SCF Domain
stringclasses 34
values | SCF Control
stringlengths 7
85
| SCF #
stringlengths 6
9
| Secure Controls Framework (SCF)
Control Description
stringlengths 49
657
| Methods To Comply With SCF Controls
stringlengths 6
863
⌀ | Evidence Request List (ERL) #
stringclasses 181
values | SCF Control Question
stringlengths 51
659
| Relative Control Weighting
int64 1
10
| Function Grouping
stringclasses 5
values | SCRM
Tier 1
Strategic
stringclasses 2
values | SCRM
Tier 2
Operational
stringclasses 2
values | SCRM
Tier 3
Tactical
stringclasses 2
values | SP-CMM 0
Not Performed
stringlengths 69
677
⌀ | SP-CMM 1
Performed Informally
stringlengths 43
2.02k
⌀ | SP-CMM 2
Planned & Tracked
stringlengths 43
3.33k
⌀ | SP-CMM 3
Well Defined
stringlengths 43
5.16k
⌀ | SP-CMM 4
Quantitatively Controlled
stringlengths 43
1.35k
⌀ | SP-CMM 5
Continuously Improving
stringlengths 43
725
⌀ | AICPA
TSC 2017
(Controls)
stringclasses 116
values | AICPA
TSC 2017
(Points of Focus)
stringclasses 171
values | BSI
Standard 200-1
stringclasses 18
values | CIS
CSC
v8.0
stringclasses 158
values | CIS
CSC v8.0
IG1
stringclasses 57
values | CIS
CSC v8.0
IG2
stringclasses 136
values | CIS
CSC v8.0
IG3
stringclasses 154
values | COBIT
2019
stringclasses 101
values | COSO
v2017
stringclasses 45
values | CSA
CCM
v4
stringclasses 229
values | CSA
IoT SCF
v2
stringclasses 168
values | ENISA
v2.0
stringclasses 33
values | GAPP
stringclasses 36
values | IEC 62443-4-2
stringclasses 104
values | ISO/SAE
21434
v2021
stringclasses 69
values | ISO
22301
v2019
stringclasses 25
values | ISO
27001
v2013
stringclasses 30
values | ISO
27001
v2022
stringclasses 35
values | ISO
27002
v2013
stringclasses 142
values | ISO
27002
v2022
stringclasses 166
values | ISO
27017
v2015
stringclasses 158
values | ISO
27018
v2014
stringclasses 16
values | ISO
27701
v2019
stringclasses 161
values | ISO
29100
v2011
stringclasses 15
values | ISO
31000
v2009
stringclasses 7
values | ISO
31010
v2009
stringclasses 16
values | MITRE
ATT&CK
10
stringclasses 100
values | MPA
Content Security Program
v5.1
stringclasses 98
values | NIAC
Insurance Data Security Model Law (MDL-668)
stringclasses 41
values | NIST
AI RMF
AI 100-1
v1.0
stringclasses 114
values | NIST Privacy Framework
v1.0
stringclasses 114
values | NIST
SSDF
stringclasses 29
values | NIST
800-37
rev 2
stringclasses 32
values | NIST
800-39
stringclasses 9
values | NIST
800-53
rev4
stringlengths 4
47
⌀ | NIST
800-53 rev4
(low)
stringclasses 121
values | NIST
800-53 rev4
(moderate)
stringlengths 4
22
⌀ | NIST
800-53 rev4
(high)
stringlengths 4
23
⌀ | NIST
800-53
rev5
stringlengths 4
99
⌀ | NIST
800-53B
rev5
(privacy)
stringclasses 85
values | NIST
800-53B
rev5
(low)
stringclasses 151
values | NIST
800-53B
rev5
(moderate)
stringlengths 4
40
⌀ | NIST
800-53B
rev5
(high)
stringlengths 4
40
⌀ | NIST
800-53
rev5
(NOC)
stringlengths 4
41
⌀ | NIST
800-63B
(partial mapping)
stringclasses 5
values | NIST
800-82 rev3
LOW
OT Overlay
stringclasses 162
values | NIST
800-82 rev3
MODERATE
OT Overlay
stringlengths 4
40
⌀ | NIST
800-82 rev3
HIGH
OT Overlay
stringlengths 4
40
⌀ | NIST
800-160
stringclasses 23
values | NIST
800-161
rev 1
stringlengths 4
34
⌀ | NIST
800-161
rev 1
C-SCRM Baseline
stringclasses 95
values | NIST
800-161
rev 1
Flow Down
stringclasses 71
values | NIST
800-161
rev 1
Level 1
stringclasses 69
values | NIST
800-161
rev 1
Level 2
stringclasses 218
values | NIST
800-161
rev 1
Level 3
stringclasses 234
values | NIST
800-171
rev 2
stringclasses 172
values | NIST
800-171
rev 3 FPD
stringlengths 5
141
⌀ | NIST
800-171A
stringclasses 114
values | NIST
800-171A
rev 3 IPD
stringclasses 167
values | NIST
800-172
stringclasses 46
values | NIST
800-218
v1.1
stringclasses 29
values | NIST
CSF
v1.1
stringclasses 97
values | NIST
CSF
v2.0 IPD
stringclasses 127
values | OWASP
Top 10
v2021
stringclasses 20
values | PCIDSS
v3.2
stringclasses 135
values | PCIDSS
v4.0
stringlengths 3
156
⌀ | PCIDSS
v4.0
SAQ A
stringclasses 30
values | PCIDSS
v4.0
SAQ A-EP
stringclasses 141
values | PCIDSS
v4.0
SAQ B
stringclasses 26
values | PCIDSS
v4.0
SAQ B-IP
stringclasses 55
values | PCIDSS
v4.0
SAQ C
stringclasses 132
values | PCIDSS
v4.0
SAQ C-VT
stringclasses 53
values | PCIDSS
v4.0
SAQ D Merchant
stringclasses 213
values | PCIDSS
v4.0
SAQ D Service Provider
stringclasses 231
values | PCIDSS
v4.0
SAQ P2PE
stringclasses 24
values | Shared Assessments SIG 2023
stringlengths 3
43
⌀ | SWIFT
CSF
v2023
stringclasses 55
values | TISAX
ISA v5.1.0
stringclasses 88
values | UL
2900-1
stringclasses 36
values | UN
R155
stringclasses 19
values | UN
ECE WP.29
stringclasses 19
values | US
C2M2
v2.1
stringclasses 152
values | US
CERT RMM
v1.2
stringclasses 212
values | US
CISA
CPG
v2022
stringclasses 44
values | US
CJIS Security Policy 5.9
stringclasses 99
values | US
CMMC 2.0
Level 1
stringclasses 17
values | US
CMMC 2.0
Level 2
stringclasses 110
values | US
CMMC 2.0
Level 3
stringclasses 139
values | US
CMMC 2.1 (draft)
Level 1
stringclasses 18
values | US
CMMC 2.1 (draft)
Level 2
stringclasses 110
values | US
CMMC 2.1 (draft)
Level 3
stringclasses 141
values | US
CMS
MARS-E v2.0
stringlengths 4
28
⌀ | US
COPPA
float64 6.5k
6.5k
⌀ | US
DFARS
Cybersecurity
252.204-70xx
stringclasses 19
values | US
FACTA
stringclasses 2
values | US
FAR
52.204-21
stringclasses 22
values | US
FAR
52.204-27
stringclasses 2
values | US
FAR
Section 889
stringclasses 1
value | US
FDA
21 CFR Part 11
stringclasses 27
values | US
FedRAMP
R4
stringlengths 4
24
⌀ | US
FedRAMP
R4 (low)
stringclasses 130
values | US
FedRAMP
R4 (moderate)
stringlengths 4
23
⌀ | US
FedRAMP
R4 (high)
stringlengths 4
24
⌀ | US
FedRAMP
R4 (LI-SaaS)
stringclasses 131
values | US
FedRAMP
R5
stringlengths 4
24
⌀ | US
FedRAMP
R5
(low)
stringclasses 151
values | US
FedRAMP
R5
(moderate)
stringlengths 4
23
⌀ | US
FedRAMP
R5
(high)
stringlengths 4
24
⌀ | US
FedRAMP
R5
(LI-SaaS)
stringclasses 151
values | US
FERPA
stringclasses 3
values | US
FFIEC
stringclasses 68
values | US
FINRA
stringclasses 3
values | US
FTC Act
stringclasses 1
value | US
GLBA
CFR 314
stringclasses 41
values | US
HIPAA
stringclasses 54
values | HIPAA - HICP
Small Practice
stringclasses 31
values | HIPAA - HICP
Medium Practice
stringclasses 59
values | HIPAA - HICP
Large Practice
stringclasses 112
values | US
IRS 1075
stringlengths 3
165
⌀ | US
ITAR Part 120
(limited)
stringclasses 9
values | US
NERC
CIP
stringclasses 35
values | US
NISPOM
stringclasses 72
values | US
NNPI
(unclass)
stringclasses 61
values | US
NSTC
NSPM-33
stringclasses 15
values | US
Privacy Shield
stringclasses 7
values | US
SEC
Cybersecurity Rule
stringclasses 12
values | US
SOX
stringclasses 1
value | US
SSA
EIESR
v8.0
stringclasses 22
values | US
StateRAMP
Low
Category 1
stringclasses 107
values | US
StateRAMP
Low+
Category 2
stringclasses 167
values | US
StateRAMP
Moderate
Category 3
stringlengths 4
24
⌀ | US
TSA / DHS
1580/82-2022-01
stringclasses 43
values | US - AK
PIPA
stringclasses 8
values | US - CA
SB327
stringclasses 4
values | US-CA
CPRA
(Nov 2022)
stringclasses 36
values | US - CA
SB1386
stringclasses 1
value | US - CO
Colorado Privacy Act
stringclasses 36
values | US - IL
BIPA
stringclasses 9
values | US - IL
IPA
stringclasses 4
values | US - IL
PIPA
stringclasses 6
values | US-MA
201 CMR 17.00
stringclasses 27
values | US - NV
SB220
stringclasses 3
values | US - NY
DFS
23 NYCRR500
float64 500
500
⌀ | US - NY
SHIELD Act
S5575B
stringclasses 15
values | US - OR
646A
stringclasses 21
values | US - SC
Insurance Data Security Act
stringclasses 41
values | US - TX
BC521
stringclasses 3
values | US-TX
Cybersecurity Act
stringclasses 13
values | US-TX DIR Control Standards 2.0
stringclasses 155
values | US-TX
TX-RAMP
Level 1
stringclasses 120
values | US-TX
TX-RAMP
Level 2
stringlengths 4
23
⌀ | US-TX
SB820
stringclasses 5
values | US-VA
CDPA
2023
stringclasses 24
values | US-VT
Act 171 of 2018
stringclasses 32
values | EMEA
EU
EBA
GL/2019/04
stringclasses 93
values | EMEA
EU
DORA
stringclasses 60
values | EMEA
EU ePrivacy
(draft)
stringclasses 15
values | EMEA
EU
GDPR
stringclasses 57
values | EMEA
EU
NIS2
stringclasses 21
values | EMEA
EU
PSD2
stringclasses 10
values | EMEA
EU
EU-US Data Privacy Framework
stringclasses 23
values | EMEA
Austria
stringclasses 10
values | EMEA
Belgium
stringclasses 9
values | EMEA
Czech Republic
stringclasses 14
values | EMEA
Denmark
stringclasses 11
values | EMEA
Finland
stringclasses 7
values | EMEA
France
stringclasses 9
values | EMEA
Germany
stringclasses 11
values | EMEA
Germany
Banking Supervisory Requirements for IT (BAIT)
stringclasses 57
values | EMEA
Germany
C5-2020
stringclasses 152
values | EMEA
Greece
stringclasses 9
values | EMEA
Hungary
stringclasses 12
values | EMEA
Ireland
stringclasses 3
values | EMEA
Israel
CDMO
v1.0
stringlengths 3
89
⌀ | EMEA
Israel
stringclasses 6
values | EMEA
Italy
stringclasses 15
values | EMEA
Kenya
DPA 2019
stringclasses 38
values | EMEA
Luxembourg
stringclasses 4
values | EMEA
Netherlands
stringclasses 12
values | EMEA
Nigeria
DPR 2019
stringclasses 24
values | EMEA
Norway
stringclasses 12
values | EMEA
Poland
stringclasses 11
values | EMEA
Portugal
stringclasses 11
values | EMEA
Qatar
PDPPL
stringclasses 37
values | EMEA
Russia
stringclasses 13
values | EMEA
Saudi Arabia
Critical Security Controls
stringclasses 105
values | EMEA
Saudi Arabia
SACS-002
stringclasses 96
values | EMEA
Saudi Arabia
SAMA CSFv1.0
stringclasses 36
values | EMEA
Saudi Arabia
ECC-12018
stringclasses 148
values | EMEA
Saudi Arabia
OTCC-1 2022
stringclasses 133
values | EMEA
Serbia
87/2018
stringclasses 46
values | EMEA
Slovak Republic
stringclasses 2
values | EMEA
South Africa
stringclasses 45
values | EMEA
Spain
stringclasses 10
values | EMEA
Spain
CCN-STIC 825
stringclasses 71
values | EMEA
Sweden
stringclasses 11
values | EMEA
Switzerland
stringclasses 8
values | EMEA
Turkey
stringclasses 8
values | EMEA
UAE
stringclasses 9
values | EMEA
UK
CAF v3.1
stringclasses 75
values | EMEA
UK
CAP 1850
stringclasses 16
values | EMEA
UK
Cyber Essentials
float64 1
5
⌀ | EMEA
UK
DPA
stringclasses 7
values | EMEA
UK
GDPR
stringclasses 38
values | APAC
Australia
Essential 8
ML 1
stringclasses 21
values | APAC
Australia
Essential 8
ML 2
stringclasses 30
values | APAC
Australia
Essential 8
ML 3
stringclasses 40
values | APAC
Australia
Privacy Act
stringclasses 11
values | APAC
Australian Privacy Principles
stringclasses 18
values | APAC
Australia
ISM 2022
stringlengths 4
214
⌀ | APAC
Australia
IoT Code of Practice
stringclasses 11
values | APAC
Australia
Prudential Standard CPS230
stringclasses 32
values | APAC
Australia
Prudential Standard CPS234
stringclasses 34
values | APAC
China
Data Security Law (DSL)
stringclasses 6
values | APAC
China
DNSIP
stringclasses 3
values | APAC
China
Privacy Law
stringclasses 57
values | APAC
Hong Kong
stringclasses 8
values | APAC
India
ITR
stringclasses 4
values | APAC
Indonesia
stringclasses 7
values | APAC
Japan
APPI
stringclasses 31
values | APAC
Japan
ISMAP
stringclasses 188
values | APAC
Malaysia
stringclasses 8
values | APAC
New Zealand Health ISF
stringclasses 22
values | APAC
New Zealand
NZISM 3.6
stringlengths 10
1.15k
⌀ | APAC
New Zealand Privacy Act of 2020
stringclasses 12
values | APAC
Philippines
stringclasses 12
values | APAC
Singapore
stringclasses 15
values | APAC
Singapore
Cyber Hygiene Practice
stringclasses 12
values | APAC
Singapore MAS
TRM 2021
stringclasses 166
values | APAC
South Korea
stringclasses 22
values | APAC
Taiwan
stringclasses 7
values | Americas
Argentina
stringclasses 14
values | Americas
Argentina
Reg 132-2018
stringclasses 24
values | Americas
Bahamas
stringclasses 6
values | Americas
Bermuda
BMACCC
stringclasses 36
values | Americas
Brazil
LGPD
stringclasses 27
values | Americas
Canada
CSAG
stringclasses 75
values | Americas
Canada
OSFI B-13
stringclasses 60
values | Americas
Canada
PIPEDA
stringclasses 14
values | Americas
Chile
stringclasses 9
values | Americas
Colombia
stringclasses 10
values | Americas
Costa Rica
stringclasses 8
values | Americas
Mexico
stringclasses 14
values | Americas
Peru
stringclasses 14
values | Americas
Uruguay
stringclasses 17
values | Minimum Security Requirements
MCR + DSR
float64 | Identify
Minimum Compliance Requirements (MCR)
float64 | Identify
Discretionary Security Requirements (DSR)
float64 | SCF-B
Business Mergers & Acquisitions
stringclasses 1
value | SCF-I
Cyber Insurance Duty of Care
stringclasses 23
values | SCF-E
Embedded
Technology
stringclasses 1
value | SCF-R
Ransomware Protection
stringclasses 1
value | Risk Threat Summary
stringlengths 13
230
⌀ | Risk
R-AC-1
stringclasses 1
value | Risk
R-AC-2
stringclasses 1
value | Risk
R-AC-3
stringclasses 1
value | Risk
R-AC-4
stringclasses 1
value | Risk
R-AM-1
stringclasses 1
value | Risk
R-AM-2
stringclasses 2
values | Risk
R-AM-3
stringclasses 1
value | Risk
R-BC-1
stringclasses 2
values | Risk
R-BC-2
stringclasses 2
values | Risk
R-BC-3
stringclasses 2
values | Risk
R-BC-4
stringclasses 2
values | Risk
R-BC-5
stringclasses 2
values | Risk
R-EX-1
stringclasses 2
values | Risk
R-EX-2
stringclasses 2
values | Risk
R-EX-3
stringclasses 2
values | Risk
R-EX-4
stringclasses 2
values | Risk
R-EX-5
stringclasses 2
values | Risk
R-EX-6
stringclasses 2
values | Risk
R-EX-7
stringclasses 2
values | Risk
R-GV-1
stringclasses 2
values | Risk
R-GV-2
stringclasses 2
values | Risk
R-GV-3
stringclasses 2
values | Risk
R-GV-4
stringclasses 2
values | Risk
R-GV-5
stringclasses 2
values | Risk
R-GV-6
stringclasses 2
values | Risk
R-GV-7
stringclasses 2
values | Risk
R-GV-8
stringclasses 2
values | Risk
R-IR-1
stringclasses 2
values | Risk
R-IR-2
stringclasses 2
values | Risk
R-IR-3
stringclasses 2
values | Risk
R-IR-4
stringclasses 1
value | Risk
R-SA-1
stringclasses 2
values | Risk
R-SA-2
stringclasses 2
values | Control Threat Summary
stringclasses 69
values | Threat
NT-1
stringclasses 1
value | Threat
NT-2
stringclasses 1
value | Threat
NT-3
stringclasses 1
value | Threat
NT-4
stringclasses 1
value | Threat
NT-5
stringclasses 1
value | Threat
NT-6
stringclasses 1
value | Threat
NT-7
stringclasses 1
value | Threat
NT-8
stringclasses 1
value | Threat
NT-9
stringclasses 1
value | Threat
NT-10
stringclasses 1
value | Threat
NT-11
stringclasses 1
value | Threat
NT-12
stringclasses 1
value | Threat
NT-13
stringclasses 1
value | Threat
NT-14
stringclasses 1
value | Threat
MT-1
stringclasses 1
value | Threat
MT-2
stringclasses 1
value | Threat
MT-3
stringclasses 1
value | Threat
MT-4
stringclasses 1
value | Threat
MT-5
stringclasses 1
value | Threat
MT-6
stringclasses 1
value | Threat
MT-7
stringclasses 1
value | Threat
MT-8
stringclasses 1
value | Threat
MT-9
stringclasses 1
value | Threat
MT-10
stringclasses 1
value | Threat
MT-11
stringclasses 1
value | Threat
MT-12
stringclasses 1
value | Threat
MT-13
stringclasses 1
value | Threat
MT-14
stringclasses 1
value | Threat
MT-15
stringclasses 1
value | Threat
MT-16
stringclasses 1
value | Errata
2023.4
stringclasses 30
values |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Secure Engineering & Architecture | Information In Shared Resources | SEA-05 | Mechanisms exist to prevent unauthorized and unintended information transfer via shared system resources. | null | null | Does the organization prevent unauthorized and unintended information transfer via shared system resources? | 8 | Protect | null | X | X | There is no evidence of a capability to prevent unauthorized and unintended information transfer via shared system resources. | Secure Engineering & Architecture (SEA) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• IT personnel use an informal process to design, build and maintain secure solutions.
• IT /cyber engineering governance is decentralized, with the responsibility for implementing and testing cybersecurity & data privacy controls being assigned to the business process owner(s), including the definition and enforcement of roles and responsibilities. | Secure Engineering & Architecture (SEA) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Architecture/engineering management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• A Change Advisory Board (CAB), or similar function, exists to govern changes to systems, applications and services, ensuring their stability, reliability and predictability.
• Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for architecture/engineering management.
• IT personnel implement secure engineering practices to protect the confidentiality, integrity, availability and safety of the organization’s technology assets, data and network(s).
• Technologies are configured to protect data with the strength and integrity commensurate with the classification or sensitivity of the information and mostly conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides), including cryptographic protections for sensitive/regulated data. | Secure Engineering & Architecture (SEA) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• IT/cybersecurity architects, or a similar function, enable the implementation a “layered defense” network architecture that enables a resilient defense-in-depth approach through the use of industry-recognized cybersecurity & data privacy practices in the specification, design, development, implementation and modification of systems and services (e.g., DISA STIGs, CIS Benchmarks or OEM security guides).
• IT/cybersecurity engineers, or a similar function, operationalize enterprise architecture, aligned with industry-recognized leading practices, with consideration for cybersecurity & data privacy principles, including resiliency expectations, that addresses risk to organizational operations, assets, individuals, other organizations.
• A Validated Architecture Design Review (VADR), or similar process, is used to evaluate design criteria for secure practices and conformance with requirements for applicable statutory, regulatory and contractual controls to determine if the system/application/service is designed, built and operated in a secure and resilient manner.
• A Change Advisory Board (CAB), or similar function, governs changes to systems, applications and services to ensure their stability, reliability and predictability.
• A formal Change Management (CM) program helps to ensure that no unauthorized changes are made, all changes are documented, services are not disrupted and resources are used efficiently.
• An Identity & Access Management (IAM) function, or similar function, enables the implementation of identification and access management controls for “least privileges” practices, allowing for the management of user, group and system accounts, including privileged accounts.
• An IT Asset Management (ITAM) function, or similar function, categorizes assets according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data. | See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to prevent unauthorized and unintended information transfer via shared system resources. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to prevent unauthorized and unintended information transfer via shared system resources. | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | T1020.001, T1040, T1070, T1070.001, T1070.002, T1080, T1119, T1530, T1552, T1552.001, T1552.002, T1552.004, T1557, T1557.002, T1558, T1558.002, T1558.003, T1558.004, T1564.009, T1565, T1565.001, T1565.002, T1565.003, T1602, T1602.001, T1602.002 | null | null | null | null | null | null | null | SC-4 | null | SC-4 | SC-4 | SC-4 | null | null | SC-4 | SC-4 | null | null | null | SC-4 | SC-4 | null | SC-4 | null | null | null | SC-4 | SC-4 | 3.13.4 | 3.13.4 | 3.13.4 | A.03.13.04[01]
A.03.13.04[02] | null | null | null | null | A01:2021
A05:2021 | null | null | null | null | null | null | null | null | null | null | null | D.16 | null | null | null | null | null | null | null | null | null | null | SC.L2-3.13.4 | SC.L2-3.13.4 | null | SC.L2-3.13.4 | SC.L2-3.13.4 | SC-4 | null | null | null | null | null | null | null | SC-4 | null | SC-4 | SC-4 | null | SC-4 | null | SC-4 | SC-4 | null | null | null | null | null | null | null | null | null | null | SC-4 | null | null | 8-609 | null | null | null | null | null | null | null | null | SC-4 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | SC-4 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | OPS-24
COS-06 | null | null | null | 10.5
10.8 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 4-2-3-1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Principle 5.6 | Principle 5.7 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | null | x | null | R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1 | R-AC-1 | R-AC-2 | R-AC-3 | R-AC-4 | R-AM-1 | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | R-EX-6 | R-EX-7 | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | R-GV-8 | R-IR-1 | R-IR-2 | R-IR-3 | R-IR-4 | R-SA-1 | null | NT-7
MT-1
MT-2
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | null | null | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Secure Engineering & Architecture | Prevent Program Execution | SEA-06 | Automated mechanisms exist to prevent the execution of unauthorized software programs. | null | null | Does the organization use automated mechanisms to prevent the execution of unauthorized software programs? | 8 | Protect | null | null | X | There is no evidence of a capability to prevent the execution of unauthorized software programs. | Secure Engineering & Architecture (SEA) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• IT personnel use an informal process to design, build and maintain secure solutions.
