any major technology or process change, to identify assets critical to the business in need of protection, as well as single points of failure.
• Recovery Time Objectives (RTOs) are defined.
• Recovery Point Objectives (RPOs) are defined.
• Controls are assigned to sensitive/regulated assets to comply with specific BC/DR requirements to facilitate recovery operations in accordance with RTOs and RPOs.
• IT personnel work with business stakeholders to develop Disaster Recovery Plans (DRP) to recover business-critical systems and services within RPOs.
• Business stakeholders work with IT personnel to develop Business Continuity Plans (BCPs) to ensure business functions are sustainable both during and after an incident within RTOs.
• The data backup function is formally assigned with defined roles and responsibilities.
• Logical and physical access controls restricts access to backup and restoration hardware.
• IT personnel maintain technologies that are compatible with existing network and infrastructure configuration. | Business Continuity & Disaster Recovery (BCD) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to protect backup and restoration hardware and software. | CC7.5 | null | null | 11.3 | 11.3 | 11.3 | 11.3 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | CP-10(6) | null | null | null | CP-10(6) | null | null | null | null | CP-10(6) | null | null | CP-10(6) | CP-10(6) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | K.4 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 25.12
25.18 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | null | null | x | R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-4
R-GV-5
R-IR-1
R-IR-2
R-IR-4 | null | null | null | R-AC-4 | R-AM-1 | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | R-EX-6 | R-EX-7 | R-GV-1 | R-GV-2 | null | R-GV-4 | R-GV-5 | null | null | null | R-IR-1 | R-IR-2 | null | R-IR-4 | null | null | NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | NT-9 | NT-10 | NT-11 | NT-12 | NT-13 | NT-14 | MT-1 | MT-2 | MT-3 | MT-4 | MT-5 | MT-6 | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | - Added NIST 800-53 R5 mapping for CP-10(6) |