• IT /cyber engineering governance is decentralized, with the responsibility for implementing and testing cybersecurity & data privacy controls being assigned to the business process owner(s), including the definition and enforcement of roles and responsibilities. | Secure Engineering & Architecture (SEA) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Architecture/engineering management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• A Change Advisory Board (CAB), or similar function, exists to govern changes to systems, applications and services, ensuring their stability, reliability and predictability.
• Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for architecture/engineering management.
• IT personnel implement secure engineering practices to protect the confidentiality, integrity, availability and safety of the organization’s technology assets, data and network(s).
• Technologies are configured to protect data with the strength and integrity commensurate with the classification or sensitivity of the information and mostly conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides), including cryptographic protections for sensitive/regulated data. | Secure Engineering & Architecture (SEA) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• IT/cybersecurity architects, or a similar function, enable the implementation a “layered defense” network architecture that enables a resilient defense-in-depth approach through the use of industry-recognized cybersecurity & data privacy practices in the specification, design, development, implementation and modification of systems and services (e.g., DISA STIGs, CIS Benchmarks or OEM security guides).
• IT/cybersecurity engineers, or a similar function, operationalize enterprise architecture, aligned with industry-recognized leading practices, with consideration for cybersecurity & data privacy principles, including resiliency expectations, that addresses risk to organizational operations, assets, individuals, other organizations.
• A Validated Architecture Design Review (VADR), or similar process, is used to evaluate design criteria for secure practices and conformance with requirements for applicable statutory, regulatory and contractual controls to determine if the system/application/service is designed, built and operated in a secure and resilient manner.
• A Change Advisory Board (CAB), or similar function, governs changes to systems, applications and services to ensure their stability, reliability and predictability.
• A formal Change Management (CM) program helps to ensure that no unauthorized changes are made, all changes are documented, services are not disrupted and resources are used efficiently.
• An Identity & Access Management (IAM) function, or similar function, enables the implementation of identification and access management controls for “least privileges” practices, allowing for the management of user, group and system accounts, including privileged accounts.
• An IT Asset Management (ITAM) function, or similar function, categorizes assets according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data. | See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to prevent the execution of unauthorized software programs. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to prevent the execution of unauthorized software programs. | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | CM-7(2) | null | CM-7(2) | CM-7(2) | CM-7(2) | null | null | CM-7(2) | CM-7(2) | null | null | null | CM-7(2) | CM-7(2) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | A01:2021
A05:2021 | null | null | null | null | null | null | null | null | null | null | null | I.2.5.11 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | CM-7(2) | null | null | null | null | null | null | null | CM-7(2) | null | CM-7(2) | CM-7(2) | null | CM-7(2) | null | CM-7(2) | CM-7(2) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | CM-7(2) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | null | x | x | R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-7
R-GV-1
R-GV-2
R-GV-4
R-GV-5 | null | null | R-AC-3 | R-AC-4 | R-AM-1 | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | null | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | R-EX-7 | R-GV-1 | R-GV-2 | null | R-GV-4 | R-GV-5 | null | null | null | null | null | null | null | null | null | NT-7
MT-1
MT-2
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | null | null | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | null | null | null |
Secure Engineering & Architecture | Predictable Failure Analysis | SEA-07 | Mechanisms exist to determine the Mean Time to Failure (MTTF) for system components in specific environments of operation. | - Mean Time to Failure (MTTF) | null | Does the organization determine the Mean Time to Failure (MTTF) for system components in specific environments of operation? | 5 | Protect | null | X | X | There is no evidence of a capability to determine the Mean Time to Failure (MTTF) for system components in specific environments of operation. | Secure Engineering & Architecture (SEA) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• IT personnel use an informal process to design, build and maintain secure solutions.
• IT /cyber engineering governance is decentralized, with the responsibility for implementing and testing cybersecurity & data privacy controls being assigned to the business process owner(s), including the definition and enforcement of roles and responsibilities. | Secure Engineering & Architecture (SEA) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Architecture/engineering management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• A Change Advisory Board (CAB), or similar function, exists to govern changes to systems, applications and services, ensuring their stability, reliability and predictability.
• Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for architecture/engineering management.
• IT personnel implement secure engineering practices to protect the confidentiality, integrity, availability and safety of the organization’s technology assets, data and network(s).
• Technologies are configured to protect data with the strength and integrity commensurate with the classification or sensitivity of the information and mostly conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides), including cryptographic protections for sensitive/regulated data. | Secure Engineering & Architecture (SEA) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• IT/cybersecurity architects, or a similar function, enable the implementation a “layered defense” network architecture that enables a resilient defense-in-depth approach through the use of industry-recognized cybersecurity & data privacy practices in the specification, design, development, implementation and modification of systems and services (e.g., DISA STIGs, CIS Benchmarks or OEM security guides).
• IT/cybersecurity engineers, or a similar function, operationalize enterprise architecture, aligned with industry-recognized leading practices, with consideration for cybersecurity & data privacy principles, including resiliency expectations, that addresses risk to organizational operations, assets, individuals, other organizations.
• A Validated Architecture Design Review (VADR), or similar process, is used to evaluate design criteria for secure practices and conformance with requirements for applicable statutory, regulatory and contractual controls to determine if the system/application/service is designed, built and operated in a secure and resilient manner.
• A Change Advisory Board (CAB), or similar function, governs changes to systems, applications and services to ensure their stability, reliability and predictability.
• A formal Change Management (CM) program helps to ensure that no unauthorized changes are made, all changes are documented, services are not disrupted and resources are used efficiently.
• An Identity & Access Management (IAM) function, or similar function, enables the implementation of identification and access management controls for “least privileges” practices, allowing for the management of user, group and system accounts, including privileged accounts.
• An IT Asset Management (ITAM) function, or similar function, categorizes assets according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data. | Secure Engineering & Architecture (SEA) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to determine the Mean Time to Failure (MTTF) for system components in specific environments of operation. | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | SI-13 | null | null | null | SI-13 | null | null | null | null | SI-13 | null | null | null | SI-13 | null | null | null | null | null | null | null | NFO - SA-3 | 3.16.2.a
3.16.2.b | null | null | null | null | PR.PT-5 | null | null | null | null | null | null | null | null | null | null | null | null | null | K.6.2 | null | null | null | null | null | null | TM:SG5.SP1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 622(2)(d)(C)(iii) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | OR 6464A | null | null | R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-BC-1
R-BC-2
R-BC-4
R-BC-5
R-EX-7
R-GV-1
R-GV-2
R-GV-4
R-GV-5
R-IR-1
R-IR-4 | R-AC-1 | R-AC-2 | R-AC-3 | R-AC-4 | R-AM-1 | R-AM-2 | null | R-BC-1 | R-BC-2 | null | R-BC-4 | R-BC-5 | null | null | null | null | null | null | R-EX-7 | R-GV-1 | R-GV-2 | null | R-GV-4 | R-GV-5 | null | null | null | R-IR-1 | null | null | R-IR-4 | null | null | NT-7
MT-1
MT-2
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | null | null | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Secure Engineering & Architecture | Technology Lifecycle Management | SEA-07.1 | Mechanisms exist to manage the usable lifecycles of technology assets. | - Computer Lifecycle Program (CLP)
- Technology Asset Management (TAM) | E-AST-09 | Does the organization manage the usable lifecycles of technology assets? | 7 | Protect | X | X | X | There is no evidence of a capability to manage the usable lifecycles of technology assets. | Secure Engineering & Architecture (SEA) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• IT personnel use an informal process to design, build and maintain secure solutions.
• IT /cyber engineering governance is decentralized, with the responsibility for implementing and testing cybersecurity & data privacy controls being assigned to the business process owner(s), including the definition and enforcement of roles and responsibilities. | Secure Engineering & Architecture (SEA) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Architecture/engineering management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• A Change Advisory Board (CAB), or similar function, exists to govern changes to systems, applications and services, ensuring their stability, reliability and predictability.
• Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for architecture/engineering management.
• IT personnel implement secure engineering practices to protect the confidentiality, integrity, availability and safety of the organization’s technology assets, data and network(s).
• Technologies are configured to protect data with the strength and integrity commensurate with the classification or sensitivity of the information and mostly conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides), including cryptographic protections for sensitive/regulated data. | Secure Engineering & Architecture (SEA) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• IT/cybersecurity architects, or a similar function, enable the implementation a “layered defense” network architecture that enables a resilient defense-in-depth approach through the use of industry-recognized cybersecurity & data privacy practices in the specification, design, development, implementation and modification of technology assets and services (e.g., DISA STIGs, CIS Benchmarks or OEM security guides).
• IT/cybersecurity engineers, or a similar function, operationalize enterprise architecture, aligned with industry-recognized leading practices, with consideration for cybersecurity & data privacy principles, including resiliency expectations, that addresses risk to organizational operations, assets, individuals, other organizations.
• A Validated Architecture Design Review (VADR), or similar process, is used to evaluate design criteria for secure practices and conformance with requirements for applicable statutory, regulatory and contractual controls to determine if the system/application/service is designed, built and operated in a secure and resilient manner.
• A Change Advisory Board (CAB), or similar function, governs changes to systems, applications and services to ensure their stability, reliability and predictability.
• A formal Change Management (CM) program helps to ensure that no unauthorized changes are made, all changes are documented, services are not disrupted and resources are used efficiently.
• An Identity & Access Management (IAM) function, or similar function, enables the implementation of identification and access management controls for “least privileges” practices, allowing for the management of user, group and system accounts, including privileged accounts.
• An IT Asset Management (ITAM) function, or similar function, categorizes assets according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data. | Secure Engineering & Architecture (SEA) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to manage the usable lifecycles of technology assets. | null | null | null | null | null | null | null | BAI09.03
BAI09.04 | null | null | CCM-01
CCM-05
POL-04
SET-05 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | T1078, T1078.001, T1078.003, T1078.004, T1213.003, T1574.002 | null | null | null | null | null | null | null | SA-3 | SA-3 | SA-3 | SA-3 | SA-3
SA-3(1)
SA-3(3)
SA-8(30) | SA-3 | SA-3 | SA-3 | SA-3 | SA-3(1)
SA-3(3)
SA-8(30) | null | SA-3 | SA-3 | SA-3 | null | SA-3 | SA-3 | null | SA-3 | SA-3 | SA-3 | NFO - SA-3 | 3.16.2.a
3.16.2.b | null | null | null | null | null | ID.AM-08 | null | null | 12.3.4 | null | null | null | null | null | null | 12.3.4 | 12.3.4 | null | D.1 | null | 3.1.3 | null | null | null | null | EXD:SG3.SP3
EXD:SG3.SP4
EXD:SG4.SP1
EXD:SG4.SP2
RTSE:SG2.SP2 | null | null | null | null | null | null | null | null | SA-3 | null | null | null | null | null | null | null | SA-3 | SA-3 | SA-3 | SA-3 | SA-3 | SA-3 | SA-3 | SA-3 | SA-3 | SA-3 | null | null | null | null | null | null | null | null | null | SA-3 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | SA-3 | SA-3 | SA-3 | null | null | null | 3.5(55) | null | null | null | null | null | null | null | null | null | null | null | null | null | 8.3 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Principle 2.7
Principle 6.7 | Principle 2.9
Principle 6.7 | Principle 2.9
Principle 6.8 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 7.3.1
7.3.2
7.3.3 | null | null | null | null | null | null | null | null | 1.3.1
2.2.5 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | R-AM-1
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-8
R-IR-4 | null | null | null | null | R-AM-1 | null | R-AM-3 | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | R-EX-6 | R-EX-7 | R-GV-1 | null | R-GV-3 | R-GV-4 | R-GV-5 | R-GV-6 | null | R-GV-8 | null | null | null | R-IR-4 | null | null | NT-7
MT-1
MT-2
MT-7
MT-8
MT-9
MT-11
MT-12
MT-13
MT-14
MT-15
MT-16 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | null | null | MT-7 | MT-8 | MT-9 | null | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | MT-16 | null |
Secure Engineering & Architecture | Fail Secure | SEA-07.2 | Mechanisms exist to enable systems to fail to an organization-defined known-state for types of failures, preserving system state information in failure. | null | null | Does the organization enable systems to fail to an organization-defined known-state for types of failures, preserving system state information in failure? | 8 | Protect | null | X | X | There is no evidence of a capability to enable systems to fail to an organization-defined known-state for types of failures, preserving system state information in failure. | Secure Engineering & Architecture (SEA) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• IT personnel use an informal process to design, build and maintain secure solutions.
• IT /cyber engineering governance is decentralized, with the responsibility for implementing and testing cybersecurity & data privacy controls being assigned to the business process owner(s), including the definition and enforcement of roles and responsibilities. | Secure Engineering & Architecture (SEA) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Architecture/engineering management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• A Change Advisory Board (CAB), or similar function, exists to govern changes to systems, applications and services, ensuring their stability, reliability and predictability.
• Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for architecture/engineering management.
• IT personnel implement secure engineering practices to protect the confidentiality, integrity, availability and safety of the organization’s technology assets, data and network(s).
• Technologies are configured to protect data with the strength and integrity commensurate with the classification or sensitivity of the information and mostly conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides), including cryptographic protections for sensitive/regulated data. | Secure Engineering & Architecture (SEA) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• IT/cybersecurity architects, or a similar function, enable the implementation a “layered defense” network architecture that enables a resilient defense-in-depth approach through the use of industry-recognized cybersecurity & data privacy practices in the specification, design, development, implementation and modification of systems and services (e.g., DISA STIGs, CIS Benchmarks or OEM security guides).
• IT/cybersecurity engineers, or a similar function, operationalize enterprise architecture, aligned with industry-recognized leading practices, with consideration for cybersecurity & data privacy principles, including resiliency expectations, that addresses risk to organizational operations, assets, individuals, other organizations.
• A Validated Architecture Design Review (VADR), or similar process, is used to evaluate design criteria for secure practices and conformance with requirements for applicable statutory, regulatory and contractual controls to determine if the system/application/service is designed, built and operated in a secure and resilient manner.
• A Change Advisory Board (CAB), or similar function, governs changes to systems, applications and services to ensure their stability, reliability and predictability.
• A formal Change Management (CM) program helps to ensure that no unauthorized changes are made, all changes are documented, services are not disrupted and resources are used efficiently.
• An Identity & Access Management (IAM) function, or similar function, enables the implementation of identification and access management controls for “least privileges” practices, allowing for the management of user, group and system accounts, including privileged accounts.
• An IT Asset Management (ITAM) function, or similar function, categorizes assets according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data.
• Administrative processes exist and technologies are configured to enable systems to fail to an organization-defined known-state for types of failures, preserving system state information in failure. | Secure Engineering & Architecture (SEA) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | Secure Engineering & Architecture (SEA) efforts are “world-class” capabilities that leverage predictive analysis (e.g., machine learning, AI, etc.). In addition to CMM Level 4 criteria, CMM Level 5 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Stakeholders make time-sensitive decisions to support operational efficiency, which may include automated remediation actions.
▪ Based on predictive analysis, process improvements are implemented according to “continuous improvement” practices that affect process changes. | null | null | null | null | null | null | null | null | null | null | SAP-09 | null | null | NDR 5.2 (15.12.3(3)) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | CP-12
SC-24 | null | null | SC-24 | CP-12
SA-8(24)
SC-24 | null | null | null | SC-24 | CP-12
SA-8(24) | null | CP-12 | CP-12
SC-24 | CP-12
SC-24 | null | null | null | null | null | null | null | null | null | null | null | null | null | PR.PT-5 | null | A01:2021
A05:2021 | null | null | null | null | null | null | null | null | null | null | null | I.2.5.12 | null | null | null | null | null | null | EC:SG2.SP2
KIM:SG2.SP2
TM:SG2.SP2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | SC-24 | null | null | SC-24 | null | SC-24 | null | null | SC-24 | null | null | null | null | null | null | null | null | null | null | null | null | null | 8-615
8-702 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 9.17 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | null | x | x | R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-4
R-BC-5
R-EX-7
R-GV-1
R-GV-2
R-GV-4
R-GV-5
R-IR-1
R-IR-4 | R-AC-1 | R-AC-2 | R-AC-3 | R-AC-4 | R-AM-1 | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | null | R-BC-4 | R-BC-5 | null | null | null | null | null | null | R-EX-7 | R-GV-1 | R-GV-2 | null | R-GV-4 | R-GV-5 | null | null | null | R-IR-1 | null | null | R-IR-4 | null | null | NT-1
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | NT-1 | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | NT-9 | NT-10 | NT-11 | NT-12 | NT-13 | NT-14 | MT-1 | MT-2 | MT-3 | MT-4 | MT-5 | MT-6 | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | - Added NIST 800-53 R5 mapping for CP-12 & SC-24 |
Secure Engineering & Architecture | Fail Safe | SEA-07.3 | Mechanisms exist to implement fail-safe procedures when failure conditions occur. | null | null | Does the organization implement fail-safe procedures when failure conditions occur? | 8 | Protect | null | X | X | There is no evidence of a capability to implement fail-safe procedures when failure conditions occur. | Secure Engineering & Architecture (SEA) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• IT personnel use an informal process to design, build and maintain secure solutions.
• IT /cyber engineering governance is decentralized, with the responsibility for implementing and testing cybersecurity & data privacy controls being assigned to the business process owner(s), including the definition and enforcement of roles and responsibilities. | Secure Engineering & Architecture (SEA) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Architecture/engineering management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• A Change Advisory Board (CAB), or similar function, exists to govern changes to systems, applications and services, ensuring their stability, reliability and predictability.
• Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for architecture/engineering management.
• IT personnel implement secure engineering practices to protect the confidentiality, integrity, availability and safety of the organization’s technology assets, data and network(s).
• Technologies are configured to protect data with the strength and integrity commensurate with the classification or sensitivity of the information and mostly conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides), including cryptographic protections for sensitive/regulated data.
• Administrative processes exist and technologies are configured to implement fail-safe procedures when failure conditions occur. | Secure Engineering & Architecture (SEA) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• IT/cybersecurity architects, or a similar function, enable the implementation a “layered defense” network architecture that enables a resilient defense-in-depth approach through the use of industry-recognized cybersecurity & data privacy practices in the specification, design, development, implementation and modification of systems and services (e.g., DISA STIGs, CIS Benchmarks or OEM security guides).
• IT/cybersecurity engineers, or a similar function, operationalize enterprise architecture, aligned with industry-recognized leading practices, with consideration for cybersecurity & data privacy principles, including resiliency expectations, that addresses risk to organizational operations, assets, individuals, other organizations.
• A Validated Architecture Design Review (VADR), or similar process, is used to evaluate design criteria for secure practices and conformance with requirements for applicable statutory, regulatory and contractual controls to determine if the system/application/service is designed, built and operated in a secure and resilient manner.
• A Change Advisory Board (CAB), or similar function, governs changes to systems, applications and services to ensure their stability, reliability and predictability.
• A formal Change Management (CM) program helps to ensure that no unauthorized changes are made, all changes are documented, services are not disrupted and resources are used efficiently.
• An Identity & Access Management (IAM) function, or similar function, enables the implementation of identification and access management controls for “least privileges” practices, allowing for the management of user, group and system accounts, including privileged accounts.
• An IT Asset Management (ITAM) function, or similar function, categorizes assets according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data.
• Administrative processes exist and technologies are configured to implement fail-safe procedures when failure conditions occur. | Secure Engineering & Architecture (SEA) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | Secure Engineering & Architecture (SEA) efforts are “world-class” capabilities that leverage predictive analysis (e.g., machine learning, AI, etc.). In addition to CMM Level 4 criteria, CMM Level 5 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Stakeholders make time-sensitive decisions to support operational efficiency, which may include automated remediation actions.
▪ Based on predictive analysis, process improvements are implemented according to “continuous improvement” practices that affect process changes. | null | null | null | null | null | null | null | null | null | null | SAP-09 | null | null | CR 3.6 (7.8.1) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | SI-17 | null | null | null | SI-17 | null | null | null | null | SI-17 | null | SI-17 | SI-17 | SI-17 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | J.2.17 | null | null | null | null | null | null | RTSE:SG1.SP1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-4
R-BC-5
R-EX-7
R-GV-1
R-GV-2
R-GV-4
R-GV-5
R-IR-1
R-IR-4 | R-AC-1 | R-AC-2 | R-AC-3 | R-AC-4 | R-AM-1 | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | null | R-BC-4 | R-BC-5 | null | null | null | null | null | null | R-EX-7 | R-GV-1 | R-GV-2 | null | R-GV-4 | R-GV-5 | null | null | null | R-IR-1 | null | null | R-IR-4 | null | null | NT-1
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | NT-1 | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | NT-9 | NT-10 | NT-11 | NT-12 | NT-13 | NT-14 | MT-1 | MT-2 | MT-3 | MT-4 | MT-5 | MT-6 | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | - Added NIST 800-53 R5 mapping for SI-17 |
Secure Engineering & Architecture | Non-Persistence | SEA-08 | Mechanisms exist to implement non-persistent system components and services that are initiated in a known state and terminated upon the end of the session of use or periodically at an organization-defined frequency. | null | null | Does the organization implement non-persistent system components and services that are initiated in a known state and terminated upon the end of the session of use or periodically at an organization-defined frequency? | 9 | Protect | null | null | X | There is no evidence of a capability to implement non-persistent system components and services that are initiated in a known state and terminated up on the end of the session of use or periodically at an organization-defined frequency. | Secure Engineering & Architecture (SEA) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• IT personnel use an informal process to design, build and maintain secure solutions.
• IT /cyber engineering governance is decentralized, with the responsibility for implementing and testing cybersecurity & data privacy controls being assigned to the business process owner(s), including the definition and enforcement of roles and responsibilities. | Secure Engineering & Architecture (SEA) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Architecture/engineering management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• A Change Advisory Board (CAB), or similar function, exists to govern changes to systems, applications and services, ensuring their stability, reliability and predictability.
• Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for architecture/engineering management.
• IT personnel implement secure engineering practices to protect the confidentiality, integrity, availability and safety of the organization’s technology assets, data and network(s).
• Technologies are configured to protect data with the strength and integrity commensurate with the classification or sensitivity of the information and mostly conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides), including cryptographic protections for sensitive/regulated data. | Secure Engineering & Architecture (SEA) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• IT/cybersecurity architects, or a similar function, enable the implementation a “layered defense” network architecture that enables a resilient defense-in-depth approach through the use of industry-recognized cybersecurity & data privacy practices in the specification, design, development, implementation and modification of systems and services (e.g., DISA STIGs, CIS Benchmarks or OEM security guides).
• IT/cybersecurity engineers, or a similar function, operationalize enterprise architecture, aligned with industry-recognized leading practices, with consideration for cybersecurity & data privacy principles, including resiliency expectations, that addresses risk to organizational operations, assets, individuals, other organizations.
• A Validated Architecture Design Review (VADR), or similar process, is used to evaluate design criteria for secure practices and conformance with requirements for applicable statutory, regulatory and contractual controls to determine if the system/application/service is designed, built and operated in a secure and resilient manner.
• A Change Advisory Board (CAB), or similar function, governs changes to systems, applications and services to ensure their stability, reliability and predictability.
• A formal Change Management (CM) program helps to ensure that no unauthorized changes are made, all changes are documented, services are not disrupted and resources are used efficiently.
• An Identity & Access Management (IAM) function, or similar function, enables the implementation of identification and access management controls for “least privileges” practices, allowing for the management of user, group and system accounts, including privileged accounts.
• An IT Asset Management (ITAM) function, or similar function, categorizes assets according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data. | See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to implement non-persistent system components and services that are initiated in a known state and terminated up on the end of the session of use or periodically at an organization-defined frequency. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to implement non-persistent system components and services that are initiated in a known state and terminated up on the end of the session of use or periodically at an organization-defined frequency. | null | null | null | null | null | null | null | null | null | null | null | null | null | CR 4.2 (8.4.1)
CR 4.2 (8.4.3(1))
CR 4.2 (8.4.3(2)) | null | null | null | null | null | null | null | null | null | null | null | null | T1505, T1505.001, T1505.002, T1505.004, T1546.003, T1547.004, T1547.006 | null | null | null | null | null | null | null | SI-14 | null | null | null | SI-14 | null | null | null | null | SI-14 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 3.13.2e
3.14.4e | null | null | null | A01:2021
A05:2021 | null | null | null | null | null | null | null | null | null | null | null | D.1.1.1 | null | null | null | null | null | null | null | null | null | null | null | TBD - 3.13.2e
TBD - 3.14.4e | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | null | x | null | R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-4
R-BC-5
R-EX-7
R-GV-1
R-GV-2
R-GV-4
R-GV-5
R-IR-1
R-IR-4 | R-AC-1 | R-AC-2 | R-AC-3 | R-AC-4 | R-AM-1 | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | null | R-BC-4 | R-BC-5 | null | null | null | null | null | null | R-EX-7 | R-GV-1 | R-GV-2 | null | R-GV-4 | R-GV-5 | null | null | null | R-IR-1 | null | null | R-IR-4 | null | null | NT-7
MT-1
MT-2
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | null | null | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Secure Engineering & Architecture | Refresh from Trusted Sources | SEA-08.1 | Mechanisms exist to ensure that software and data needed for information system component and service refreshes are obtained from trusted sources. | - CimTrak Integrity Suite (https://www.cimcor.com/cimtrak/) | null | Does the organization ensure that software and data needed for information system component and service refreshes are obtained from trusted sources? | 5 | Protect | null | X | X | There is no evidence of a capability to ensure that software and data needed for information system component and service refreshes are obtained from trusted sources. | SP-CMM1 is N/A, since a structured process is required to ensure that software and data needed for information system component and service refreshes are obtained from trusted sources. | Secure Engineering & Architecture (SEA) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Architecture/engineering management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• A Change Advisory Board (CAB), or similar function, exists to govern changes to systems, applications and services, ensuring their stability, reliability and predictability.
• Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for architecture/engineering management.
• IT personnel implement secure engineering practices to protect the confidentiality, integrity, availability and safety of the organization’s technology assets, data and network(s).
• Technologies are configured to protect data with the strength and integrity commensurate with the classification or sensitivity of the information and mostly conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides), including cryptographic protections for sensitive/regulated data. | Secure Engineering & Architecture (SEA) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• IT/cybersecurity architects, or a similar function, enable the implementation a “layered defense” network architecture that enables a resilient defense-in-depth approach through the use of industry-recognized cybersecurity & data privacy practices in the specification, design, development, implementation and modification of systems and services (e.g., DISA STIGs, CIS Benchmarks or OEM security guides).
• IT/cybersecurity engineers, or a similar function, operationalize enterprise architecture, aligned with industry-recognized leading practices, with consideration for cybersecurity & data privacy principles, including resiliency expectations, that addresses risk to organizational operations, assets, individuals, other organizations.
• A Validated Architecture Design Review (VADR), or similar process, is used to evaluate design criteria for secure practices and conformance with requirements for applicable statutory, regulatory and contractual controls to determine if the system/application/service is designed, built and operated in a secure and resilient manner.
• A Change Advisory Board (CAB), or similar function, governs changes to systems, applications and services to ensure their stability, reliability and predictability.
• A formal Change Management (CM) program helps to ensure that no unauthorized changes are made, all changes are documented, services are not disrupted and resources are used efficiently.
• An Identity & Access Management (IAM) function, or similar function, enables the implementation of identification and access management controls for “least privileges” practices, allowing for the management of user, group and system accounts, including privileged accounts.
• An IT Asset Management (ITAM) function, or similar function, categorizes assets according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data. | See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to ensure that software and data needed for information system component and service refreshes are obtained from trusted sources. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to ensure that software and data needed for information system component and service refreshes are obtained from trusted sources. | null | null | null | null | null | null | null | null | null | null | null | null | null | CR 3.12 (7.14) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | SI-14(1) | null | null | null | SA-3(3)
SI-14(1) | null | null | null | null | SA-3(3)
SI-14(1) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 3.4.1e
3.14.4e | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | T.2 | null | null | null | null | null | null | null | null | null | null | null | TBD - 3.4.1e
TBD - 3.14.4e | null | null | CM.L3-3.4.1e | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 1-6-3-2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-4
R-BC-5
R-EX-7
R-GV-1
R-GV-2
R-GV-4
R-GV-5
R-IR-1
R-IR-4 | R-AC-1 | R-AC-2 | R-AC-3 | R-AC-4 | R-AM-1 | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | null | R-BC-4 | R-BC-5 | null | null | null | null | null | null | R-EX-7 | R-GV-1 | R-GV-2 | null | R-GV-4 | R-GV-5 | null | null | null | R-IR-1 | null | null | R-IR-4 | null | null | NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | NT-9 | NT-10 | NT-11 | NT-12 | NT-13 | NT-14 | MT-1 | MT-2 | MT-3 | MT-4 | MT-5 | MT-6 | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Secure Engineering & Architecture | Information Output Filtering | SEA-09 | Mechanisms exist to validate information output from software programs and/or applications to ensure that the information is consistent with the expected content. | null | null | Does the organization validate information output from software programs and/or applications to ensure that the information is consistent with the expected content? | 8 | Protect | null | null | X | There is no evidence of a capability to validate information output from software programs and/ or applications to ensure that the information is consistent with the expected content. | Secure Engineering & Architecture (SEA) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• IT personnel use an informal process to design, build and maintain secure solutions.
• IT /cyber engineering governance is decentralized, with the responsibility for implementing and testing cybersecurity & data privacy controls being assigned to the business process owner(s), including the definition and enforcement of roles and responsibilities. | Secure Engineering & Architecture (SEA) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Architecture/engineering management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• A Change Advisory Board (CAB), or similar function, exists to govern changes to systems, applications and services, ensuring their stability, reliability and predictability.
• Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for architecture/engineering management.
• IT personnel implement secure engineering practices to protect the confidentiality, integrity, availability and safety of the organization’s technology assets, data and network(s).
• Technologies are configured to protect data with the strength and integrity commensurate with the classification or sensitivity of the information and mostly conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides), including cryptographic protections for sensitive/regulated data. | Secure Engineering & Architecture (SEA) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• IT/cybersecurity architects, or a similar function, enable the implementation a “layered defense” network architecture that enables a resilient defense-in-depth approach through the use of industry-recognized cybersecurity & data privacy practices in the specification, design, development, implementation and modification of systems and services (e.g., DISA STIGs, CIS Benchmarks or OEM security guides).
• IT/cybersecurity engineers, or a similar function, operationalize enterprise architecture, aligned with industry-recognized leading practices, with consideration for cybersecurity & data privacy principles, including resiliency expectations, that addresses risk to organizational operations, assets, individuals, other organizations.
• A Validated Architecture Design Review (VADR), or similar process, is used to evaluate design criteria for secure practices and conformance with requirements for applicable statutory, regulatory and contractual controls to determine if the system/application/service is designed, built and operated in a secure and resilient manner.
• A Change Advisory Board (CAB), or similar function, governs changes to systems, applications and services to ensure their stability, reliability and predictability.
• A formal Change Management (CM) program helps to ensure that no unauthorized changes are made, all changes are documented, services are not disrupted and resources are used efficiently.
• An Identity & Access Management (IAM) function, or similar function, enables the implementation of identification and access management controls for “least privileges” practices, allowing for the management of user, group and system accounts, including privileged accounts.
• An IT Asset Management (ITAM) function, or similar function, categorizes assets according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data. | See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to validate information output from software programs and/ or applications to ensure that the information is consistent with the expected content. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to validate information output from software programs and/ or applications to ensure that the information is consistent with the expected content. | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | T1021.002, T1021.005, T1048, T1048.001, T1048.002, T1048.003, T1071.004, T1090, T1090.003, T1095, T1187, T1197, T1205, T1205.001, T1218.012, T1219, T1498, T1498.001, T1498.002, T1499, T1499.001, T1499.002, T1499.003, T1499.004, T1530, T1537, T1552, T1552.005, T1557, T1557.001, T1557.002, T1564.009, T1570, T1572, T1599, T1599.001, T1602, T1602.001, T1602.002 | null | null | null | null | null | null | null | SI-15 | null | null | null | SI-15 | null | null | null | null | SI-15 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | D.3 | null | null | null | null | null | null | KIM:SG5.SP3 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | null | null | null | R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-4
R-BC-5
R-EX-7
R-GV-1
R-GV-2
R-GV-4
R-GV-5
R-IR-1
R-IR-4 | R-AC-1 | R-AC-2 | R-AC-3 | R-AC-4 | R-AM-1 | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | null | R-BC-4 | R-BC-5 | null | null | null | null | null | null | R-EX-7 | R-GV-1 | R-GV-2 | null | R-GV-4 | R-GV-5 | null | null | null | R-IR-1 | null | null | R-IR-4 | null | null | NT-7
MT-1
MT-2
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | null | null | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Secure Engineering & Architecture | Limit Personal Data (PD) Dissemination | SEA-09.1 | Mechanisms exist to limit the dissemination of Personal Data (PD) to organization-defined elements identified in the Data Protection Impact Assessment (DPIA) and consistent with authorized purposes. | - Data Protection Impact Assessment (DPIA) | null | Does the organization limit the dissemination of Personal Data (PD) to organization-defined elements identified in the Data Protection Impact Assessment (DPIA) and consistent with authorized purposes? | 8 | Protect | null | X | X | There is no evidence of a capability to limit the dissemination of Personal Data (PD) to organization-defined elements identified in the Data Protection Impact Assessment (DPIA) and consistent with authorized purposes. | Secure Engineering & Architecture (SEA) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• IT personnel use an informal process to design, build and maintain secure solutions.
• IT /cyber engineering governance is decentralized, with the responsibility for implementing and testing cybersecurity & data privacy controls being assigned to the business process owner(s), including the definition and enforcement of roles and responsibilities. | Secure Engineering & Architecture (SEA) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Architecture/engineering management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• A Change Advisory Board (CAB), or similar function, exists to govern changes to systems, applications and services, ensuring their stability, reliability and predictability.
• Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for architecture/engineering management.
• IT personnel implement secure engineering practices to protect the confidentiality, integrity, availability and safety of the organization’s technology assets, data and network(s).
• Technologies are configured to protect data with the strength and integrity commensurate with the classification or sensitivity of the information and mostly conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides), including cryptographic protections for sensitive/regulated data.
• Administrative processes limit the dissemination of Personal Data (PD) to organization-defined elements identified in the Data Protection Impact Assessment (DPIA) and consistent with authorized purposes. | Secure Engineering & Architecture (SEA) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• IT/cybersecurity architects, or a similar function, enable the implementation a “layered defense” network architecture that enables a resilient defense-in-depth approach through the use of industry-recognized cybersecurity & data privacy practices in the specification, design, development, implementation and modification of systems and services (e.g., DISA STIGs, CIS Benchmarks or OEM security guides).
• IT/cybersecurity engineers, or a similar function, operationalize enterprise architecture, aligned with industry-recognized leading practices, with consideration for cybersecurity & data privacy principles, including resiliency expectations, that addresses risk to organizational operations, assets, individuals, other organizations.
• A Validated Architecture Design Review (VADR), or similar process, is used to evaluate design criteria for secure practices and conformance with requirements for applicable statutory, regulatory and contractual controls to determine if the system/application/service is designed, built and operated in a secure and resilient manner.
• A Change Advisory Board (CAB), or similar function, governs changes to systems, applications and services to ensure their stability, reliability and predictability.
• A formal Change Management (CM) program helps to ensure that no unauthorized changes are made, all changes are documented, services are not disrupted and resources are used efficiently.
• An Identity & Access Management (IAM) function, or similar function, enables the implementation of identification and access management controls for “least privileges” practices, allowing for the management of user, group and system accounts, including privileged accounts.
• An IT Asset Management (ITAM) function, or similar function, categorizes assets according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data.
• Administrative processes limit the dissemination of Personal Data (PD) to organization-defined elements identified in the Data Protection Impact Assessment (DPIA) and consistent with authorized purposes. | See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to limit the dissemination of Personal Data (PD) to organization-defined elements identified in the Data Protection Impact Assessment (DPIA) and consistent with authorized purposes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to limit the dissemination of Personal Data (PD) to organization-defined elements identified in the Data Protection Impact Assessment (DPIA) and consistent with authorized purposes. | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | CT.DP-P4 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | P.4.2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | R-AC-1
R-AC-4
R-AM-3
R-BC-2
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-IR-3
R-IR-4
R-SA-1
R-SA-2 | R-AC-1 | null | null | R-AC-4 | null | null | R-AM-3 | null | R-BC-2 | null | null | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | null | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | null | null | null | R-IR-3 | R-IR-4 | R-SA-1 | R-SA-2 | NT-7
MT-1
MT-2
MT-7
MT-8
MT-9
MT-11
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | null | null | MT-7 | MT-8 | MT-9 | null | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Secure Engineering & Architecture | Memory Protection | SEA-10 | Mechanisms exist to implement security safeguards to protect system memory from unauthorized code execution. | - Puppet (https://puppet.com/)
- Chef (https://www.chef.io/) (https://www.chef.io/) | null | Does the organization implement security safeguards to protect system memory from unauthorized code execution? | 8 | Protect | null | null | X | There is no evidence of a capability to implement security safeguards to protect system memory from unauthorized code execution. | Secure Engineering & Architecture (SEA) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• IT personnel use an informal process to design, build and maintain secure solutions.
• IT /cyber engineering governance is decentralized, with the responsibility for implementing and testing cybersecurity & data privacy controls being assigned to the business process owner(s), including the definition and enforcement of roles and responsibilities. | Secure Engineering & Architecture (SEA) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Architecture/engineering management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• A Change Advisory Board (CAB), or similar function, exists to govern changes to systems, applications and services, ensuring their stability, reliability and predictability.
• Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for architecture/engineering management.
• IT personnel implement secure engineering practices to protect the confidentiality, integrity, availability and safety of the organization’s technology assets, data and network(s).
• Technologies are configured to protect data with the strength and integrity commensurate with the classification or sensitivity of the information and mostly conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides), including cryptographic protections for sensitive/regulated data. | Secure Engineering & Architecture (SEA) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• IT/cybersecurity architects, or a similar function, enable the implementation a “layered defense” network architecture that enables a resilient defense-in-depth approach through the use of industry-recognized cybersecurity & data privacy practices in the specification, design, development, implementation and modification of systems and services (e.g., DISA STIGs, CIS Benchmarks or OEM security guides).
• IT/cybersecurity engineers, or a similar function, operationalize enterprise architecture, aligned with industry-recognized leading practices, with consideration for cybersecurity & data privacy principles, including resiliency expectations, that addresses risk to organizational operations, assets, individuals, other organizations.
• A Validated Architecture Design Review (VADR), or similar process, is used to evaluate design criteria for secure practices and conformance with requirements for applicable statutory, regulatory and contractual controls to determine if the system/application/service is designed, built and operated in a secure and resilient manner.
• A Change Advisory Board (CAB), or similar function, governs changes to systems, applications and services to ensure their stability, reliability and predictability.
• A formal Change Management (CM) program helps to ensure that no unauthorized changes are made, all changes are documented, services are not disrupted and resources are used efficiently.
• An Identity & Access Management (IAM) function, or similar function, enables the implementation of identification and access management controls for “least privileges” practices, allowing for the management of user, group and system accounts, including privileged accounts.
• An IT Asset Management (ITAM) function, or similar function, categorizes assets according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data. | See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to implement security safeguards to protect system memory from unauthorized code execution. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to implement security safeguards to protect system memory from unauthorized code execution. | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | T1003.001, T1047, T1055.009, T1059, T1059.001, T1059.002, T1059.003, T1059.004, T1059.005, T1059.006, T1059.007, T1059.008, T1218, T1218.001, T1218.002, T1218.003, T1218.004, T1218.005, T1218.008, T1218.009, T1218.012, T1218.013, T1218.014, T1505.004, T1543, T1543.002, T1547.004, T1547.006, T1548, T1548.004, T1565, T1565.001, T1565.003, T1611 | null | null | null | null | null | null | null | SI-16 | null | SI-16 | SI-16 | SI-16 | null | null | SI-16 | SI-16 | null | null | null | SI-16 | SI-16 | null | null | null | null | null | null | null | NFO - SI-16 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | P.7.5 | null | null | null | null | null | null | KIM:SG2.SP2 | null | null | null | null | null | null | null | null | SI-16 | null | null | null | null | null | null | null | SI-16 | SI-16 | SI-16 | SI-16 | SI-16 | SI-16 | null | SI-16 | SI-16 | null | null | null | null | null | null | null | null | null | null | SI-16 | null | null | null | null | null | null | null | null | null | SI-16 | SI-16 | SI-16 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | SI-16 | SI-16 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-4
R-BC-5
R-EX-7
R-GV-1
R-GV-2
R-GV-4
R-GV-5
R-IR-1
R-IR-4 | R-AC-1 | R-AC-2 | R-AC-3 | R-AC-4 | R-AM-1 | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | null | R-BC-4 | R-BC-5 | null | null | null | null | null | null | R-EX-7 | R-GV-1 | R-GV-2 | null | R-GV-4 | R-GV-5 | null | null | null | R-IR-1 | null | null | R-IR-4 | null | null | NT-7
MT-1
MT-2
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | null | null | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Secure Engineering & Architecture | Honeypots | SEA-11 | Mechanisms exist to utilize honeypots that are specifically designed to be the target of malicious attacks for the purpose of detecting, deflecting and analyzing such attacks. | null | null | Does the organization utilize honeypots that are specifically designed to be the target of malicious attacks for the purpose of detecting, deflecting and analyzing such attacks? | 3 | Protect | null | X | X | There is no evidence of a capability to utilize honeypots that are specifically designed to be the target of malicious attacks for the purpose of detecting, deflecting and analyzing such attacks. | SP-CMM1 is N/A, since a structured process is required to utilize honeypots that are specifically designed to be the target of malicious attacks for the purpose of detecting, deflecting and analyzing such attacks. | Secure Engineering & Architecture (SEA) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Architecture/engineering management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• A Change Advisory Board (CAB), or similar function, exists to govern changes to systems, applications and services, ensuring their stability, reliability and predictability.
• Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for architecture/engineering management.
• IT personnel implement secure engineering practices to protect the confidentiality, integrity, availability and safety of the organization’s technology assets, data and network(s).
• Technologies are configured to protect data with the strength and integrity commensurate with the classification or sensitivity of the information and mostly conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides), including cryptographic protections for sensitive/regulated data. | Secure Engineering & Architecture (SEA) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• IT/cybersecurity architects, or a similar function, enable the implementation a “layered defense” network architecture that enables a resilient defense-in-depth approach through the use of industry-recognized cybersecurity & data privacy practices in the specification, design, development, implementation and modification of systems and services (e.g., DISA STIGs, CIS Benchmarks or OEM security guides).
• IT/cybersecurity engineers, or a similar function, operationalize enterprise architecture, aligned with industry-recognized leading practices, with consideration for cybersecurity & data privacy principles, including resiliency expectations, that addresses risk to organizational operations, assets, individuals, other organizations.
• A Validated Architecture Design Review (VADR), or similar process, is used to evaluate design criteria for secure practices and conformance with requirements for applicable statutory, regulatory and contractual controls to determine if the system/application/service is designed, built and operated in a secure and resilient manner.
• A Change Advisory Board (CAB), or similar function, governs changes to systems, applications and services to ensure their stability, reliability and predictability.
• A formal Change Management (CM) program helps to ensure that no unauthorized changes are made, all changes are documented, services are not disrupted and resources are used efficiently.
• An Identity & Access Management (IAM) function, or similar function, enables the implementation of identification and access management controls for “least privileges” practices, allowing for the management of user, group and system accounts, including privileged accounts.
• An IT Asset Management (ITAM) function, or similar function, categorizes assets according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data. | Secure Engineering & Architecture (SEA) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to utilize honeypots that are specifically designed to be the target of malicious attacks for the purpose of detecting, deflecting and analyzing such attacks. | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | T1068, T1210, T1211, T1212 | null | null | null | null | null | null | null | SC-26 | null | null | null | IR-4(13)
SC-26 | null | null | null | null | IR-4(13)
SC-26 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 3.13.3e | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | P.7 | null | null | null | null | null | null | null | null | null | null | null | TBD - 3.13.3e | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 8.L.F | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 23.5 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-4
R-EX-7
R-GV-1
R-GV-2
R-GV-4
R-GV-5 | null | null | R-AC-3 | R-AC-4 | R-AM-1 | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | null | R-BC-4 | null | null | null | null | null | null | null | R-EX-7 | R-GV-1 | R-GV-2 | null | R-GV-4 | R-GV-5 | null | null | null | null | null | null | null | null | null | NT-7
MT-1
MT-2
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | null | null | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Secure Engineering & Architecture | Honeyclients | SEA-12 | Mechanisms exist to utilize honeyclients that proactively seek to identify malicious websites and/or web-based malicious code. | null | null | Does the organization utilize honeyclients that proactively seek to identify malicious websites and/or web-based malicious code? | 3 | Protect | null | X | X | There is no evidence of a capability to utilize honeyclients that proactively seek to identify malicious websites and/ or web-based malicious code. | SP-CMM1 is N/A, since a structured process is required to utilize honeyclients that proactively seek to identify malicious websites and/ or web-based malicious code. | Secure Engineering & Architecture (SEA) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Architecture/engineering management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• A Change Advisory Board (CAB), or similar function, exists to govern changes to systems, applications and services, ensuring their stability, reliability and predictability.
• Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for architecture/engineering management.
• IT personnel implement secure engineering practices to protect the confidentiality, integrity, availability and safety of the organization’s technology assets, data and network(s).
• Technologies are configured to protect data with the strength and integrity commensurate with the classification or sensitivity of the information and mostly conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides), including cryptographic protections for sensitive/regulated data. | Secure Engineering & Architecture (SEA) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• IT/cybersecurity architects, or a similar function, enable the implementation a “layered defense” network architecture that enables a resilient defense-in-depth approach through the use of industry-recognized cybersecurity & data privacy practices in the specification, design, development, implementation and modification of systems and services (e.g., DISA STIGs, CIS Benchmarks or OEM security guides).
• IT/cybersecurity engineers, or a similar function, operationalize enterprise architecture, aligned with industry-recognized leading practices, with consideration for cybersecurity & data privacy principles, including resiliency expectations, that addresses risk to organizational operations, assets, individuals, other organizations.
• A Validated Architecture Design Review (VADR), or similar process, is used to evaluate design criteria for secure practices and conformance with requirements for applicable statutory, regulatory and contractual controls to determine if the system/application/service is designed, built and operated in a secure and resilient manner.
• A Change Advisory Board (CAB), or similar function, governs changes to systems, applications and services to ensure their stability, reliability and predictability.
• A formal Change Management (CM) program helps to ensure that no unauthorized changes are made, all changes are documented, services are not disrupted and resources are used efficiently.
• An Identity & Access Management (IAM) function, or similar function, enables the implementation of identification and access management controls for “least privileges” practices, allowing for the management of user, group and system accounts, including privileged accounts.
• An IT Asset Management (ITAM) function, or similar function, categorizes assets according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data. | Secure Engineering & Architecture (SEA) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to utilize honeyclients that proactively seek to identify malicious websites and/ or web-based malicious code. | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | T1068, T1210, T1211, T1212 | null | null | null | null | null | null | null | SC-35 | null | null | null | IR-4(13)
SC-35 | null | null | null | null | IR-4(13)
SC-35 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | P.7.5 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 8.L.F | SC-35 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 23.5 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-4
R-EX-7
R-GV-1
R-GV-2
R-GV-4
R-GV-5 | null | null | R-AC-3 | R-AC-4 | R-AM-1 | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | null | R-BC-4 | null | null | null | null | null | null | null | R-EX-7 | R-GV-1 | R-GV-2 | null | R-GV-4 | R-GV-5 | null | null | null | null | null | null | null | null | null | NT-7
MT-1
MT-2
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | null | null | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Secure Engineering & Architecture | Heterogeneity | SEA-13 | Mechanisms exist to utilize a diverse set of technologies for system components to reduce the impact of technical vulnerabilities from the same Original Equipment Manufacturer (OEM). | null | null | Does the organization utilize a diverse set of technologies for system components to reduce the impact of technical vulnerabilities from the same Original Equipment Manufacturer (OEM)? | 3 | Protect | null | X | X | There is no evidence of a capability to utilize a diverse set of technologies for system components to reduce the impact of technical vulnerabilities from the same Original Equipment Manufacturer (OEM). | SP-CMM1 is N/A, since a structured process is required to utilize a diverse set of technologies for system components to reduce the impact of technical vulnerabilities from the same Original Equipment Manufacturer (OEM). | Secure Engineering & Architecture (SEA) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Architecture/engineering management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• A Change Advisory Board (CAB), or similar function, exists to govern changes to systems, applications and services, ensuring their stability, reliability and predictability.
• Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for architecture/engineering management.
• IT personnel implement secure engineering practices to protect the confidentiality, integrity, availability and safety of the organization’s technology assets, data and network(s).
• Technologies are configured to protect data with the strength and integrity commensurate with the classification or sensitivity of the information and mostly conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides), including cryptographic protections for sensitive/regulated data. | Secure Engineering & Architecture (SEA) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• IT/cybersecurity architects, or a similar function, enable the implementation a “layered defense” network architecture that enables a resilient defense-in-depth approach through the use of industry-recognized cybersecurity & data privacy practices in the specification, design, development, implementation and modification of systems and services (e.g., DISA STIGs, CIS Benchmarks or OEM security guides).
• IT/cybersecurity engineers, or a similar function, operationalize enterprise architecture, aligned with industry-recognized leading practices, with consideration for cybersecurity & data privacy principles, including resiliency expectations, that addresses risk to organizational operations, assets, individuals, other organizations.
• A Validated Architecture Design Review (VADR), or similar process, is used to evaluate design criteria for secure practices and conformance with requirements for applicable statutory, regulatory and contractual controls to determine if the system/application/service is designed, built and operated in a secure and resilient manner.
• A Change Advisory Board (CAB), or similar function, governs changes to systems, applications and services to ensure their stability, reliability and predictability.
• A formal Change Management (CM) program helps to ensure that no unauthorized changes are made, all changes are documented, services are not disrupted and resources are used efficiently.
• An Identity & Access Management (IAM) function, or similar function, enables the implementation of identification and access management controls for “least privileges” practices, allowing for the management of user, group and system accounts, including privileged accounts.
• An IT Asset Management (ITAM) function, or similar function, categorizes assets according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data. | Secure Engineering & Architecture (SEA) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to utilize a diverse set of technologies for system components to reduce the impact of technical vulnerabilities from the same Original Equipment Manufacturer (OEM). | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | T1068, T1189, T1190, T1203, T1210, T1211, T1212 | null | null | null | null | null | null | null | SC-29 | null | null | null | SC-29 | null | null | null | null | SC-29 | null | null | null | null | null | SC-29 | null | null | null | SC-29 | SC-29 | null | null | null | null | 3.13.1e | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | T.8 | null | null | null | null | null | null | null | null | null | null | null | TBD - 3.13.1e | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-4
R-BC-5
R-EX-7
R-GV-1
R-GV-2
R-GV-4
R-GV-5
R-IR-1
R-IR-4 | R-AC-1 | R-AC-2 | R-AC-3 | R-AC-4 | R-AM-1 | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | null | R-BC-4 | R-BC-5 | null | null | null | null | null | null | R-EX-7 | R-GV-1 | R-GV-2 | null | R-GV-4 | R-GV-5 | null | null | null | R-IR-1 | null | null | R-IR-4 | null | null | NT-7
MT-1
MT-2
MT-7
MT-8
MT-9
MT-11
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | null | null | MT-7 | MT-8 | MT-9 | null | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Secure Engineering & Architecture | Virtualization Techniques | SEA-13.1 | Mechanisms exist to utilize virtualization techniques to support the employment of a diversity of operating systems and applications. | null | null | Does the organization utilize virtualization techniques to support the employment of a diversity of operating systems and applications? | 6 | Protect | null | X | X | There is no evidence of a capability to utilize virtualization techniques to support the employment of a diversity of operating systems and applications. | Secure Engineering & Architecture (SEA) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• IT personnel use an informal process to design, build and maintain secure solutions.
• IT /cyber engineering governance is decentralized, with the responsibility for implementing and testing cybersecurity & data privacy controls being assigned to the business process owner(s), including the definition and enforcement of roles and responsibilities. | Secure Engineering & Architecture (SEA) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Architecture/engineering management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• A Change Advisory Board (CAB), or similar function, exists to govern changes to systems, applications and services, ensuring their stability, reliability and predictability.
• Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for architecture/engineering management.
• IT personnel implement secure engineering practices to protect the confidentiality, integrity, availability and safety of the organization’s technology assets, data and network(s).
• Technologies are configured to protect data with the strength and integrity commensurate with the classification or sensitivity of the information and mostly conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides), including cryptographic protections for sensitive/regulated data. | Secure Engineering & Architecture (SEA) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• IT/cybersecurity architects, or a similar function, enable the implementation a “layered defense” network architecture that enables a resilient defense-in-depth approach through the use of industry-recognized cybersecurity & data privacy practices in the specification, design, development, implementation and modification of systems and services (e.g., DISA STIGs, CIS Benchmarks or OEM security guides).
• IT/cybersecurity engineers, or a similar function, operationalize enterprise architecture, aligned with industry-recognized leading practices, with consideration for cybersecurity & data privacy principles, including resiliency expectations, that addresses risk to organizational operations, assets, individuals, other organizations.
• A Validated Architecture Design Review (VADR), or similar process, is used to evaluate design criteria for secure practices and conformance with requirements for applicable statutory, regulatory and contractual controls to determine if the system/application/service is designed, built and operated in a secure and resilient manner.
• A Change Advisory Board (CAB), or similar function, governs changes to systems, applications and services to ensure their stability, reliability and predictability.
• A formal Change Management (CM) program helps to ensure that no unauthorized changes are made, all changes are documented, services are not disrupted and resources are used efficiently.
• An Identity & Access Management (IAM) function, or similar function, enables the implementation of identification and access management controls for “least privileges” practices, allowing for the management of user, group and system accounts, including privileged accounts.
• An IT Asset Management (ITAM) function, or similar function, categorizes assets according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data. | Secure Engineering & Architecture (SEA) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to utilize virtualization techniques to support the employment of a diversity of operating systems and applications. | null | null | null | null | null | null | null | null | null | IVS-01
IVS-04 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | SC-29(1) | null | null | null | SC-29(1) | null | null | null | null | SC-29(1) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 3.13.1e | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | D.16.4 | null | null | null | null | null | null | null | null | 5.10.3
5.10.3.2 | null | null | TBD - 3.13.1e | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 2.L.F | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | PSS-11 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 1460
1604
1605
1606
1607
1461 | null | null | null | null | null | null | null | null | null | null | null | null | null | 22.2.12.C.01
22.2.12.C.02
22.2.12.C.03
22.2.12.C.04
22.2.13.C.01
22.2.13.C.02
22.2.14.C.01
22.2.14.C.02
22.2.14.C.03
22.2.14.C.04
22.2.14.C.05
22.2.14.C.06
22.2.14.C.07
22.2.15.C.01
22.2.15.C.02
22.2.15.C.03
22.2.15.C.04
22.2.15.C.05
22.2.15.C.06
22.2.15.C.07
22.2.16.C.01
22.2.16.C.02
22.2.16.C.03 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-BC-1
R-BC-2
R-BC-4
R-BC-5
R-EX-7
R-GV-1
R-GV-2
R-GV-4
R-GV-5
R-IR-1
R-IR-4 | R-AC-1 | R-AC-2 | R-AC-3 | R-AC-4 | R-AM-1 | R-AM-2 | null | R-BC-1 | R-BC-2 | null | R-BC-4 | R-BC-5 | null | null | null | null | null | null | R-EX-7 | R-GV-1 | R-GV-2 | null | R-GV-4 | R-GV-5 | null | null | null | R-IR-1 | null | null | R-IR-4 | null | null | NT-7
MT-1
MT-2
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | null | null | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Secure Engineering & Architecture | Concealment & Misdirection | SEA-14 | Mechanisms exist to utilize concealment and misdirection techniques for systems to confuse and mislead adversaries. | null | null | Does the organization utilize concealment and misdirection techniques for systems to confuse and mislead adversaries? | 2 | Protect | null | X | X | There is no evidence of a capability to utilize concealment and misdirection techniques for systems to confuse and mislead adversaries. | Secure Engineering & Architecture (SEA) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• IT personnel use an informal process to design, build and maintain secure solutions.
• IT /cyber engineering governance is decentralized, with the responsibility for implementing and testing cybersecurity & data privacy controls being assigned to the business process owner(s), including the definition and enforcement of roles and responsibilities. | Secure Engineering & Architecture (SEA) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Architecture/engineering management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• A Change Advisory Board (CAB), or similar function, exists to govern changes to systems, applications and services, ensuring their stability, reliability and predictability.
• Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for architecture/engineering management.
• IT personnel implement secure engineering practices to protect the confidentiality, integrity, availability and safety of the organization’s technology assets, data and network(s).
• Technologies are configured to protect data with the strength and integrity commensurate with the classification or sensitivity of the information and mostly conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides), including cryptographic protections for sensitive/regulated data. | Secure Engineering & Architecture (SEA) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• IT/cybersecurity architects, or a similar function, enable the implementation a “layered defense” network architecture that enables a resilient defense-in-depth approach through the use of industry-recognized cybersecurity & data privacy practices in the specification, design, development, implementation and modification of systems and services (e.g., DISA STIGs, CIS Benchmarks or OEM security guides).
• IT/cybersecurity engineers, or a similar function, operationalize enterprise architecture, aligned with industry-recognized leading practices, with consideration for cybersecurity & data privacy principles, including resiliency expectations, that addresses risk to organizational operations, assets, individuals, other organizations.
• A Validated Architecture Design Review (VADR), or similar process, is used to evaluate design criteria for secure practices and conformance with requirements for applicable statutory, regulatory and contractual controls to determine if the system/application/service is designed, built and operated in a secure and resilient manner.
• A Change Advisory Board (CAB), or similar function, governs changes to systems, applications and services to ensure their stability, reliability and predictability.
• A formal Change Management (CM) program helps to ensure that no unauthorized changes are made, all changes are documented, services are not disrupted and resources are used efficiently.
• An Identity & Access Management (IAM) function, or similar function, enables the implementation of identification and access management controls for “least privileges” practices, allowing for the management of user, group and system accounts, including privileged accounts.
• An IT Asset Management (ITAM) function, or similar function, categorizes assets according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data. | See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to utilize concealment and misdirection techniques for systems to confuse and mislead adversaries. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to utilize concealment and misdirection techniques for systems to confuse and mislead adversaries. | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | T1068, T1189, T1190, T1203, T1210, T1211, T1212 | null | null | null | null | null | null | null | SC-30 | null | null | null | SC-30
SC-30(4)
SC-30(5) | null | null | null | null | SC-30 | null | null | null | null | null | SC-30
SC-30(4)
SC-30(5) | null | null | null | SC-30
SC-30(4)
SC-30(5) | SC-30
SC-30(4)
SC-30(5) | null | null | null | null | 3.13.3e | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | O.47 | null | null | null | null | null | null | null | null | null | null | null | TBD - 3.13.3e | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | R-AM-3
R-BC-2
R-BC-4 | null | null | null | null | null | null | R-AM-3 | null | R-BC-2 | null | R-BC-4 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | NT-7
MT-1
MT-2
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | null | null | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Secure Engineering & Architecture | Randomness | SEA-14.1 | Automated mechanisms exist to introduce randomness into organizational operations and assets. | null | null | Does the organization use automated mechanisms to introduce randomness into organizational operations and assets? | 5 | Protect | null | X | X | There is no evidence of a capability to introduce randomness into organizational operations and assets. | SP-CMM1 is N/A, since a structured process is required to introduce randomness into organizational operations and assets. | SP-CMM2 is N/A, since a well-defined process is required to introduce randomness into organizational operations and assets. | Secure Engineering & Architecture (SEA) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• IT/cybersecurity architects, or a similar function, enable the implementation a “layered defense” network architecture that enables a resilient defense-in-depth approach through the use of industry-recognized cybersecurity & data privacy practices in the specification, design, development, implementation and modification of systems and services (e.g., DISA STIGs, CIS Benchmarks or OEM security guides).
• IT/cybersecurity engineers, or a similar function, operationalize enterprise architecture, aligned with industry-recognized leading practices, with consideration for cybersecurity & data privacy principles, including resiliency expectations, that addresses risk to organizational operations, assets, individuals, other organizations.
• A Validated Architecture Design Review (VADR), or similar process, is used to evaluate design criteria for secure practices and conformance with requirements for applicable statutory, regulatory and contractual controls to determine if the system/application/service is designed, built and operated in a secure and resilient manner.
• A Change Advisory Board (CAB), or similar function, governs changes to systems, applications and services to ensure their stability, reliability and predictability.
• A formal Change Management (CM) program helps to ensure that no unauthorized changes are made, all changes are documented, services are not disrupted and resources are used efficiently.
• An Identity & Access Management (IAM) function, or similar function, enables the implementation of identification and access management controls for “least privileges” practices, allowing for the management of user, group and system accounts, including privileged accounts.
• An IT Asset Management (ITAM) function, or similar function, categorizes assets according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data. | See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to introduce randomness into organizational operations and assets. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to introduce randomness into organizational operations and assets. | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | SC-30(2) | null | null | null | SC-30(2) | null | null | null | null | SC-30(2) | null | null | null | null | null | SC-30(2) | null | null | null | SC-30(2) | SC-30(2) | null | null | null | null | 3.13.2e
3.13.3e | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | I.2.11.9 | null | null | null | null | null | null | null | null | null | null | null | TBD - 3.13.2e
TBD - 3.13.3e | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | R-AM-3
R-BC-2
R-BC-4 | null | null | null | null | null | null | R-AM-3 | null | R-BC-2 | null | R-BC-4 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | NT-1
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14 | NT-1 | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | NT-9 | NT-10 | NT-11 | NT-12 | NT-13 | NT-14 | MT-1 | MT-2 | MT-3 | MT-4 | MT-5 | MT-6 | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | null | null | null |
Secure Engineering & Architecture | Change Processing & Storage Locations | SEA-14.2 | Automated mechanisms exist to change the location of processing and/or storage at random time intervals. | null | null | Does the organization use automated mechanisms to change the location of processing and/or storage at random time intervals? | 5 | Protect | null | X | X | There is no evidence of a capability to change the location of processing and/ or storage at random time intervals. | SP-CMM1 is N/A, since a structured process is required to change the location of processing and/ or storage at random time intervals. | SP-CMM2 is N/A, since a well-defined process is required to change the location of processing and/ or storage at random time intervals. | Secure Engineering & Architecture (SEA) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• IT/cybersecurity architects, or a similar function, enable the implementation a “layered defense” network architecture that enables a resilient defense-in-depth approach through the use of industry-recognized cybersecurity & data privacy practices in the specification, design, development, implementation and modification of systems and services (e.g., DISA STIGs, CIS Benchmarks or OEM security guides).
• IT/cybersecurity engineers, or a similar function, operationalize enterprise architecture, aligned with industry-recognized leading practices, with consideration for cybersecurity & data privacy principles, including resiliency expectations, that addresses risk to organizational operations, assets, individuals, other organizations.
• A Validated Architecture Design Review (VADR), or similar process, is used to evaluate design criteria for secure practices and conformance with requirements for applicable statutory, regulatory and contractual controls to determine if the system/application/service is designed, built and operated in a secure and resilient manner.
• A Change Advisory Board (CAB), or similar function, governs changes to systems, applications and services to ensure their stability, reliability and predictability.
• A formal Change Management (CM) program helps to ensure that no unauthorized changes are made, all changes are documented, services are not disrupted and resources are used efficiently.
• An Identity & Access Management (IAM) function, or similar function, enables the implementation of identification and access management controls for “least privileges” practices, allowing for the management of user, group and system accounts, including privileged accounts.
• An IT Asset Management (ITAM) function, or similar function, categorizes assets according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data. | See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to change the location of processing and/ or storage at random time intervals. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to change the location of processing and/ or storage at random time intervals. | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | SC-30(3) | null | null | null | SC-30(3) | null | null | null | null | SC-30(3) | null | null | null | null | null | SC-30(3) | null | null | null | SC-30(3) | SC-30(3) | null | null | null | null | 3.13.5e | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | D.3 | null | null | null | null | null | null | null | null | null | null | null | TBD - 3.13.5e | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | R-AM-3
R-BC-2
R-BC-4 | null | null | null | null | null | null | R-AM-3 | null | R-BC-2 | null | R-BC-4 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | NT-1
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14 | NT-1 | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | NT-9 | NT-10 | NT-11 | NT-12 | NT-13 | NT-14 | MT-1 | MT-2 | MT-3 | MT-4 | MT-5 | MT-6 | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | null | null | null |
Secure Engineering & Architecture | Distributed Processing & Storage | SEA-15 | Mechanisms exist to distribute processing and storage across multiple physical locations. | null | null | Does the organization distribute processing and storage across multiple physical locations? | 4 | Protect | null | X | X | There is no evidence of a capability to distribute processing and storage across multiple physical locations. | Secure Engineering & Architecture (SEA) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• IT personnel use an informal process to design, build and maintain secure solutions.
• IT /cyber engineering governance is decentralized, with the responsibility for implementing and testing cybersecurity & data privacy controls being assigned to the business process owner(s), including the definition and enforcement of roles and responsibilities. | Secure Engineering & Architecture (SEA) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Architecture/engineering management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• A Change Advisory Board (CAB), or similar function, exists to govern changes to systems, applications and services, ensuring their stability, reliability and predictability.
• Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for architecture/engineering management.
• IT personnel implement secure engineering practices to protect the confidentiality, integrity, availability and safety of the organization’s technology assets, data and network(s).
• Technologies are configured to protect data with the strength and integrity commensurate with the classification or sensitivity of the information and mostly conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides), including cryptographic protections for sensitive/regulated data. | Secure Engineering & Architecture (SEA) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• IT/cybersecurity architects, or a similar function, enable the implementation a “layered defense” network architecture that enables a resilient defense-in-depth approach through the use of industry-recognized cybersecurity & data privacy practices in the specification, design, development, implementation and modification of systems and services (e.g., DISA STIGs, CIS Benchmarks or OEM security guides).
• IT/cybersecurity engineers, or a similar function, operationalize enterprise architecture, aligned with industry-recognized leading practices, with consideration for cybersecurity & data privacy principles, including resiliency expectations, that addresses risk to organizational operations, assets, individuals, other organizations.
• A Validated Architecture Design Review (VADR), or similar process, is used to evaluate design criteria for secure practices and conformance with requirements for applicable statutory, regulatory and contractual controls to determine if the system/application/service is designed, built and operated in a secure and resilient manner.
• A Change Advisory Board (CAB), or similar function, governs changes to systems, applications and services to ensure their stability, reliability and predictability.
• A formal Change Management (CM) program helps to ensure that no unauthorized changes are made, all changes are documented, services are not disrupted and resources are used efficiently.
• An Identity & Access Management (IAM) function, or similar function, enables the implementation of identification and access management controls for “least privileges” practices, allowing for the management of user, group and system accounts, including privileged accounts.
• An IT Asset Management (ITAM) function, or similar function, categorizes assets according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data. | Secure Engineering & Architecture (SEA) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to distribute processing and storage across multiple physical locations. | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | T1070, T1070.001, T1070.002, T1119, T1565, T1565.001 | null | null | null | null | null | null | null | SC-36 | null | null | null | PE-23
SC-36 | null | null | null | null | PE-23
SC-36 | null | null | null | null | null | SC-36 | null | SC-36 | null | SC-36 | SC-36 | null | null | null | null | 3.13.5e | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | K.21 | null | null | null | null | null | null | EC:SG3.SP2 | null | null | null | null | TBD - 3.13.5e | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Art 6.1
Art 26.1
Art 26.2
Art 26.3
Art 28.1
Art 28.2
Art 28.3
Art 28.4
Art 28.5
Art 28.6
Art 28.9
Art 28.10
Art 29
Art 44
Art 45.1
Art 45.2
Art 46.1
Art 46.2
Art 46.3
Art 47.1
Art 47.2
Art 48
Art 49.1
Art 49.2
Art 49.6 | null | null | null | Sec 10 | Chapter 4 - Art 16 | Art 14
Art 16
Art 27 | Art 41 | null | Art 34 | null | null | null | null | Sec 7 | Sec 2 | null | Sec 16
Sec 17 | Sec 31 | null | Art 3
Art 4 | Sec 12
Sec 13
Sec 14 | null | Sec 13
Sec 14 | Art 1
Art 36 | Art 14
Art 15 | null | Art 7 | null | null | null | null | null | null | null | Sec 19
Sec 21 | null | null | Sec 31 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Art 1 | Article 20 | null | Sec 9 | null | null | null | Sec 25 | Sec 24
Sec 26 | null | null | Art 17
Art 27 | null | Art 9
Art 26 | null | null | null | null | null | null | Sec 20 | Art 7 | Art 26 | null | null | null | null | null | null | null | x | null | null | null | R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-GV-1
R-GV-2
R-GV-4
R-GV-5 | null | null | null | null | null | null | R-AM-3 | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | null | R-GV-1 | R-GV-2 | null | R-GV-4 | R-GV-5 | null | null | null | null | null | null | null | null | null | NT-1
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | NT-1 | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | NT-9 | NT-10 | NT-11 | NT-12 | NT-13 | NT-14 | MT-1 | MT-2 | MT-3 | MT-4 | MT-5 | MT-6 | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Secure Engineering & Architecture | Non-Modifiable Executable Programs | SEA-16 | Mechanisms exist to utilize non-modifiable executable programs that load and execute the operating environment and applications from hardware-enforced, read-only media. | null | null | Does the organization utilize non-modifiable executable programs that load and execute the operating environment and applications from hardware-enforced, read-only media? | 1 | Protect | null | null | X | There is no evidence of a capability to utilize non-modifiable executable programs that load and execute the operating environment and applications from hardware-enforced, read-only media. | Secure Engineering & Architecture (SEA) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• IT personnel use an informal process to design, build and maintain secure solutions.
• IT /cyber engineering governance is decentralized, with the responsibility for implementing and testing cybersecurity & data privacy controls being assigned to the business process owner(s), including the definition and enforcement of roles and responsibilities. | Secure Engineering & Architecture (SEA) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Architecture/engineering management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• A Change Advisory Board (CAB), or similar function, exists to govern changes to systems, applications and services, ensuring their stability, reliability and predictability.
• Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for architecture/engineering management.
• IT personnel implement secure engineering practices to protect the confidentiality, integrity, availability and safety of the organization’s technology assets, data and network(s).
• Technologies are configured to protect data with the strength and integrity commensurate with the classification or sensitivity of the information and mostly conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides), including cryptographic protections for sensitive/regulated data. | Secure Engineering & Architecture (SEA) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• IT/cybersecurity architects, or a similar function, enable the implementation a “layered defense” network architecture that enables a resilient defense-in-depth approach through the use of industry-recognized cybersecurity & data privacy practices in the specification, design, development, implementation and modification of systems and services (e.g., DISA STIGs, CIS Benchmarks or OEM security guides).
• IT/cybersecurity engineers, or a similar function, operationalize enterprise architecture, aligned with industry-recognized leading practices, with consideration for cybersecurity & data privacy principles, including resiliency expectations, that addresses risk to organizational operations, assets, individuals, other organizations.
• A Validated Architecture Design Review (VADR), or similar process, is used to evaluate design criteria for secure practices and conformance with requirements for applicable statutory, regulatory and contractual controls to determine if the system/application/service is designed, built and operated in a secure and resilient manner.
• A Change Advisory Board (CAB), or similar function, governs changes to systems, applications and services to ensure their stability, reliability and predictability.
• A formal Change Management (CM) program helps to ensure that no unauthorized changes are made, all changes are documented, services are not disrupted and resources are used efficiently.
• An Identity & Access Management (IAM) function, or similar function, enables the implementation of identification and access management controls for “least privileges” practices, allowing for the management of user, group and system accounts, including privileged accounts.
• An IT Asset Management (ITAM) function, or similar function, categorizes assets according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data. | Secure Engineering & Architecture (SEA) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to utilize non-modifiable executable programs that load and execute the operating environment and applications from hardware-enforced, read-only media. | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | T1047, T1195.003, T1542, T1542.001, T1542.003, T1542.004, T1542.005, T1548, T1548.004, T1553, T1553.006, T1601, T1601.001, T1601.002, T1611 | null | null | null | null | null | null | null | SC-34 | null | null | null | SC-34 | null | null | null | null | SC-34 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | N.1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 8-302
8-304
8-311 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | R-AM-3
R-BC-2
R-BC-4 | null | null | null | null | null | null | R-AM-3 | null | R-BC-2 | null | R-BC-4 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | NT-7
MT-1
MT-2
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | null | null | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Secure Engineering & Architecture | Secure Log-On Procedures | SEA-17 | Mechanisms exist to utilize a trusted communications path between the user and the security functions of the system. | - Active Directory (AD) Ctrl+Alt+Del login process | null | Does the organization utilize a trusted communications path between the user and the security functions of the system? | 8 | Protect | null | X | X | There is no evidence of a capability to utilize a trusted communications path between the user and the security functions of the system. | Secure Engineering & Architecture (SEA) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• IT personnel use an informal process to design, build and maintain secure solutions.
• IT /cyber engineering governance is decentralized, with the responsibility for implementing and testing cybersecurity & data privacy controls being assigned to the business process owner(s), including the definition and enforcement of roles and responsibilities. | Secure Engineering & Architecture (SEA) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Architecture/engineering management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• A Change Advisory Board (CAB), or similar function, exists to govern changes to systems, applications and services, ensuring their stability, reliability and predictability.
• Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for architecture/engineering management.
• IT personnel implement secure engineering practices to protect the confidentiality, integrity, availability and safety of the organization’s technology assets, data and network(s).
• Technologies are configured to protect data with the strength and integrity commensurate with the classification or sensitivity of the information and mostly conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides), including cryptographic protections for sensitive/regulated data. | Secure Engineering & Architecture (SEA) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• IT/cybersecurity architects, or a similar function, enable the implementation a “layered defense” network architecture that enables a resilient defense-in-depth approach through the use of industry-recognized cybersecurity & data privacy practices in the specification, design, development, implementation and modification of systems and services (e.g., DISA STIGs, CIS Benchmarks or OEM security guides).
• IT/cybersecurity engineers, or a similar function, operationalize enterprise architecture, aligned with industry-recognized leading practices, with consideration for cybersecurity & data privacy principles, including resiliency expectations, that addresses risk to organizational operations, assets, individuals, other organizations.
• A Validated Architecture Design Review (VADR), or similar process, is used to evaluate design criteria for secure practices and conformance with requirements for applicable statutory, regulatory and contractual controls to determine if the system/application/service is designed, built and operated in a secure and resilient manner.
• A Change Advisory Board (CAB), or similar function, governs changes to systems, applications and services to ensure their stability, reliability and predictability.
• A formal Change Management (CM) program helps to ensure that no unauthorized changes are made, all changes are documented, services are not disrupted and resources are used efficiently.
• An Identity & Access Management (IAM) function, or similar function, enables the implementation of identification and access management controls for “least privileges” practices, allowing for the management of user, group and system accounts, including privileged accounts.
• An IT Asset Management (ITAM) function, or similar function, categorizes assets according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data. | Secure Engineering & Architecture (SEA) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to utilize a trusted communications path between the user and the security functions of the system. | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 9.4.2 | 8.5 | 9.4.2 | null | 6.6.4.2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | H.3 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 7.2.6 [OP.ACC.6] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 9.4.2
9.4.2.2.B | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | null | null | x | R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-4
R-BC-5
R-EX-7
R-GV-1
R-GV-2
R-GV-4
R-GV-5
R-IR-1
R-IR-4 | R-AC-1 | R-AC-2 | R-AC-3 | R-AC-4 | R-AM-1 | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | null | R-BC-4 | R-BC-5 | null | null | null | null | null | null | R-EX-7 | R-GV-1 | R-GV-2 | null | R-GV-4 | R-GV-5 | null | null | null | R-IR-1 | null | null | R-IR-4 | null | null | NT-7
MT-1
MT-2
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | null | null | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Secure Engineering & Architecture | System Use Notification (Logon Banner) | SEA-18 | Mechanisms exist to utilize system use notification / logon banners that display an approved system use notification message or banner before granting access to the system that provides cybersecurity & data privacy notices. | - Logon banner
- System use notifications
- CimTrak Integrity Suite (https://www.cimcor.com/cimtrak/)
- NNT Change Tracker (https://www.newnettechnologies.com) | null | Does the organization utilize system use notification / logon banners that display an approved system use notification message or banner before granting access to the system that provides cybersecurity & data privacy notices? | 9 | Protect | null | X | X | There is no evidence of a capability to utilize system use notification / log on banners that display an approved system use notification message or banner before granting access to the system that provides data privacy and security notices. | SP-CMM1 is N/A, since a structured process is required to utilize system use notification / log on banners that display an approved system use notification message or banner before granting access to the system that provides data privacy and security notices. | Secure Engineering & Architecture (SEA) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Architecture/engineering management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• A Change Advisory Board (CAB), or similar function, exists to govern changes to systems, applications and services, ensuring their stability, reliability and predictability.
• Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for architecture/engineering management.
• IT personnel implement secure engineering practices to protect the confidentiality, integrity, availability and safety of the organization’s technology assets, data and network(s).
• Technologies are configured to protect data with the strength and integrity commensurate with the classification or sensitivity of the information and mostly conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides), including cryptographic protections for sensitive/regulated data. | Secure Engineering & Architecture (SEA) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• IT/cybersecurity architects, or a similar function, enable the implementation a “layered defense” network architecture that enables a resilient defense-in-depth approach through the use of industry-recognized cybersecurity & data privacy practices in the specification, design, development, implementation and modification of systems and services (e.g., DISA STIGs, CIS Benchmarks or OEM security guides).
• IT/cybersecurity engineers, or a similar function, operationalize enterprise architecture, aligned with industry-recognized leading practices, with consideration for cybersecurity & data privacy principles, including resiliency expectations, that addresses risk to organizational operations, assets, individuals, other organizations.
• A Validated Architecture Design Review (VADR), or similar process, is used to evaluate design criteria for secure practices and conformance with requirements for applicable statutory, regulatory and contractual controls to determine if the system/application/service is designed, built and operated in a secure and resilient manner.
• A Change Advisory Board (CAB), or similar function, governs changes to systems, applications and services to ensure their stability, reliability and predictability.
• A formal Change Management (CM) program helps to ensure that no unauthorized changes are made, all changes are documented, services are not disrupted and resources are used efficiently.
• An Identity & Access Management (IAM) function, or similar function, enables the implementation of identification and access management controls for “least privileges” practices, allowing for the management of user, group and system accounts, including privileged accounts.
• An IT Asset Management (ITAM) function, or similar function, categorizes assets according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data. | Secure Engineering & Architecture (SEA) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to utilize system use notification / log on banners that display an approved system use notification message or banner before granting access to the system that provides data privacy and security notices. | null | null | null | null | null | null | null | null | null | null | null | null | null | CR 1.12 (5.14.1) | null | null | null | null | null | null | null | null | null | null | null | null | T1199 | null | null | null | null | null | null | null | AC-8 | AC-8 | AC-8 | AC-8 | AC-8 | null | AC-8 | AC-8 | AC-8 | null | null | AC-8 | AC-8 | AC-8 | null | null | null | null | null | null | null | 3.1.9 | 3.1.9 | 3.1.9[a]
3.1.9[b] | A.03.01.09 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | H.6.7 | null | null | null | null | null | null | TM:SG4.SP1 | null | 5.5.4 | null | AC.L2-3.1.9 | AC.L2-3.1.9 | null | AC.L2-3.1.9 | AC.L2-3.1.9 | AC-8 | null | null | null | null | null | null | null | AC-8 | AC-8 | AC-8 | AC-8 | AC-8 | AC-8 | AC-8 | AC-8 | AC-8 | AC-8 | null | null | null | null | null | null | null | null | null | AC-8 | null | null | 8-609 | 18.6
19.6 | null | null | null | null | 5.10 | AC-8 | AC-8 | AC-8 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | AC-8 | AC-8 | AC-8 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0408
0979 | null | null | null | null | null | null | null | null | null | null | null | null | null | 16.1.48.C.01
16.1.48.C.02
16.1.48.C.03 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | R-AM-3
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-SA-2 | null | null | null | null | null | null | R-AM-3 | null | null | null | null | null | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | null | null | null | null | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | null | null | null | null | null | null | R-SA-2 | NT-7
MT-1
MT-2
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | null | null | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Secure Engineering & Architecture | Standardized Microsoft Windows Banner | SEA-18.1 | Mechanisms exist to configure Microsoft Windows-based systems to display an approved logon banner before granting access to the system that provides cybersecurity & data privacy notices. | - Active Directory (AD) Ctrl+Alt+Del login process
- CimTrak Integrity Suite (https://www.cimcor.com/cimtrak/)
- NNT Change Tracker (https://www.newnettechnologies.com) | null | Does the organization configure Microsoft Windows-based systems to display an approved logon banner before granting access to the system that provides cybersecurity & data privacy notices? | 9 | Protect | null | X | X | There is no evidence of a capability to configure Microsoft Windows-based systems to display an approved log on banner before granting access to the system that provides data privacy and security notices. | SP-CMM1 is N/A, since a structured process is required to configure Microsoft Windows-based systems to display an approved log on banner before granting access to the system that provides data privacy and security notices. | Secure Engineering & Architecture (SEA) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Architecture/engineering management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• A Change Advisory Board (CAB), or similar function, exists to govern changes to systems, applications and services, ensuring their stability, reliability and predictability.
• Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for architecture/engineering management.
• IT personnel implement secure engineering practices to protect the confidentiality, integrity, availability and safety of the organization’s technology assets, data and network(s).
• Technologies are configured to protect data with the strength and integrity commensurate with the classification or sensitivity of the information and mostly conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides), including cryptographic protections for sensitive/regulated data. | Secure Engineering & Architecture (SEA) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• IT/cybersecurity architects, or a similar function, enable the implementation a “layered defense” network architecture that enables a resilient defense-in-depth approach through the use of industry-recognized cybersecurity & data privacy practices in the specification, design, development, implementation and modification of systems and services (e.g., DISA STIGs, CIS Benchmarks or OEM security guides).
• IT/cybersecurity engineers, or a similar function, operationalize enterprise architecture, aligned with industry-recognized leading practices, with consideration for cybersecurity & data privacy principles, including resiliency expectations, that addresses risk to organizational operations, assets, individuals, other organizations.
• A Validated Architecture Design Review (VADR), or similar process, is used to evaluate design criteria for secure practices and conformance with requirements for applicable statutory, regulatory and contractual controls to determine if the system/application/service is designed, built and operated in a secure and resilient manner.
• A Change Advisory Board (CAB), or similar function, governs changes to systems, applications and services to ensure their stability, reliability and predictability.
• A formal Change Management (CM) program helps to ensure that no unauthorized changes are made, all changes are documented, services are not disrupted and resources are used efficiently.
• An Identity & Access Management (IAM) function, or similar function, enables the implementation of identification and access management controls for “least privileges” practices, allowing for the management of user, group and system accounts, including privileged accounts.
• An IT Asset Management (ITAM) function, or similar function, categorizes assets according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data. | Secure Engineering & Architecture (SEA) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to configure Microsoft Windows-based systems to display an approved log on banner before granting access to the system that provides data privacy and security notices. | null | null | null | null | null | null | null | null | null | null | null | null | null | CR 1.12 (5.14.1) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 3.1.9 | 3.1.9 | 3.1.9[a]
3.1.9[b] | A.03.01.09 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | H.6.13 | null | null | null | null | null | null | null | null | 5.5.4 | null | AC.L2-3.1.9 | null | null | AC.L2-3.1.9 | AC.L2-3.1.9 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 5.10 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0408
0979 | null | null | null | null | null | null | null | null | null | null | null | null | null | 16.1.48.C.01
16.1.48.C.02
16.1.48.C.03 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | R-AM-3
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-SA-2 | null | null | null | null | null | null | R-AM-3 | null | null | null | null | null | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | null | null | null | null | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | null | null | null | null | null | null | R-SA-2 | NT-7
MT-1
MT-2
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | null | null | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Secure Engineering & Architecture | Truncated Banner | SEA-18.2 | Mechanisms exist to utilize a truncated system use notification / logon banner on systems not capable of displaying a logon banner from a centralized source, such as Active Directory. | - Logon banner
- System use notifications
- CimTrak Integrity Suite (https://www.cimcor.com/cimtrak/)
- NNT Change Tracker (https://www.newnettechnologies.com) | null | Does the organization utilize a truncated system use notification / logon banner on systems not capable of displaying a logon banner from a centralized source, such as Active Directory? | 9 | Protect | null | X | X | There is no evidence of a capability to utilize a truncated system use notification / log on banner on systems not capable of displaying a log on banner from a centralized source, such as Active Directory. | SP-CMM1 is N/A, since a structured process is required to utilize a truncated system use notification / log on banner on systems not capable of displaying a log on banner from a centralized source, such as Active Directory. | Secure Engineering & Architecture (SEA) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Architecture/engineering management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• A Change Advisory Board (CAB), or similar function, exists to govern changes to systems, applications and services, ensuring their stability, reliability and predictability.
• Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for architecture/engineering management.
• IT personnel implement secure engineering practices to protect the confidentiality, integrity, availability and safety of the organization’s technology assets, data and network(s).
• Technologies are configured to protect data with the strength and integrity commensurate with the classification or sensitivity of the information and mostly conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides), including cryptographic protections for sensitive/regulated data. | Secure Engineering & Architecture (SEA) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• IT/cybersecurity architects, or a similar function, enable the implementation a “layered defense” network architecture that enables a resilient defense-in-depth approach through the use of industry-recognized cybersecurity & data privacy practices in the specification, design, development, implementation and modification of systems and services (e.g., DISA STIGs, CIS Benchmarks or OEM security guides).
• IT/cybersecurity engineers, or a similar function, operationalize enterprise architecture, aligned with industry-recognized leading practices, with consideration for cybersecurity & data privacy principles, including resiliency expectations, that addresses risk to organizational operations, assets, individuals, other organizations.
• A Validated Architecture Design Review (VADR), or similar process, is used to evaluate design criteria for secure practices and conformance with requirements for applicable statutory, regulatory and contractual controls to determine if the system/application/service is designed, built and operated in a secure and resilient manner.
• A Change Advisory Board (CAB), or similar function, governs changes to systems, applications and services to ensure their stability, reliability and predictability.
• A formal Change Management (CM) program helps to ensure that no unauthorized changes are made, all changes are documented, services are not disrupted and resources are used efficiently.
• An Identity & Access Management (IAM) function, or similar function, enables the implementation of identification and access management controls for “least privileges” practices, allowing for the management of user, group and system accounts, including privileged accounts.
• An IT Asset Management (ITAM) function, or similar function, categorizes assets according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data. | Secure Engineering & Architecture (SEA) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to utilize a truncated system use notification / log on banner on systems not capable of displaying a log on banner from a centralized source, such as Active Directory. | null | null | null | null | null | null | null | null | null | null | null | null | null | CR 1.12 (5.14.1) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 3.1.9 | 3.1.9 | 3.1.9[a]
3.1.9[b] | A.03.01.09 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | H.6.12 | null | null | null | null | null | null | null | null | 5.5.4 | null | AC.L2-3.1.9 | null | null | AC.L2-3.1.9 | AC.L2-3.1.9 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 5.10 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0408
0979 | null | null | null | null | null | null | null | null | null | null | null | null | null | 16.1.48.C.01
16.1.48.C.02
16.1.48.C.03 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | R-AM-3
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-SA-2 | null | null | null | null | null | null | R-AM-3 | null | null | null | null | null | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | null | null | null | null | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | null | null | null | null | null | null | R-SA-2 | NT-7
MT-1
MT-2
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | null | null | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Secure Engineering & Architecture | Previous Logon Notification | SEA-19 | Mechanisms exist to configure systems that process, store or transmit sensitive/regulated data to notify the user, upon successful logon, of the number of unsuccessful logon attempts since the last successful logon. | - Network Time Protocol (NTP) | null | Does the organization configure systems that process, store or transmit sensitive/regulated data to notify the user, upon successful logon, of the number of unsuccessful logon attempts since the last successful logon? | 3 | Protect | null | null | X | There is no evidence of a capability to configure systems that process, store or transmit sensitive/regulated data to notify the user, up on successful logon, of the number of unsuccessful log on attempts since the last successful logon. | Secure Engineering & Architecture (SEA) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• IT personnel use an informal process to design, build and maintain secure solutions.
• IT /cyber engineering governance is decentralized, with the responsibility for implementing and testing cybersecurity & data privacy controls being assigned to the business process owner(s), including the definition and enforcement of roles and responsibilities. | Secure Engineering & Architecture (SEA) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Architecture/engineering management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• A Change Advisory Board (CAB), or similar function, exists to govern changes to systems, applications and services, ensuring their stability, reliability and predictability.
• Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for architecture/engineering management.
• IT personnel implement secure engineering practices to protect the confidentiality, integrity, availability and safety of the organization’s technology assets, data and network(s).
• Technologies are configured to protect data with the strength and integrity commensurate with the classification or sensitivity of the information and mostly conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides), including cryptographic protections for sensitive/regulated data. | Secure Engineering & Architecture (SEA) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• IT/cybersecurity architects, or a similar function, enable the implementation a “layered defense” network architecture that enables a resilient defense-in-depth approach through the use of industry-recognized cybersecurity & data privacy practices in the specification, design, development, implementation and modification of systems and services (e.g., DISA STIGs, CIS Benchmarks or OEM security guides).
• IT/cybersecurity engineers, or a similar function, operationalize enterprise architecture, aligned with industry-recognized leading practices, with consideration for cybersecurity & data privacy principles, including resiliency expectations, that addresses risk to organizational operations, assets, individuals, other organizations.
• A Validated Architecture Design Review (VADR), or similar process, is used to evaluate design criteria for secure practices and conformance with requirements for applicable statutory, regulatory and contractual controls to determine if the system/application/service is designed, built and operated in a secure and resilient manner.
• A Change Advisory Board (CAB), or similar function, governs changes to systems, applications and services to ensure their stability, reliability and predictability.
• A formal Change Management (CM) program helps to ensure that no unauthorized changes are made, all changes are documented, services are not disrupted and resources are used efficiently.
• An Identity & Access Management (IAM) function, or similar function, enables the implementation of identification and access management controls for “least privileges” practices, allowing for the management of user, group and system accounts, including privileged accounts.
• An IT Asset Management (ITAM) function, or similar function, categorizes assets according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data. | Secure Engineering & Architecture (SEA) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to configure systems that process, store or transmit sensitive/regulated data to notify the user, up on successful logon, of the number of unsuccessful log on attempts since the last successful logon. | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | AC-9 | null | null | null | AC-9 | null | null | null | null | AC-9 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | H.13 | null | null | null | null | null | null | TM:SG4.SP1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 8-609 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 16.1.49.C.01
16.1.50.C.01
16.1.50.C.02 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | R-AM-3
R-IR-1
R-SA-1 | null | null | null | null | null | null | R-AM-3 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | R-IR-1 | null | null | null | R-SA-1 | null | NT-7
MT-1
MT-2
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | null | null | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Secure Engineering & Architecture | Clock Synchronization | SEA-20 | Mechanisms exist to utilize time-synchronization technology to synchronize all critical system clocks. | - Network Time Protocol (NTP) | null | Does the organization utilize time-synchronization technology to synchronize all critical system clocks? | 9 | Protect | null | null | X | There is no evidence of a capability to utilize time-synchronization technology to synchronize all critical system clocks. | Secure Engineering & Architecture (SEA) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• IT personnel use an informal process to design, build and maintain secure solutions.
• IT /cyber engineering governance is decentralized, with the responsibility for implementing and testing cybersecurity & data privacy controls being assigned to the business process owner(s), including the definition and enforcement of roles and responsibilities. | Secure Engineering & Architecture (SEA) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Architecture/engineering management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• A Change Advisory Board (CAB), or similar function, exists to govern changes to systems, applications and services, ensuring their stability, reliability and predictability.
• Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for architecture/engineering management.
• IT personnel implement secure engineering practices to protect the confidentiality, integrity, availability and safety of the organization’s technology assets, data and network(s).
• Technologies are configured to protect data with the strength and integrity commensurate with the classification or sensitivity of the information and mostly conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides), including cryptographic protections for sensitive/regulated data. | Secure Engineering & Architecture (SEA) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• IT/cybersecurity architects, or a similar function, enable the implementation a “layered defense” network architecture that enables a resilient defense-in-depth approach through the use of industry-recognized cybersecurity & data privacy practices in the specification, design, development, implementation and modification of systems and services (e.g., DISA STIGs, CIS Benchmarks or OEM security guides).
• IT/cybersecurity engineers, or a similar function, operationalize enterprise architecture, aligned with industry-recognized leading practices, with consideration for cybersecurity & data privacy principles, including resiliency expectations, that addresses risk to organizational operations, assets, individuals, other organizations.
• A Validated Architecture Design Review (VADR), or similar process, is used to evaluate design criteria for secure practices and conformance with requirements for applicable statutory, regulatory and contractual controls to determine if the system/application/service is designed, built and operated in a secure and resilient manner.
• A Change Advisory Board (CAB), or similar function, governs changes to systems, applications and services to ensure their stability, reliability and predictability.
• A formal Change Management (CM) program helps to ensure that no unauthorized changes are made, all changes are documented, services are not disrupted and resources are used efficiently.
• An Identity & Access Management (IAM) function, or similar function, enables the implementation of identification and access management controls for “least privileges” practices, allowing for the management of user, group and system accounts, including privileged accounts.
• An IT Asset Management (ITAM) function, or similar function, categorizes assets according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data. | Secure Engineering & Architecture (SEA) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to utilize time-synchronization technology to synchronize all critical system clocks. | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 12.4.4 | 8.17 | 12.4.4 | null | 6.9.4.4 | null | null | null | null | null | null | null | null | null | null | null | AU-8 | AU-8 | AU-8 | AU-8 | AU-8 | null | AU-8 | AU-8 | AU-8 | null | null | AU-8 | AU-8 | AU-8 | null | null | null | null | null | null | null | 3.3.7 | null | null | null | null | null | null | null | null | 10.4
10.4.1
10.4.2
10.4.3 | 10.6
10.6.1
10.6.2
10.6.3 | null | 10.6.1
10.6.2
10.6.3 | null | null | 10.6.1
10.6.2
10.6.3 | null | 10.6.1
10.6.2
10.6.3 | 10.6.1
10.6.2
10.6.3 | null | G.6 | null | null | null | null | null | null | TM:SG2.SP2 | null | null | null | AU.L2-3.3.7 | null | null | AU.L2-3.3.7 | AU.L2-3.3.7 | null | null | null | null | null | null | null | null | AU-8 | AU-8 | AU-8 | AU-8 | AU-8 | AU-8 | AU-8 | AU-8 | AU-8 | AU-8 | null | null | null | null | null | null | null | null | null | AU-8 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | AU-8 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 12.4.4
12.4.4.4.PB | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | null | x | x | R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-4
R-BC-5
R-EX-7
R-GV-1
R-GV-2
R-GV-4
R-GV-5
R-IR-1
R-IR-4 | R-AC-1 | R-AC-2 | R-AC-3 | R-AC-4 | R-AM-1 | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | null | R-BC-4 | R-BC-5 | null | null | null | null | null | null | R-EX-7 | R-GV-1 | R-GV-2 | null | R-GV-4 | R-GV-5 | null | null | null | R-IR-1 | null | null | R-IR-4 | null | null | NT-7
MT-1
MT-2
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | null | null | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Security Operations | Operations Security | OPS-01 | Mechanisms exist to facilitate the implementation of operational security controls. | - Standardized Operating Procedures (SOP)
- ITIL v4
- COBIT 2019 | null | Does the organization facilitate the implementation of operational security controls? | 8 | Protect | null | X | X | There is no evidence of a capability to facilitate the implementation of operational security controls. | Security Operations (OPS) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Cybersecurity operations are decentralized.
• The responsibility for developing and operating cybersecurity & data privacy procedures are up to the business process owner(s) to determine, including the definition and enforcement of roles and responsibilities. | Security operations (OPS) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Security operations management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for security operations.
• Administrative processes focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• Critical business functions are documented in “run books” or Standardized Operating Procedures (SOPs) to capture operational knowledge in documentation form. | Security Operations (OPS) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• The Chief Information Security Officer (CISO), or similar function, analyzes the organization’s business strategy to determine prioritized and authoritative guidance for cybersecurity operations practices.
• The CISO, or similar function, develops a security-focused Concept of Operations (CONOPS) that documents management, operational and technical measures to apply defense-in-depth techniques across the enterprise for cybersecurity operations.
• A Governance, Risk & Compliance (GRC) function, or similar function, provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data with regards to cybersecurity operations.
• A steering committee is formally established to provide executive oversight of the cybersecurity & data privacy program, including cybersecurity operations.
• A Security Operations Center (SOC), or similar function, manages cybersecurity operations that covers preparation, detection and analysis, containment, eradication and recovery.
• Procedures are standardized across the enterprise to ensure uniformity and consistent execution. These Standardized Operating Procedures (SOP) identify and document day-to-day procedures to enable the proper execution of assigned tasks.
• Line of Business (LOB) stakeholders are identified and tasked with documenting business-critical functions in “run books,” or SOPs, to capture the knowledge in documentation form from both a business and technology perspective. | Security Operations (OPS) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to facilitate the implementation of operational security controls. | CC2.2 | null | 8
8.1 | null | null | null | null | null | Principle 14 | IVS-08 | IAM-16 | SO13 | null | null | null | 8.1
8.4.2.1
8.4.2.2
8.4.2.3
8.4.2.4 | 8.1 | 8.1 | 12.1.1 | 5.37 | 7.2.2
12.1.1
CLD.12.1.5 | null | 6.9
6.9.1
6.9.1.1 | null | null | null | T1005, T1025 | TS-1.5 | null | GOVERN 1.0
GOVERN 1.2
GOVERN 1.3
GOVERN 1.4
GOVERN 2.2
GOVERN 3.2
GOVERN 4.1
GOVERN 5.1
GOVERN 6.0
GOVERN 6.1
MAP 3.5 | null | null | null | null | SC-38 | null | null | null | SC-38
SR-7 | null | null | null | null | SC-38
SR-7 | null | null | null | null | 3.4.12 | SC-38
SR-7 | null | null | null | SC-38
SR-7 | SC-38
SR-7 | null | 3.15.1.a
3.15.1.b | null | null | null | null | null | null | null | null | 1.1.1
2.1.1
3.1.1
4.1.1
5.1.1
6.1.1
7.1.1
8.1.1
8.3.8
9.1.1
10.1.1
11.1.1 | 3.1.1 | 1.1.1
2.1.1
3.1.1
4.1.1
5.1.1
6.1.1
8.1.1
8.3.8 | 3.1.1 | 3.1.1
8.1.1
9.1.1 | 2.1.1
3.1.1
5.1.1
8.1.1
8.3.8
9.1.1
10.1.1 | 2.1.1
3.1.1
8.1.1
9.1.1 | 1.1.1
2.1.1
3.1.1
4.1.1
5.1.1
6.1.1
7.1.1
8.1.1
8.3.8
9.1.1
10.1.1
11.1.1 | 1.1.1
2.1.1
3.1.1
4.1.1
5.1.1
6.1.1
7.1.1
8.1.1
8.3.8
9.1.1
10.1.1
11.1.1 | 3.1.1
9.1.1 | G.2 | null | 5.2 | null | null | null | null | ADM:SG1.SP1
EC:SG3.SP2
KIM:SG1.SP1
OPD:SG1.SP4
OPF:SG3.SP1
RISK:SG4.SP1
VAR:SG2.SP3 | null | null | null | null | null | null | null | null | null | null | 252.204-7008
252.204-7012 | null | null | null | null | § 11.10
§ 11.10(f) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 314.4(c)(7) | null | null | 8.M.A | 8.M.A
8.L.A | null | null | CIP-003-6
R4 | null | null | null | null | null | null | null | null | null | null | III.B.2
III.B.2.a
III.B.2.b | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Art 9.1
Art 9.2 | null | Art 32.1
Art 32.2 | null | null | null | Sec 14
Sec 15 | Art 16 | null | null | null | null | null | null | SP-01 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Sec 19 | null | null | null | null | null | null | B4.c
C1.e | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Article 51
Article 51(1)
Article 51(2)
Article 51(3)
Article 51(4)
Article 51(5)
Article 51(6) | null | null | null | null | 4.5.4
4.5.4.1
4.5.4.2
4.5.4.3
4.5.4.4
4.5.4.5
7.2.2.19.PB
12.1.1
12.1.5.P | null | 9.1 | null | null | null | null | null | 7.1.1 | null | null | null | null | null | null | null | 1.3
1.5 | null | null | null | null | null | null | null | null | null | null | null | x | null | null | null | R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
R-SA-2 | R-AC-1 | R-AC-2 | R-AC-3 | R-AC-4 | R-AM-1 | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | R-EX-6 | R-EX-7 | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | R-GV-8 | R-IR-1 | R-IR-2 | R-IR-3 | R-IR-4 | R-SA-1 | R-SA-2 | NT-7
MT-1
MT-2
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15
MT-16 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | null | null | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | MT-16 | null |
Security Operations | Standardized Operating Procedures (SOP) | OPS-01.1 | Mechanisms exist to identify and document Standardized Operating Procedures (SOP), or similar documentation, to enable the proper execution of day-to-day / assigned tasks. | - Standardized Operating Procedures (SOP) | E-GOV-11 | Does the organization identify and document Standardized Operating Procedures (SOP), or similar documentation, to enable the proper execution of day-to-day / assigned tasks? | 9 | Protect | null | X | null | There is no evidence of a capability to identify and document Standardized Operating Procedures (SOP), or similar documentation, to enable the proper execution of day-to-day / assigned tasks. | Security Operations (OPS) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Cybersecurity operations are decentralized.
• The responsibility for developing and operating cybersecurity & data privacy procedures are up to the business process owner(s) to determine, including the definition and enforcement of roles and responsibilities. | Security operations (OPS) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Security operations management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for security operations.
• Administrative processes focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• Critical business functions are documented in “run books” or Standardized Operating Procedures (SOPs) to capture operational knowledge in documentation form. | Security Operations (OPS) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A Security Operations Center (SOC), or similar function, manages cybersecurity operations that covers preparation, detection and analysis, containment, eradication and recovery.
• Procedures are standardized across the enterprise to ensure uniformity and consistent execution. These Standardized Operating Procedures (SOP) identify and document day-to-day procedures to enable the proper execution of assigned tasks.
• Line of Business (LOB) stakeholders are identified and tasked with documenting business-critical functions in “run books,” or SOPs, to capture the knowledge in documentation form from both a business and technology perspective. | Security Operations (OPS) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to identify and document Standardized Operating Procedures (SOP), or similar documentation, to enable the proper execution of day-to-day / assigned tasks. | CC2.2
CC5.1
CC5.3 | CC5.3-POF3 | 4.2 | null | null | null | null | APO01.09
DSS01.01 | Principle 10
Principle 12
Principle 14 | null | null | null | null | null | null | 8.1
8.4.2.1
8.4.2.2
8.4.2.3
8.4.2.4
8.4.5 | 7.5 | 8.1 | 12.1.1 | 5.37 | 7.2.2
12.1.1
CLD.12.1.5 | null | 6.9
6.9.1
6.9.1.1 | null | null | null | null | OR-1.0
OR-3.0
OP-2.0
PS-2.0
TS-1.5
TS-2.4
TS-2.6
TS-2.8
TS-2.11
TS-3.0 | null | GOVERN 1.0
GOVERN 1.2
GOVERN 1.3
GOVERN 1.4
GOVERN 2.2
GOVERN 3.2
GOVERN 4.1
GOVERN 5.1
GOVERN 6.0
GOVERN 6.1
MAP 3.5 | GV.MT-P3
GV.MT-P4
GV.MT-P5
GV.MT-P6
GV.MT-P7
CT.PO-P1
CT.PO-P2
CT.PO-P3
CM.PO-P1
CM.AW-P1 | null | null | null | null | null | null | null | SA-8(32) | null | null | null | null | SA-8(32) | null | null | null | null | 3.4.12 | null | null | null | null | null | null | null | 3.15.1.a
3.15.1.b | null | A.03.15.01.a[03]
A.03.15.01.a[04] | null | null | null | GV.PO-01
GV.PO-02 | null | null | 1.1.1
2.1.1
3.1.1
4.1.1
5.1.1
6.1.1
7.1.1
8.1.1
8.3.8
9.1.1
10.1.1
11.1.1 | 3.1.1 | 1.1.1
2.1.1
3.1.1
4.1.1
5.1.1
6.1.1
8.1.1
8.3.8 | 3.1.1 | 3.1.1
8.1.1
9.1.1 | 2.1.1
3.1.1
5.1.1
8.1.1
8.3.8
9.1.1
10.1.1 | 2.1.1
3.1.1
8.1.1
9.1.1 | 1.1.1
2.1.1
3.1.1
4.1.1
5.1.1
6.1.1
7.1.1
8.1.1
8.3.8
9.1.1
10.1.1
11.1.1 | 1.1.1
2.1.1
3.1.1
4.1.1
5.1.1
6.1.1
7.1.1
8.1.1
8.3.8
9.1.1
10.1.1
11.1.1 | 3.1.1
9.1.1 | G.2.6 | null | 9.4 | null | null | null | ASSET-4.C.MIL2
ASSET-5.A.MIL2
THREAT-3.A.MIL2
RISK-5.A.MIL2
ACCESS-4.A.MIL2
SITUATION-4.A.MIL2
RESPONSE-5.A.MIL2
THIRD-PARTIES-3.A.MIL2
WORKFORCE-4.A.MIL2
ARCHITECTURE-5.A.MIL2
PROGRAM-3.A.MIL2 | GG2.GP2
GG2.GP4
GG3.GP1
OPD:SG1.SP4
OPD:SG1.SP5
OPD:SG1.SP6
OPF:SG3.SP1
OPF:SG3.SP2
OPF:SG3.SP4 | null | 4.2.5.1
5.8
5.9 | null | null | null | null | null | null | null | null | 252.204-7008
252.204-7012 | null | null | null | null | § 11.10
§ 11.10(f)
§ 11.10(k)
§ 11.10(k)(1)
§ 11.10(k)(2) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 314.4(c)(7)
314.4(c)(8)
314.4(e) | null | 4.S.B | 8.M.A | 8.M.A
8.L.A | 2.C.2 | null | CIP-003-6
R4 | null | null | null | null | null | null | 5.2 | null | null | null | III.D | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 3.4.2.(31)
3.4.2(31)(a)
3.4.2(31)(b)
3.4.2(31)(c)
3.4.2(31)(d)
3.4.2(31)(e)
3.4.2(31)(f)
3.4.2(31)(g)
3.4.5(38)
3.5(50) | Art 6.2
Art 9.2
Art 9.4(e) | null | null | null | null | null | null | null | null | null | null | null | null | null | SP-01
IDM-02 | null | null | null | 12.2
12.3
18.2
22.2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 6.3 [ORG.3] | null | null | null | null | B4.c | null | null | null | Article 5(1)(f) | null | null | null | null | null | null | null | null | null | null | null | Article 51
Article 51(1)
Article 51(2)
Article 51(3)
Article 51(4)
Article 51(5)
Article 51(6) | null | null | null | null | 4.5.4
4.5.4.1
4.5.4.2
4.5.4.3
4.5.4.4
4.8
7.2.2.19.PB
12.1.1
12.1.5.P | null | 1.4.2
3.3
3.3.1
3.3.2
3.3.3
4.3
4.3.1
4.3.2
5.3
5.3.1
5.3.2
6.3
6.3.1
6.3.2
6.3.3
7.2
7.2.1
7.2.2
7.2.3
8.3
8.3.1
8.3.2
8.3.3
9.3
9.3.1
9.3.2
9.3.3
10.3
10.3.1
10.3.2
10.3.3
11.3
11.3.1
11.3.2
11.3.3
12.3
12.3.1
12.3.2
12.3.3
13.3
13.3.1
13.3.2
13.3.3
14.3
14.3.1
14.3.2
14.3.3
15.3
15.3.1
15.3.2
15.3.3
16.3
16.3.1
16.3.2
16.3.3
17.3
17.3.1
17.3.2
17.3.3
18.3
18.3.1
18.3.2
18.3.3
19.3
19.3.1
19.3.2
19.3.3 | 3.4.12.C.01
3.4.12.C.02
5.1.11.C.01
5.1.13.C.01
5.5.3.C.01
5.5.4.C.01
5.5.5.C.01
5.5.6.C.01 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | null | null | null | R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-4
R-BC-5
R-EX-7
R-GV-1
R-GV-2
R-GV-4
R-GV-5
R-IR-1
R-IR-4 | R-AC-1 | R-AC-2 | R-AC-3 | R-AC-4 | R-AM-1 | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | null | R-BC-4 | R-BC-5 | null | null | null | null | null | null | R-EX-7 | R-GV-1 | R-GV-2 | null | R-GV-4 | R-GV-5 | null | null | null | R-IR-1 | null | null | R-IR-4 | null | null | NT-1
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-11
MT-12
MT-13
MT-14
MT-15 | NT-1 | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | NT-9 | NT-10 | NT-11 | NT-12 | NT-13 | NT-14 | MT-1 | MT-2 | MT-3 | MT-4 | MT-5 | MT-6 | MT-7 | MT-8 | MT-9 | null | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Security Operations | Security Concept Of Operations (CONOPS) | OPS-02 | Mechanisms exist to develop a security Concept of Operations (CONOPS), or a similarly-defined plan for achieving cybersecurity objectives, that documents management, operational and technical measures implemented to apply defense-in-depth techniques that is communicated to all appropriate stakeholders. | null | null | Does the organization develop a security Concept of Operations (CONOPS), or a similarly-defined plan for achieving cybersecurity objectives, that documents management, operational and technical measures implemented to apply defense-in-depth techniques that is communicated to all appropriate stakeholders? | 9 | Protect | X | X | X | There is no evidence of a capability to develop a security Concept of Operations (CONOPS), or a similarly-defined plan for achieving cybersecurity objectives, that documents management, operational and technical measures implemented to apply defense-in-depth techniques that is communicated to all appropriate stakeholders. | SP-CMM1 is N/A, since a structured process is required to develop a security Concept of Operations (CONOPS), or a similarly-defined plan for achieving cybersecurity objectives, that documents management, operational and technical measures implemented to apply defense-in-depth techniques that is communicated to all appropriate stakeholders. | Security operations (OPS) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Security operations management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for security operations.
• Administrative processes focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed. | Security Operations (OPS) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A Security Operations Center (SOC), or similar function, manages cybersecurity operations that covers preparation, detection and analysis, containment, eradication and recovery.
• Procedures are standardized across the enterprise to ensure uniformity and consistent execution. These Standardized Operating Procedures (SOP) identify and document day-to-day procedures to enable the proper execution of assigned tasks.
• Line of Business (LOB) stakeholders are identified and tasked with documenting business-critical functions in “run books,” or SOPs, to capture the knowledge in documentation form from both a business and technology perspective. | See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to develop a security Concept of Operations (CONOPS), or a similarly-defined plan for achieving cybersecurity objectives, that documents management, operational and technical measures implemented to apply defense-in-depth techniques that is communicated to all appropriate stakeholders. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to develop a security Concept of Operations (CONOPS), or a similarly-defined plan for achieving cybersecurity objectives, that documents management, operational and technical measures implemented to apply defense-in-depth techniques that is communicated to all appropriate stakeholders. | CC5.1
CC7.2 | null | 8.1 | null | null | null | null | null | Principle 2
Principle 10 | IVS-08
STA-06 | null | SO13 | null | null | null | 8.1 | 8.1 | null | null | null | CLD.12.1.5 | null | 6.9
6.9.1
6.9.1.1 | null | null | null | null | null | null | null | ID.BE-P1
ID.BE-P2
ID.BE-P3
PR.PO-P4 | null | null | null | PL-7 | null | null | null | PL-7 | null | null | null | null | PL-7 | null | null | null | null | 3.4.12 | PL-7 | null | null | null | null | PL-7 | null | null | null | null | null | null | null | GV.OC-01
GV.OC-04
GV.RM-04
ID.IM-04 | null | null | null | null | null | null | null | null | null | null | null | null | D.2 | null | null | null | null | null | null | EF:SG2.SP1
GG2.GP1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 8.M.A | 8.M.A
8.L.A | null | null | null | 8-610 | null | null | null | null | null | null | null | null | null | III.B.2
III.B.2.a
III.B.2.b | null | null | null | null | null | null | null | null | null | null | 500.1 | null | null | null | null | null | null | null | null | null | null | null | 3.2.1(6) | Art 9.1
Art 9.2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 4.5.4
12.1.5.P | null | null | 5.1.15.C.01 | null | null | null | null | null | null | null | null | null | null | null | null | 4.30 | null | null | null | null | null | null | null | null | null | null | null | x | null | null | null | R-AM-3
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-SA-1
R-SA-2 | null | null | null | null | null | null | R-AM-3 | null | null | null | null | null | null | null | null | null | null | null | null | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | null | null | null | null | null | R-SA-1 | R-SA-2 | NT-1
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-11
MT-12
MT-13
MT-14
MT-15 | NT-1 | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | NT-9 | NT-10 | NT-11 | NT-12 | NT-13 | NT-14 | MT-1 | MT-2 | MT-3 | MT-4 | MT-5 | MT-6 | MT-7 | MT-8 | MT-9 | null | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Security Operations | Service Delivery
(Business Process Support) | OPS-03 | Mechanisms exist to define supporting business processes and implement appropriate governance and service management to ensure appropriate planning, delivery and support of the organization's technology capabilities supporting business functions, workforce, and/or customers based on industry-recognized standards to achieve the specific goals of the process area. | - ITIL v4
- COBIT 2019 | E-TPM-04 | Does the organization define supporting business processes and implement appropriate governance and service management to ensure appropriate planning, delivery and support of the organization's technology capabilities supporting business functions, workforce, and/or customers based on industry-recognized standards to achieve the specific goals of the process area? | 7 | Protect | X | X | null | There is no evidence of a capability to define supporting business processes and implement appropriate governance and service management to ensure appropriate planning, delivery and support of the organization's technology capabilities supporting business functions, workforce, and/ or customers based on industry-recognized standards to achieve the specific goals of the process area. | Security Operations (OPS) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Cybersecurity operations are decentralized.
• The responsibility for developing and operating cybersecurity & data privacy procedures are up to the business process owner(s) to determine, including the definition and enforcement of roles and responsibilities. | Security operations (OPS) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Security operations management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for security operations.
• Administrative processes focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• Critical business functions are documented in “run books” or Standardized Operating Procedures (SOPs) to capture operational knowledge in documentation form. | Security Operations (OPS) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A Security Operations Center (SOC), or similar function, manages cybersecurity operations that covers preparation, detection and analysis, containment, eradication and recovery.
• Procedures are standardized across the enterprise to ensure uniformity and consistent execution. These Standardized Operating Procedures (SOP) identify and document day-to-day procedures to enable the proper execution of assigned tasks.
• Line of Business (LOB) stakeholders are identified and tasked with documenting business-critical functions in “run books,” or SOPs, to capture the knowledge in documentation form from both a business and technology perspective. | Security Operations (OPS) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to define supporting business processes and implement appropriate governance and service management to ensure appropriate planning, delivery and support of the organization's technology capabilities supporting business functions, workforce, and/ or customers based on industry-recognized standards to achieve the specific goals of the process area. | CC2.1
PI1.1 | CC2.1-POF1
CC2.1-POF2
CC2.1-POF3
CC2.1-POF4
CC2.2-POF1
CC2.3-POF2
CC2.3-POF6
CC3.1-POF7
CC3.1-POF8
CC3.1-POF9
CC3.1-POF10
CC3.1-POF11
CC3.1-POF12
CC3.1-POF13
CC3.1-POF14
CC3.1-POF15
CC3.1-POF16
CC5.3-POF3
PI1.3-POF1
PI1.3-POF2
PI1.3-POF3
PI1.3-POF4
PI1.3-POF5
PI1.4-POF1
PI1.4-POF2
PI1.4-POF3
PI1.4-POF4
PI1.5-POF1
PI1.5-POF2
PI1.5-POF3
PI1.5-POF4 | null | null | null | null | null | APO01.11
APO09.03
APO09.04
APO09.05
APO11.01
APO11.02
APO11.03
APO11.04
APO11.05 | Principle 13 | STA-06 | IAM-16
SNT-03 | null | null | null | RQ-05-11
RQ-06-03.a
RQ-06-03.b
RQ-06-03.c
RQ-06-03.d
RQ-06-03.e
RQ-06-03.f | 8.1
8.4.2.1
8.4.2.2
8.4.2.3
8.4.2.4 | null | 8.1 | null | 5.37 | CLD.12.1.5 | null | null | null | null | null | null | null | null | null | ID.IM-P5 | null | null | null | IP-4
IP-4(1) | null | null | null | null | null | null | null | null | null | null | null | null | null | 3.4.12 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | G.2.6 | null | 9.4 | null | null | null | ASSET-4.C.MIL2
ASSET-5.A.MIL2
THREAT-3.A.MIL2
RISK-5.A.MIL2
ACCESS-4.A.MIL2
SITUATION-4.A.MIL2
RESPONSE-5.A.MIL2
THIRD-PARTIES-3.A.MIL2
WORKFORCE-4.A.MIL2
ARCHITECTURE-5.A.MIL2
PROGRAM-3.A.MIL2 | GG1.GP1
GG2.GP6
GG3.GP1
GG3.GP2
OPD:SG1.SP3
OPD:SG1.SP4
OPD:SG1.SP5
OPF:SG3.SP3 | null | 5.1.2
5.1.2.1 | null | null | null | null | null | null | IP-4
IP-4(1) | null | null | null | null | null | null | § 11.10
§ 11.10(f) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 8.M.A | 8.M.A
8.L.A | 2.C.9 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Art 9.1
Art 9.2 | null | null | null | null | null | null | null | null | null | null | null | null | 8.1
8.2
11.1
11.2
11.3
11.4
11.5
11.6
11.7
11.8 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | B4.c
C1.e | null | null | null | Article 5(1)(f) | null | null | null | null | null | null | null | null | null | null | null | Article 51 | null | null | null | null | 4.5.4
4.5.4.1
4.5.4.2
4.5.4.3
4.5.4.4
12.1.5.P | null | null | null | null | null | null | null | 7.1.1 | null | null | null | null | null | null | null | 1.3
1.5 | null | null | null | null | null | null | null | null | null | null | null | x | null | null | null | R-AM-3
R-BC-1
R-BC-3
R-EX-5
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-SA-1
R-SA-2 | null | null | null | null | null | null | R-AM-3 | R-BC-1 | null | R-BC-3 | null | null | null | null | null | null | R-EX-5 | null | null | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | null | null | null | null | null | R-SA-1 | R-SA-2 | NT-1
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-11
MT-12
MT-13
MT-14
MT-15 | NT-1 | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | NT-9 | NT-10 | NT-11 | NT-12 | NT-13 | NT-14 | MT-1 | MT-2 | MT-3 | MT-4 | MT-5 | MT-6 | MT-7 | MT-8 | MT-9 | null | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Security Operations | Security Operations Center (SOC) | OPS-04 | Mechanisms exist to establish and maintain a Security Operations Center (SOC) that facilitates a 24x7 response capability. | null | null | Does the organization establish and maintain a Security Operations Center (SOC) that facilitates a 24x7 response capability? | 8 | Protect | null | X | X | There is no evidence of a capability to establish and maintain a Security Operations Center (SOC) that facilitates a 24x7 response capability. | SP-CMM1 is N/A, since a structured process is required to establish and maintain a Security Operations Center (SOC) that facilitates a 24x7 response capability. | Security operations (OPS) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Security operations management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for security operations.
• Administrative processes focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• Critical business functions are documented in “run books” or Standardized Operating Procedures (SOPs) to capture operational knowledge in documentation form. | Security Operations (OPS) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A Security Operations Center (SOC), or similar function,
o Has a defined mission and expected functions.
o Manages cybersecurity operations that covers preparation, detection and analysis, containment, eradication and recovery.
o Configures monitoring technologies to implement the legally-allowable enhanced monitoring profiles for selected users and establish a reporting capability to designated personnel on enhanced monitoring activities.
o Is capable of detecting and responding to potential incidents through a formalized intake of security-related tickets; log monitoring; and analyzing threat intelligence feeds.
o Is staffed internally by qualified cybersecurity personnel, or is outsourced to a Managed Security Services Provider (MSSP).
o Maintains a documented knowledge management repository to assist in SOC operations.
o Ensures personnel are assigned appropriate roles and responsibilities to assist Integrated Security Incident Response Team (ISIRT) personnel in incident response operations.
o Responds to cybersecurity & data privacy incidents according to documented procedures. | Security Operations (OPS) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to establish and maintain a Security Operations Center (SOC) that facilitates a 24x7 response capability. | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | T1005, T1025 | null | null | null | null | null | null | null | SC-38 | null | null | null | IR-4(14)
SC-38 | null | null | null | null | IR-4(14)
SC-38 | null | null | null | null | null | SC-38 | null | null | null | SC-38 | SC-38 | null | null | null | null | 3.6.1e | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | J.4 | null | null | null | null | null | null | null | null | null | null | null | TBD - 3.6.1e | null | null | IR.L3-3.6.1e | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | B4.c
C1.e | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 12.2.1 | null | null | null | null | null | null | null | 1.4 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | R-AM-3
R-BC-1
R-BC-3
R-BC-4
R-BC-5
R-EX-5
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-IR-1
R-IR-2
R-IR-4
R-SA-1
R-SA-2 | null | null | null | null | null | null | R-AM-3 | R-BC-1 | null | R-BC-3 | R-BC-4 | R-BC-5 | null | null | null | null | R-EX-5 | null | null | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | null | R-IR-1 | R-IR-2 | null | R-IR-4 | R-SA-1 | R-SA-2 | NT-1
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-11
MT-12
MT-13
MT-14
MT-15 | NT-1 | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | NT-9 | NT-10 | NT-11 | NT-12 | NT-13 | NT-14 | MT-1 | MT-2 | MT-3 | MT-4 | MT-5 | MT-6 | MT-7 | MT-8 | MT-9 | null | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Security Operations | Secure Practices Guidelines | OPS-05 | Mechanisms exist to provide guidelines and recommendations for the secure use of products and/or services to assist in the configuration, installation and use of the product and/or service. | null | null | Does the organization provide guidelines and recommendations for the secure use of products and/or services to assist in the configuration, installation and use of the product and/or service? | 7 | Protect | null | X | null | There is no evidence of a capability to provide guidelines and recommendations for the secure use of products and/ or services to assist in the configuration, installation and use of the product and/ or service. | SP-CMM1 is N/A, since a structured process is required to provide guidelines and recommendations for the secure use of products and/ or services to assist in the configuration, installation and use of the product and/ or service. | Security operations (OPS) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Security operations management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for security operations.
• Administrative processes focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• Critical business functions are documented in “run books” or Standardized Operating Procedures (SOPs) to capture operational knowledge in documentation form. | Security Operations (OPS) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A Security Operations Center (SOC), or similar function, manages cybersecurity operations that covers preparation, detection and analysis, containment, eradication and recovery.
• Procedures are standardized across the enterprise to ensure uniformity and consistent execution. These Standardized Operating Procedures (SOP) identify and document day-to-day procedures to enable the proper execution of assigned tasks.
• Line of Business (LOB) stakeholders are identified and tasked with documenting business-critical functions in “run books,” or SOPs, to capture the knowledge in documentation form from both a business and technology perspective. | See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to provide guidelines and recommendations for the secure use of products and/ or services to assist in the configuration, installation and use of the product and/ or service. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to provide guidelines and recommendations for the secure use of products and/ or services to assist in the configuration, installation and use of the product and/ or service. | null | null | null | null | null | null | null | null | null | STA-03 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | D.2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | PSS-01 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 4.29
4.30 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | R-BC-1
R-BC-3
R-BC-4
R-BC-5
R-EX-5
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-IR-1
R-IR-2
R-IR-4
R-SA-1
R-SA-2 | null | null | null | null | null | null | null | R-BC-1 | null | R-BC-3 | R-BC-4 | R-BC-5 | null | null | null | null | R-EX-5 | null | null | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | null | R-IR-1 | R-IR-2 | null | R-IR-4 | R-SA-1 | R-SA-2 | NT-1
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-11
MT-12
MT-13
MT-14
MT-15 | NT-1 | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | NT-9 | NT-10 | NT-11 | NT-12 | NT-13 | NT-14 | MT-1 | MT-2 | MT-3 | MT-4 | MT-5 | MT-6 | MT-7 | MT-8 | MT-9 | null | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Security Awareness & Training | Cybersecurity & Data Privacy-Minded Workforce | SAT-01 | Mechanisms exist to facilitate the implementation of security workforce development and awareness controls. | null | null | Does the organization facilitate the implementation of security workforce development and awareness controls? | 8 | Protect | X | X | null | There is no evidence of a capability to facilitate the implementation of security workforce development and awareness controls. | Security Awareness & Training (SAT) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Training activities are decentralized.
• Security awareness and training methods are often generic, without organization-specific content.
• IT/cybersecurity personnel self-manage their professional certification requirements to support their assigned duties.
• Personnel management is mainly decentralized, with the responsibility for training users on new technologies and enforcing policies being assigned to users’ supervisors and managers. | Security Awareness & Training (SAT) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Training and awareness activities are decentralized (e.g., a localized/regionalized function) and use non-standardized methods to implement secure and compliant practices.
• The Human Resources (HR) department works with cybersecurity personnel to facilitate workforce development and awareness to help ensure secure practices are implemented.
• Security awareness and training methods are role-based (e.g., handling sensitive/regulated data).
• IT/cybersecurity personnel:
o Identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for security training and awareness activities.
o Create/govern security and awareness training to meet specific statutory, regulatory and/ or contractual compliance obligations.
o Self-manage their professional certification requirements to support their assigned duties. | Security Awareness & Training (SAT) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• The Chief Information Security Officer (CISO), or similar function, analyzes the organization’s business strategy to determine prioritized and authoritative guidance for security awareness and training practices.
• The CISO, or similar function, develops a security-focused Concept of Operations (CONOPS) that documents management, operational and technical measures to apply defense-in-depth techniques across the enterprise for security awareness and training.
• A Governance, Risk & Compliance (GRC) function, or similar function:
o Provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data with regards to security awareness and training.
o Defines minimum cybersecurity training (including certifications) for personnel, based on their specific roles.
o Creates/governs security and awareness training to meet specific statutory, regulatory and/ or contractual compliance obligations.
• A steering committee is formally established to provide executive oversight of the cybersecurity & data privacy program, including security awareness and training.
• Security awareness and training methods are role-based (e.g., handling sensitive/regulated data).
• The Human Resources (HR) department:
o Identifies and implements industry-recognized HR practices related to security workforce development and awareness to help ensure secure practices are implemented in personnel management operations.
o Documents, retains and monitors individual training activities, including basic security awareness training, ongoing awareness training and specific-system training.
o Ensures that every user accessing a system processing, storing or transmitting sensitive/regulated data is formally trained in data handling requirements.
o Ensures all employees and contractors receive awareness education and training that is relevant for their job function, including social engineering-related threats. | Security Awareness & Training (SAT) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to facilitate the implementation of security workforce development and awareness controls. | CC1.4 | CC2.2-POF8 | 6 | 14.0
14.1 | 14.1 | 14.1 | 14.1 | null | Principle 4 | DCS-11
HRS-11
HRS-13 | TRN-01
TRN-02 | SO6 | null | null | RQ-05-06 | 7.3 | 7.3 | 7.4
7.4(a)
7.4(b)
7.4(c)
7.4(d) | 7.2.2 | 6.3 | 7.2.2 | null | 6.4.2.2 | null | null | null | null | OR-3.1
OR-3.2 | Sec 4(D)(5) | GOVERN 4.1 | GV.AT-P1
GV.AT-P2
GV.AT-P3
GV.AT-P4 | PO.2.2 | null | 2.7 | AT-1
PM-13 | AT-1 | AT-1 | AT-1 | AT-1
PM-13 | AT-1 | AT-1 | AT-1 | AT-1 | PM-13 | null | AT-1 | AT-1 | AT-1 | null | AT-1
PM-13 | AT-1 | null | AT-1
PM-13 | AT-1
PM-13 | null | NFO - AT-1 | 3.2.1.a
3.2.1.a.1
3.2.1.a.2
3.2.1.a.3
3.2.1.b | null | A.03.02.01.a.01[01]
A.03.02.01.a.01[02]
A.03.02.01.a.02
A.03.02.01.b[01]
A.03.02.01.b[02]
A.03.02.01.ODP[01] | null | null | PR.AT-1
PR.AT-3
PR.AT-4 | PR.AT | null | null | 8.3.8
9.5.1
9.5.1.3
12.6
12.6.1
12.6.2
A3.1.4 | null | 8.3.8
12.6.1 | 9.5.1
9.5.1.3
12.6.1 | 9.5.1
9.5.1.3
12.6.1 | 8.3.8
9.5.1
9.5.1.3
12.6.1 | 12.6.1 | 8.3.8
9.5.1
9.5.1.3
12.6.1
12.6.2 | 8.3.8
9.5.1
9.5.1.3
12.6.1
12.6.2 | 9.5.1
9.5.1.3
12.6.1 | E.1.6 | 7.2 | 2.1.3 | null | null | null | WORKFORCE-2.A.MIL1
WORKFORCE-2.B.MIL2
WORKFORCE-2.C.MIL2
WORKFORCE-2.D.MIL2
WORKFORCE-2.E.MIL3
WORKFORCE-2.F.MIL3
WORKFORCE-2.G.MIL3 | EF:SG2.SP2
EF:SG3.SP2
GG2.GP5
OTA:SG1.SP1
OTA:SG1.SP2
OTA:SG1.SP3
OTA:SG3.SP1
OTA:SG3.SP2
OTA:SG3.SP3 | 4.3 | 5.2 | null | null | null | null | null | null | AT-1
PM-13 | null | null | null | null | null | null | § 11.10
§ 11.10(i) | AT-1 | AT-1 | AT-1 | AT-1 | AT-1 | AT-1 | AT-1 | AT-1 | AT-1 | AT-1 | null | D1.TC.Tr.B.2
D1.TC.Tr.B.4
D1.TC.Tr.Int.2
D1.TC.Tr.E.2 | null | null | 314.4(e)(1) | 164.308(a)(5)
164.308(a)(5)(i)
164.308(a)(5)(ii)(A)
164.308(a)(5)(ii)(B)
164.308(a)(5)(ii)(C)
164.308(a)(5)(ii)(D) | 1.S.B
4.S.C | 1.M.D | 1.M.D
1.L.C | AT-1 | null | CIP-004-6
R1 | 8-101
8-103
8-307 | 2.1
2.3 | null | null | null | null | 5.7
5.10 | AT-1 | AT-1 | AT-1 | null | null | null | 7100(a)
7100(b) | null | null | null | null | null | null | null | 500.14 | Sec 4(2)(b)(ii)(A)(4) | null | 38-99-20(D)(5) | null | Sec 6 | AT-1 | AT-1 | AT-1 | null | null | § 2447(b)(2)(A)
§ 2447(c)(8) | 3.2.1(3)
3.4.7(49) | Art 13.6 | null | Art 32.1
Art 32.2
Art 32.4 | Article 21.2(g) | null | null | Sec 14
Sec 15 | Art 16 | null | null | null | null | null | 4.9 | HR-03
DEV-04 | null | null | null | 20.1 | null | null | null | null | null | null | null | null | null | Article 11.3 | null | null | TPC-7 | 3.1.6 | 1-10-1
1-10-5 | 1-8 | null | null | Sec 4.1.e | null | 8.2.3 [MP.PER.3]
8.2.4 [MP.PER.4] | null | null | null | null | B6.a
B6.b | B6 | null | null | null | null | null | null | null | null | 0720
0735
0252 | null | null | null | null | null | null | null | null | null | null | 4.5.2
4.5.2.7
4.5.2.8
7.2.2
7.2.2.19.PB | null | null | 9.1.4.C.01 | null | null | null | null | 3.6.1
3.6.4
6.1.5 | null | null | null | null | null | 6.7 | null | 1.7
1.8
1.9 | 3.1.7 | null | null | null | null | null | null | null | null | null | null | x | NAIC | null | x | R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
R-SA-2 | R-AC-1 | R-AC-2 | R-AC-3 | R-AC-4 | R-AM-1 | R-AM-2 | null | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | R-EX-6 | R-EX-7 | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | R-GV-8 | R-IR-1 | R-IR-2 | R-IR-3 | R-IR-4 | R-SA-1 | R-SA-2 | NT-1
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-11
MT-12
MT-13
MT-14
MT-15
MT-16 | NT-1 | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | NT-9 | NT-10 | NT-11 | NT-12 | NT-13 | NT-14 | MT-1 | MT-2 | MT-3 | MT-4 | MT-5 | MT-6 | MT-7 | MT-8 | MT-9 | null | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | MT-16 | null |
Security Awareness & Training | Cybersecurity & Data Privacy Awareness Training | SAT-02 | Mechanisms exist to provide all employees and contractors appropriate awareness education and training that is relevant for their job function. | null | E-SAT-02 | Does the organization provide all employees and contractors appropriate awareness education and training that is relevant for their job function? | 8 | Protect | X | X | null | There is no evidence of a capability to provide all employees and contractors appropriate awareness education and training that is relevant for their job function. | Security Awareness & Training (SAT) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Training activities are decentralized.
• Security awareness and training methods are often generic, without organization-specific content.
• IT/cybersecurity personnel self-manage their professional certification requirements to support their assigned duties.
• Personnel management is mainly decentralized, with the responsibility for training users on new technologies and enforcing policies being assigned to users’ supervisors and managers. | Security Awareness & Training (SAT) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Training and awareness activities are decentralized (e.g., a localized/regionalized function) and use non-standardized methods to implement secure and compliant practices.
• The Human Resources (HR) department works with cybersecurity personnel to facilitate workforce development and awareness to help ensure secure practices are implemented.
• Security awareness and training methods are role-based (e.g., handling sensitive/regulated data).
• IT/cybersecurity personnel:
o Identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for security training and awareness activities.
o Create/govern security and awareness training to meet specific statutory, regulatory and/ or contractual compliance obligations.
o Self-manage their professional certification requirements to support their assigned duties. | Security Awareness & Training (SAT) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A Governance, Risk & Compliance (GRC) function, or similar function:
o Provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data with regards to security awareness and training.
o Defines minimum cybersecurity training (including certifications) for personnel, based on their specific roles.
o Creates/governs security and awareness training to meet specific statutory, regulatory and/ or contractual compliance obligations.
• Security awareness and training methods are role-based (e.g., handling sensitive/regulated data).
• The Human Resources (HR) department:
o Identifies and implements industry-recognized HR practices related to security workforce development and awareness to help ensure secure practices are implemented in personnel management operations.
o Documents, retains and monitors individual training activities, including basic security awareness training, ongoing awareness training and specific-system training.
o Ensures that every user accessing a system processing, storing or transmitting sensitive/regulated data is formally trained in data handling requirements.
o Ensures all employees and contractors receive awareness education and training that is relevant for their job function, including social engineering-related threats. | Security Awareness & Training (SAT) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to provide all employees and contractors appropriate awareness education and training that is relevant for their job function. | null | CC2.2-POF8 | null | 14.3
14.7
14.8 | 14.3
14.7
14.8 | 14.3
14.7
14.8 | 14.3
14.7
14.8 | null | null | HRS-11
HRS-13 | TRN-02 | SO7 | null | null | null | 7.3 | 7.3 | 7.4
7.4(a)
7.4(b)
7.4(c)
7.4(d) | 7.2.2 | 6.3 | 7.2.2 | null | 6.4.2.2 | null | null | null | null | OR-3.1
OR-3.2 | Sec 4(D)(5) | null | GV.AT-P1
GV.AT-P2
GV.AT-P3 | null | null | null | AT-2 | AT-2 | AT-2 | AT-2 | AT-2 | AT-2 | AT-2 | AT-2 | AT-2 | null | null | AT-2 | AT-2 | AT-2 | null | null | null | null | null | null | null | 3.2.1 | 3.1.22.a
3.2.1.a
3.2.1.a.1
3.2.1.a.2
3.2.1.a.3
3.2.1.b | 3.2.1[a]
3.2.1[b]
3.2.1[c]
3.2.1[d] | null | 3.2.1e | null | null | PR.AT-01 | null | 12.6 | 8.3.8
9.5.1
9.5.1.3
12.6.3
12.6.3.1 | null | 8.3.8
12.6.3.1 | 9.5.1
9.5.1.3 | 9.5.1
9.5.1.3 | 8.3.8
9.5.1
9.5.1.3
12.6.3.1 | 12.6.3.1 | 8.3.8
9.5.1
9.5.1.3
12.6.3
12.6.3.1 | 8.3.8
9.5.1
9.5.1.3
12.6.3
12.6.3.1 | 9.5.1
9.5.1.3 | C.6.1 | 7.2 | 8.2.3 | null | null | null | WORKFORCE-2.A.MIL1
WORKFORCE-2.B.MIL2
WORKFORCE-2.C.MIL2
WORKFORCE-2.D.MIL2
WORKFORCE-2.E.MIL3
WORKFORCE-2.F.MIL3
WORKFORCE-2.G.MIL3 | GG2.GP5
OTA:SG2.SP1 | 4.3
4.4 | 5.2.1
5.2.1.1
5.2.1.2
5.2.1.3
5.2.1.4 | null | AT.L2-3.2.1 | AT.L2-3.2.1
TBD - 3.2.1e | null | AT.L2-3.2.1 | AT.L2-3.2.1
AT.L3-3.2.1e | AT-2 | null | null | null | null | null | null | null | AT-2 | AT-2 | AT-2 | AT-2 | AT-2 | AT-2 | AT-2 | AT-2 | AT-2 | AT-2 | null | null | null | null | 314.4(e)(1) | null | 1.S.B
4.S.C | 1.M.D | 1.M.D
1.L.C | 2.D.1
AT-2 | null | null | 8-101 | 2.1
2.3 | 6.1 | null | null | null | 5.7
5.10 | AT-2 | AT-2 | AT-2 | null | null | null | null | null | null | null | null | null | 17.04(8)
17.03(2)(b)(1) | null | null | Sec 4(2)(b)(ii)(A)(4) | null | 38-99-20(D)(5) | null | null | AT-2 | AT-2 | AT-2 | null | null | § 2447(b)(2)(A)
§ 2447(c)(8) | 3.4.7(49) | Art 13.6 | null | null | null | null | null | null | null | null | null | null | null | null | null | HR-03
DEV-04 | null | null | null | 20.2 | null | null | null | null | null | null | null | null | null | null | null | null | TPC-7 | null | 1-10-2
1-10-3
1-10-3-1
1-10-3-2
1-10-3-3
1-10-3-4 | 1-8 | null | null | null | null | 8.2.3 [MP.PER.3]
8.2.4 [MP.PER.4] | null | null | null | null | B6.b | B6 | null | null | null | null | null | null | null | null | 0252
1146
0824 | null | null | null | null | null | null | null | null | null | null | 4.5.2
4.5.3
4.5.3.1
7.2.2
7.2.2.19.PB | null | null | 9.1.5.C.01
9.1.5.C.02
9.1.6.C.01
9.1.6.C.02 | null | null | null | null | 3.6.1 | null | null | null | null | null | null | null | 1.8
1.9 | null | null | null | null | null | null | null | null | null | null | null | x | NAIC
MA 201 CMR 17 | null | x | R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
R-SA-2 | R-AC-1 | R-AC-2 | R-AC-3 | R-AC-4 | R-AM-1 | R-AM-2 | null | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | R-EX-6 | R-EX-7 | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | R-GV-8 | R-IR-1 | R-IR-2 | R-IR-3 | R-IR-4 | R-SA-1 | R-SA-2 | NT-1
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-11
MT-12
MT-13
MT-14
MT-15 | NT-1 | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | NT-9 | NT-10 | NT-11 | NT-12 | NT-13 | NT-14 | MT-1 | MT-2 | MT-3 | MT-4 | MT-5 | MT-6 | MT-7 | MT-8 | MT-9 | null | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Security Awareness & Training | Simulated Cyber Attack Scenario Training | SAT-02.1 | Mechanisms exist to include simulated actual cyber-attacks through practical exercises that are aligned with current threat scenarios. | null | E-SAT-03 | Does the organization include simulated actual cyber-attacks through practical exercises that are aligned with current threat scenarios? | 3 | Protect | null | X | null | There is no evidence of a capability to include simulated actual cyber-attacks through practical exercises that are aligned with current threat scenarios. | Security Awareness & Training (SAT) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Training activities are decentralized.
• Security awareness and training methods are often generic, without organization-specific content.
• IT/cybersecurity personnel self-manage their professional certification requirements to support their assigned duties. | Security Awareness & Training (SAT) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Training and awareness activities are decentralized (e.g., a localized/regionalized function) and use non-standardized methods to implement secure and compliant practices.
• The Human Resources (HR) department works with cybersecurity personnel to facilitate workforce development and awareness to help ensure secure practices are implemented.
• Security awareness and training methods are role-based (e.g., handling sensitive/regulated data).
• IT/cybersecurity personnel:
o Identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for security training and awareness activities.
o Create/govern security and awareness training to meet specific statutory, regulatory and/ or contractual compliance obligations.
o Self-manage their professional certification requirements to support their assigned duties. | Security Awareness & Training (SAT) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A Governance, Risk & Compliance (GRC) function, or similar function:
o Provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data with regards to security awareness and training.
o Defines minimum cybersecurity training (including certifications) for personnel, based on their specific roles.
o Creates/governs security and awareness training to meet specific statutory, regulatory and/ or contractual compliance obligations.
• A steering committee is formally established to provide executive oversight of the cybersecurity & data privacy program, including security awareness and training.
• Security awareness and training methods are role-based (e.g., handling sensitive/regulated data).
• The Human Resources (HR) department:
o Identifies and implements industry-recognized HR practices related to security workforce development and awareness to help ensure secure practices are implemented in personnel management operations.
o Documents, retains and monitors individual training activities, including basic security awareness training, ongoing awareness training and specific-system training.
o Ensures that every user accessing a system processing, storing or transmitting sensitive/regulated data is formally trained in data handling requirements.
o Ensures all employees and contractors receive awareness education and training that is relevant for their job function, including social engineering-related threats. | Security Awareness & Training (SAT) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to include simulated actual cyber-attacks through practical exercises that are aligned with current threat scenarios. | null | null | null | null | null | null | null | null | null | null | null | SO6 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | AT-2(1) | null | null | null | AT-2(1)
AT-6 | null | null | null | null | AT-2(1) | null | null | null | null | null | AT-2(1) | null | null | null | AT-2(1) | null | null | null | null | null | 3.2.2e | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | K.16 | null | null | null | null | null | null | null | null | null | null | null | TBD - 3.2.2e | null | null | AT.L3-3.2.2e | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 1.S.C | null | null | AT-2(1)
AT-6 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | B6.b | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | null | null | x | R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
R-SA-2 | R-AC-1 | R-AC-2 | R-AC-3 | R-AC-4 | R-AM-1 | R-AM-2 | null | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | R-EX-6 | R-EX-7 | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | null | R-IR-1 | R-IR-2 | R-IR-3 | R-IR-4 | R-SA-1 | R-SA-2 | NT-1
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | NT-1 | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | NT-9 | NT-10 | NT-11 | NT-12 | NT-13 | NT-14 | MT-1 | MT-2 | MT-3 | MT-4 | MT-5 | MT-6 | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Security Awareness & Training | Social Engineering & Mining | SAT-02.2 | Mechanisms exist to include awareness training on recognizing and reporting potential and actual instances of social engineering and social mining. | null | E-SAT-02 | Does the organization include awareness training on recognizing and reporting potential and actual instances of social engineering and social mining? | 5 | Protect | null | X | null | There is no evidence of a capability to include awareness training on recognizing and reporting potential and actual instances of social engineering and social mining. | Security Awareness & Training (SAT) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Training activities are decentralized.
• Security awareness and training methods are often generic, without organization-specific content.
• IT/cybersecurity personnel self-manage their professional certification requirements to support their assigned duties.
• Personnel management is mainly decentralized, with the responsibility for training users on new technologies and enforcing policies being assigned to users’ supervisors and managers. | Security Awareness & Training (SAT) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Training and awareness activities are decentralized (e.g., a localized/regionalized function) and use non-standardized methods to implement secure and compliant practices.
• The Human Resources (HR) department works with cybersecurity personnel to facilitate workforce development and awareness to help ensure secure practices are implemented.
• Security awareness and training methods are role-based (e.g., handling sensitive/regulated data).
• IT/cybersecurity personnel:
o Identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for security training and awareness activities.
o Create/govern security and awareness training to meet specific statutory, regulatory and/ or contractual compliance obligations.
o Self-manage their professional certification requirements to support their assigned duties. | Security Awareness & Training (SAT) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A Governance, Risk & Compliance (GRC) function, or similar function:
o Provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data with regards to security awareness and training.
o Defines minimum cybersecurity training (including certifications) for personnel, based on their specific roles.
o Creates/governs security and awareness training to meet specific statutory, regulatory and/ or contractual compliance obligations.
• A steering committee is formally established to provide executive oversight of the cybersecurity & data privacy program, including security awareness and training.
• Security awareness and training methods are role-based (e.g., handling sensitive/regulated data).
• The Human Resources (HR) department:
o Identifies and implements industry-recognized HR practices related to security workforce development and awareness to help ensure secure practices are implemented in personnel management operations.
o Documents, retains and monitors individual training activities, including basic security awareness training, ongoing awareness training and specific-system training.
o Ensures that every user accessing a system processing, storing or transmitting sensitive/regulated data is formally trained in data handling requirements.
o Ensures all employees and contractors receive awareness education and training that is relevant for their job function, including social engineering-related threats. | Security Awareness & Training (SAT) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to include awareness training on recognizing and reporting potential and actual instances of social engineering and social mining. | null | null | null | 9.0
14.2 | 14.2 | 14.2 | 14.2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | OR-3.2 | null | null | null | null | null | null | null | null | null | null | AT-2(3) | null | null | AT-2(3) | AT-2(3) | null | null | null | AT-2(3) | AT-2(3) | null | AT-2(3) | null | null | null | AT-2(3) | null | null | null | null | null | 3.2.1e | null | null | null | null | null | 12.6.3.1 | null | 12.6.3.1 | null | null | 12.6.3.1 | 12.6.3.1 | 12.6.3.1 | 12.6.3.1 | null | E.1.6.2 | null | null | null | null | null | null | null | null | null | null | null | TBD - 3.2.1e | null | null | AT.L3-3.2.1e | null | null | null | null | null | null | null | null | null | null | null | null | null | AT-2(3) | null | AT-2(3) | AT-2(3) | null | null | null | null | null | null | null | null | null | null | AT-2(3) | null | null | null | null | 6.1 | null | null | null | 5.10 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 20.4 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 1-10-3 | null | null | null | null | null | null | null | null | null | null | B6.b | null | null | null | null | null | null | null | null | null | 0817 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 1.8
1.9 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | R-BC-2
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-GV-1
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-4
R-SA-1
R-SA-2 | null | null | null | null | null | null | null | null | R-BC-2 | null | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | null | R-GV-1 | null | null | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | R-GV-8 | null | null | null | R-IR-4 | R-SA-1 | R-SA-2 | NT-7
MT-1
MT-2
MT-7
MT-8
MT-9
MT-11
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | null | null | MT-7 | MT-8 | MT-9 | null | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Security Awareness & Training | Role-Based Cybersecurity & Data Privacy Training | SAT-03 | Mechanisms exist to provide role-based cybersecurity & data privacy-related training:
▪ Before authorizing access to the system or performing assigned duties;
▪ When required by system changes; and
▪ Annually thereafter. | null | E-SAT-05 | Does the organization provide role-based cybersecurity & data privacy-related training:
▪ Before authorizing access to the system or performing assigned duties;
▪ When required by system changes; and
▪ Annually thereafter? | 8 | Protect | null | X | null | There is no evidence of a capability to provide role-based cybersecurity & data privacy-related training:
▪ Before authorizing access to the system or performing assigned duties;
▪ When required by system changes; and
▪ Annually thereafter. | Security Awareness & Training (SAT) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Training activities are decentralized.
• Security awareness and training methods are often generic, without organization-specific content.
• IT/cybersecurity personnel self-manage their professional certification requirements to support their assigned duties.
• Personnel management is mainly decentralized, with the responsibility for training users on new technologies and enforcing policies being assigned to users’ supervisors and managers. | Security Awareness & Training (SAT) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Training and awareness activities are decentralized (e.g., a localized/regionalized function) and use non-standardized methods to implement secure and compliant practices.
• The Human Resources (HR) department works with cybersecurity personnel to facilitate workforce development and awareness to help ensure secure practices are implemented.
• Security awareness and training methods are role-based (e.g., handling sensitive/regulated data).
• IT/cybersecurity personnel:
o Identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for security training and awareness activities.
o Create/govern security and awareness training to meet specific statutory, regulatory and/ or contractual compliance obligations.
o Self-manage their professional certification requirements to support their assigned duties. | Security Awareness & Training (SAT) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A Governance, Risk & Compliance (GRC) function, or similar function:
o Provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data with regards to security awareness and training.
o Defines minimum cybersecurity training (including certifications) for personnel, based on their specific roles.
o Creates/governs security and awareness training to meet specific statutory, regulatory and/ or contractual compliance obligations.
• A steering committee is formally established to provide executive oversight of the cybersecurity & data privacy program, including security awareness and training.
• Security awareness and training methods are role-based (e.g., handling sensitive/regulated data).
• The Human Resources (HR) department:
o Identifies and implements industry-recognized HR practices related to security workforce development and awareness to help ensure secure practices are implemented in personnel management operations.
o Documents, retains and monitors individual training activities, including basic security awareness training, ongoing awareness training and specific-system training.
o Ensures that every user accessing a system processing, storing or transmitting sensitive/regulated data is formally trained in data handling requirements.
o Ensures all employees and contractors receive awareness education and training that is relevant for their job function, including social engineering-related threats. | Security Awareness & Training (SAT) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to provide role-based cybersecurity & data privacy-related training:
▪ Before authorizing access to the system or performing assigned duties;
▪ When required by system changes; and
▪ Annually thereafter. | null | CC1.4-POF7 | null | 14.3
14.4
14.7
14.8
16.9 | 14.3
14.4
14.7
14.8 | 14.3
14.4
14.7
14.8
16.9 | 14.3
14.4
14.7
14.8
16.9 | null | null | HRS-11
HRS-12
HRS-13 | TRN-01
TRN-02 | SO6 | null | null | null | 7.3 | 7.3 | null | 7.2.1
7.2.2 | 5.4
6.3 | 7.2.1
7.2.2 | null | null | null | null | null | null | OR-3.1
OR-3.2 | Sec 4(D)(5) | GOVERN 2.2 | GV.AT-P1
GV.AT-P2
GV.AT-P3 | PO.2.2 | null | null | AT-3 | AT-3 | AT-3 | AT-3 | AT-3
AT-3(2) | AT-3 | AT-3 | AT-3 | AT-3 | null | null | AT-3 | AT-3 | AT-3 | null | AT-3
AT-3(2) | AT-3 | AT-3 | null | AT-3
AT-3(2) | null | 3.2.2 | 3.1.22.a
3.2.1.a.1
3.2.2.a
3.2.2.a.1
3.2.2.a.2
3.2.2.b | 3.2.2[a]
3.2.2[b]
3.2.2[c] | A.03.02.02.a.01[01]
A.03.02.02.a.01[02]
A.03.02.02.a.01[03]
A.03.02.02.a.02
A.03.02.02.b[01]
A.03.02.02.b[02]
A.03.02.02.ODP[01] | null | PO.2
PO.2.2
PO.2.3 | PR.AT-2
PR.AT-4
PR.AT-5 | PR.AT-02 | null | 12.6.1 | 6.2.2
8.3.8
9.5.1
9.5.1.3
12.6.3
12.6.3.1
12.6.3.2 | null | 6.2.2
8.3.8
12.6.3.1 | 9.5.1
9.5.1.3 | 9.5.1
9.5.1.3 | 6.2.2
8.3.8
9.5.1
9.5.1.3
12.6.3.1 | 12.6.3.1 | 6.2.2
8.3.8
9.5.1
9.5.1.3
12.6.3.1
12.6.3.2 | 6.2.2
8.3.8
9.5.1
9.5.1.3
12.6.3.1
12.6.3.2 | 9.5.1
9.5.1.3 | E.1.6.4 | 7.2 | 2.1.3
8.2.3 | null | null | null | WORKFORCE-2.E.MIL3 | GG2.GP5
OTA:SG4.SP1
OTA:SG4.SP3 | 4.3
4.4 | 5.2.1
5.2.1.1
5.2.1.2
5.2.1.3
5.2.1.4
5.2.2 | null | AT.L2-3.2.2 | AT.L2-3.2.2 | null | AT.L2-3.2.2 | AT.L2-3.2.2 | AT-3 | null | null | null | null | null | null | § 11.10
§ 11.10(i) | AT-3 | AT-3 | AT-3 | AT-3 | AT-3 | AT-3 | AT-3 | AT-3 | AT-3 | AT-3 | null | D1.TC.Tr.E.3
D1.R.St.E.3 | null | null | 314.4(e)(1) | 164.530(b)
164.530(b)(1)
164.530(b)(2) | 1.S.B
4.S.C | 1.M.D | 1.M.D
1.L.C | 2.D.1
2.D.2.1
2.D.2.2
AT-3 | null | CIP-004-6
R2 | 8-101
8-103
8-104 | 2.1
2.2
2.3 | 6.1 | null | null | null | 5.10 | AT-3 | AT-3 | AT-3 | null | null | null | 7100(a)
7100(b) | null | null | null | null | null | 17.04(8) | null | null | Sec 4(2)(b)(ii)(A)(4) | 622(2)(d)(A)(iv | 38-99-20(D)(5) | null | null | AT-3 | AT-3 | AT-3 | null | null | § 2447(b)(2)(A)
§ 2447(c)(8) | 3.2.1(3)
3.4.7(49) | Art 13.6 | null | null | null | null | null | null | null | null | null | null | null | null | null | DEV-04 | null | null | null | 20.2
25.3 | null | null | null | null | null | null | null | null | null | Article 11.3 | null | null | TPC-7 | 3.1.6
3.1.7 | 1-10-3
1-10-3-1
1-10-3-2
1-10-3-3
1-10-3-4
1-10-4
1-10-4-1
1-10-4-2
1-10-4-3 | 1-8-1
1-8-2
1-8-3 | null | null | null | null | 8.2.3 [MP.PER.3]
8.2.4 [MP.PER.4] | null | null | null | null | B6.a
B6.b | null | null | null | null | null | null | null | null | null | 1146
1740 | null | null | null | Article 27 | null | null | null | null | null | null | 4.5.2
4.5.3
4.5.3.1
7.2.1
7.2.2
7.2.2.19.PB | null | null | 9.1.6.C.01
9.1.6.C.02
9.1.6.C.03 | null | null | null | null | 3.6.2
3.6.3
6.1.5 | null | null | null | null | null | null | null | 1.7
1.8
1.9 | null | null | null | null | null | null | null | null | null | null | null | x | NAIC
MA 201 CMR 17
OR 6464A | null | x | R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
R-SA-2 | R-AC-1 | R-AC-2 | R-AC-3 | R-AC-4 | R-AM-1 | R-AM-2 | null | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | R-EX-6 | R-EX-7 | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | R-GV-8 | R-IR-1 | R-IR-2 | R-IR-3 | R-IR-4 | R-SA-1 | R-SA-2 | NT-7
MT-1
MT-2
MT-7
MT-8
MT-9
MT-11
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | null | null | MT-7 | MT-8 | MT-9 | null | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Security Awareness & Training | Practical Exercises | SAT-03.1 | Mechanisms exist to include practical exercises in cybersecurity & data privacy training that reinforce training objectives. | null | E-SAT-03 | Does the organization include practical exercises in cybersecurity & data privacy training that reinforce training objectives? | 3 | Protect | null | X | null | There is no evidence of a capability to include practical exercises in cybersecurity & data privacy training that reinforce training objectives. | Security Awareness & Training (SAT) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Training activities are decentralized.
• Security awareness and training methods are often generic, without organization-specific content.
• IT/cybersecurity personnel self-manage their professional certification requirements to support their assigned duties.
• Personnel management is mainly decentralized, with the responsibility for training users on new technologies and enforcing policies being assigned to users’ supervisors and managers. | Security Awareness & Training (SAT) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Training and awareness activities are decentralized (e.g., a localized/regionalized function) and use non-standardized methods to implement secure and compliant practices.
• The Human Resources (HR) department works with cybersecurity personnel to facilitate workforce development and awareness to help ensure secure practices are implemented.
• Security awareness and training methods are role-based (e.g., handling sensitive/regulated data).
• IT/cybersecurity personnel:
o Identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for security training and awareness activities.
o Create/govern security and awareness training to meet specific statutory, regulatory and/ or contractual compliance obligations.
o Self-manage their professional certification requirements to support their assigned duties.
• Administrative processes, physical controls and technologies exist to simulate actual cyber-attacks through practical exercises that reinforce training objectives. | Security Awareness & Training (SAT) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A Governance, Risk & Compliance (GRC) function, or similar function:
o Provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data with regards to security awareness and training.
o Defines minimum cybersecurity training (including certifications) for personnel, based on their specific roles.
o Creates/governs security and awareness training to meet specific statutory, regulatory and/ or contractual compliance obligations.
• A steering committee is formally established to provide executive oversight of the cybersecurity & data privacy program, including security awareness and training.
• Security awareness and training methods are role-based (e.g., handling sensitive/regulated data).
• The Human Resources (HR) department:
o Identifies and implements industry-recognized HR practices related to security workforce development and awareness to help ensure secure practices are implemented in personnel management operations.
o Documents, retains and monitors individual training activities, including basic security awareness training, ongoing awareness training and specific-system training.
o Ensures that every user accessing a system processing, storing or transmitting sensitive/regulated data is formally trained in data handling requirements.
o Ensures all employees and contractors receive awareness education and training that is relevant for their job function, including social engineering-related threats.
• Administrative processes, physical controls and technologies exist to simulate actual cyber-attacks through practical exercises that reinforce training objectives. | Security Awareness & Training (SAT) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to include practical exercises in cybersecurity & data privacy training that reinforce training objectives. | null | null | null | 14.9 | null | 14.9 | 14.9 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | AT-3(3) | null | null | null | AT-3(3) | null | null | null | null | AT-3(3) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 3.2.2e | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | K.15.1 | null | null | null | null | null | null | OTA:SG2.SP3 | null | null | null | null | null | null | null | AT.L3-3.2.2e | null | null | null | null | null | null | null | null | AT-3(3) | null | null | AT-3(3) | null | null | null | null | null | null | null | null | null | null | null | null | null | 1.M.D | 1.M.D | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | B6.b | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 3.1.7 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | R-AM-3
R-BC-2
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-GV-1
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-4
R-SA-1
R-SA-2 | null | null | null | null | null | null | R-AM-3 | null | R-BC-2 | null | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | null | R-GV-1 | null | null | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | R-GV-8 | null | null | null | R-IR-4 | R-SA-1 | R-SA-2 | NT-7
MT-1
MT-2
MT-7
MT-8
MT-9
MT-11
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | null | null | MT-7 | MT-8 | MT-9 | null | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Security Awareness & Training | Suspicious Communications & Anomalous System Behavior | SAT-03.2 | Mechanisms exist to provide training to personnel on organization-defined indicators of malware to recognize suspicious communications and anomalous behavior. | null | null | Does the organization provide training to personnel on organization-defined indicators of malware to recognize suspicious communications and anomalous behavior? | 9 | Protect | null | X | null | There is no evidence of a capability to provide training to personnel on organization-defined indicators of malware to recognize suspicious communications and anomalous behavior. | Security Awareness & Training (SAT) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Training activities are decentralized.
• Security awareness and training methods are often generic, without organization-specific content.
• IT/cybersecurity personnel self-manage their professional certification requirements to support their assigned duties.
• Personnel management is mainly decentralized, with the responsibility for training users on new technologies and enforcing policies being assigned to users’ supervisors and managers. | Security Awareness & Training (SAT) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Training and awareness activities are decentralized (e.g., a localized/regionalized function) and use non-standardized methods to implement secure and compliant practices.
• The Human Resources (HR) department works with cybersecurity personnel to facilitate workforce development and awareness to help ensure secure practices are implemented.
• Security awareness and training methods are role-based (e.g., handling sensitive/regulated data).
• IT/cybersecurity personnel:
o Identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for security training and awareness activities.
o Create/govern security and awareness training to meet specific statutory, regulatory and/ or contractual compliance obligations.
o Self-manage their professional certification requirements to support their assigned duties. | Security Awareness & Training (SAT) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A Governance, Risk & Compliance (GRC) function, or similar function:
o Provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data with regards to security awareness and training.
o Defines minimum cybersecurity training (including certifications) for personnel, based on their specific roles.
o Creates/governs security and awareness training to meet specific statutory, regulatory and/ or contractual compliance obligations.
• A steering committee is formally established to provide executive oversight of the cybersecurity & data privacy program, including security awareness and training.
• Security awareness and training methods are role-based (e.g., handling sensitive/regulated data).
• The Human Resources (HR) department:
o Identifies and implements industry-recognized HR practices related to security workforce development and awareness to help ensure secure practices are implemented in personnel management operations.
o Documents, retains and monitors individual training activities, including basic security awareness training, ongoing awareness training and specific-system training.
o Ensures that every user accessing a system processing, storing or transmitting sensitive/regulated data is formally trained in data handling requirements.
o Ensures all employees and contractors receive awareness education and training that is relevant for their job function, including social engineering-related threats. | Security Awareness & Training (SAT) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to provide training to personnel on organization-defined indicators of malware to recognize suspicious communications and anomalous behavior. | null | null | null | 14.6 | 14.6 | 14.6 | 14.6 | null | null | LOG-05 | MON-10
MON-11 | null | null | null | null | null | null | null | null | null | 7.2.2 | null | null | null | null | null | null | OR-3.2 | null | null | null | null | null | null | AT-3(4) | null | null | null | AT-2(4)
AT-2(5) | null | null | null | null | AT-2(4)
AT-2(5) | null | null | AT-2(4) | AT-2(4) | null | AT-2(4)
AT-2(5) | null | null | null | AT-2(4)
AT-2(5) | null | null | null | null | null | 3.2.1e | null | null | null | null | null | 11.5
11.5.1
11.5.1.1 | null | 11.5.1 | null | null | null | null | 11.5.1 | 11.5.1
11.5.1.1 | null | E.1.6.2 | 2.9 | null | null | null | null | null | null | null | null | null | null | TBD - 3.2.1e | null | null | AT.L3-3.2.1e | null | null | null | null | null | null | null | null | AT-3(4) | null | null | AT-3(4) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 8.L.D | AT-2(4) | null | null | null | null | null | null | null | null | 5.10 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | § 2447(c)(4) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 1-8-1
1-8-2
1-8-3
2-3-1-12 | null | null | null | null | null | null | null | null | null | B6.b | null | null | null | null | null | null | null | null | null | 0817
0824
1740 | null | null | null | null | null | null | null | null | null | null | 7.2.2.19.PB | null | null | null | null | null | null | null | 9.2.2
11.5.5
12.2.4 | null | null | null | null | null | null | null | 1.8
1.9 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | R-BC-2
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-GV-1
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-4
R-SA-1
R-SA-2 | null | null | null | null | null | null | null | null | R-BC-2 | null | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | null | R-GV-1 | null | null | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | R-GV-8 | null | null | null | R-IR-4 | R-SA-1 | R-SA-2 | NT-7
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-11
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | MT-3 | MT-4 | MT-5 | MT-6 | MT-7 | MT-8 | MT-9 | null | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | - Added NIST 800-53 R5 mapping for AT-2(4) |
Security Awareness & Training | Sensitive Information Storage, Handling & Processing | SAT-03.3 | Mechanisms exist to ensure that every user accessing a system processing, storing or transmitting sensitive information is formally trained in data handling requirements. | null | null | Does the organization ensure that every user accessing a system processing, storing or transmitting sensitive information is formally trained in data handling requirements? | 9 | Protect | null | X | null | There is no evidence of a capability to ensure that every user accessing a system processing, storing or transmitting sensitive information is formally trained in data handling requirements. | Security Awareness & Training (SAT) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Training activities are decentralized.
• Security awareness and training methods are often generic, without organization-specific content.
• IT/cybersecurity personnel self-manage their professional certification requirements to support their assigned duties. | Security Awareness & Training (SAT) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Training and awareness activities are decentralized (e.g., a localized/regionalized function) and use non-standardized methods to implement secure and compliant practices.
• The Human Resources (HR) department works with cybersecurity personnel to facilitate workforce development and awareness to help ensure secure practices are implemented.
• Security awareness and training methods are role-based (e.g., handling sensitive/regulated data).
• IT/cybersecurity personnel:
o Identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for security training and awareness activities.
o Create/govern security and awareness training to meet specific statutory, regulatory and/ or contractual compliance obligations.
o Self-manage their professional certification requirements to support their assigned duties. | Security Awareness & Training (SAT) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A Governance, Risk & Compliance (GRC) function, or similar function:
o Provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data with regards to security awareness and training.
o Defines minimum cybersecurity training (including certifications) for personnel, based on their specific roles.
o Creates/governs security and awareness training to meet specific statutory, regulatory and/ or contractual compliance obligations.
• A steering committee is formally established to provide executive oversight of the cybersecurity & data privacy program, including security awareness and training.
• Security awareness and training methods are role-based (e.g., handling sensitive/regulated data).
• The Human Resources (HR) department:
o Identifies and implements industry-recognized HR practices related to security workforce development and awareness to help ensure secure practices are implemented in personnel management operations.
o Documents, retains and monitors individual training activities, including basic security awareness training, ongoing awareness training and specific-system training.
o Ensures that every user accessing a system processing, storing or transmitting sensitive/regulated data is formally trained in data handling requirements.
o Ensures all employees and contractors receive awareness education and training that is relevant for their job function, including social engineering-related threats. | Security Awareness & Training (SAT) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to ensure that every user accessing a system processing, storing or transmitting sensitive information is formally trained in data handling requirements. | null | CC2.2-POF9 | null | 14.5 | 14.5 | 14.5 | 14.5 | null | null | DSP-17
HRS-12
HRS-13 | TRN-02 | null | 1.1.1
1.2.10 | null | null | null | null | null | null | null | 7.2.2 | null | null | null | null | null | null | OR-3.1
OR-3.2 | null | null | null | null | null | null | AR-5 | null | null | null | AT-3(5) | AT-3(5) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 3.1.22.a
3.2.1.a.1
3.2.2.a
3.2.2.a.1
3.2.2.a.2
3.2.2.b | null | null | 3.2.1e | null | null | PR.AT-02 | null | 1.5
2.5
3.7
4.3
5.4
6.7
7.3
8.8
9.10
10.9
11.6
12.6
12.6.1
12.6.2
12.8.3
12.8.5
12.10.4 | 9.5.1
9.5.1.3
12.6.3.1
12.6.3.2 | null | 12.6.3.1 | 9.5.1
9.5.1.3 | 9.5.1
9.5.1.3 | 9.5.1
9.5.1.3
12.6.3.1 | 12.6.3.1 | 9.5.1
9.5.1.3
12.6.3.1
12.6.3.2 | 9.5.1
9.5.1.3
12.6.3.1
12.6.3.2 | 9.5.1
9.5.1.3 | E.1.6 | 7.2 | 2.1.3
8.2.3 | null | null | null | WORKFORCE-2.C.MIL2 | OTA:SG1.SP2
OTA:SG4.SP1 | 4.3
4.4 | 5.1.1.1
5.8.1 | null | null | null | null | null | AT.L3-3.2.1e | AR-5 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 314.4(e)(1) | null | null | null | null | 2.D.2.1
2.D.2.2 | null | CIP-004-6
R2 | null | 2.1
2.2 | null | null | null | null | 5.10 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Sec 4(2)(b)(ii)(A)(4) | null | null | null | null | null | null | null | null | null | § 2447(c)(8) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 20.3 | null | null | null | null | null | null | null | null | null | Article 11.3 | null | null | null | 3.1.7 | 1-10-4-2 | null | null | null | null | null | null | null | null | null | null | B6.b | null | null | null | null | null | null | null | null | null | 0831
1059 | null | null | null | null | null | null | null | null | null | null | 4.5.3
4.5.3.1
7.2.2.19.PB | null | null | null | null | null | null | null | 3.6.2
3.6.3
6.1.5 | null | null | null | null | null | null | null | 1.7 | null | null | null | null | null | null | null | null | null | null | null | x | null | null | null | R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
R-SA-2 | R-AC-1 | R-AC-2 | R-AC-3 | R-AC-4 | R-AM-1 | R-AM-2 | null | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | R-EX-6 | R-EX-7 | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | R-GV-8 | R-IR-1 | R-IR-2 | R-IR-3 | R-IR-4 | R-SA-1 | R-SA-2 | NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-11
MT-12
MT-13
MT-14
MT-15 | null | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | NT-9 | NT-10 | NT-11 | NT-12 | NT-13 | NT-14 | MT-1 | MT-2 | MT-3 | MT-4 | MT-5 | MT-6 | MT-7 | MT-8 | MT-9 | null | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Security Awareness & Training | Vendor Cybersecurity & Data Privacy Training | SAT-03.4 | Mechanisms exist to incorporate vendor-specific security training in support of new technology initiatives. | null | E-SAT-04
E-SAT-05 | Does the organization incorporate vendor-specific security training in support of new technology initiatives? | 7 | Protect | null | X | null | There is no evidence of a capability to incorporate vendor-specific security training in support of new technology initiatives. | Security Awareness & Training (SAT) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Training activities are decentralized.
• Security awareness and training methods are often generic, without organization-specific content.
• IT/cybersecurity personnel self-manage their professional certification requirements to support their assigned duties.
• Personnel management is mainly decentralized, with the responsibility for training users on new technologies and enforcing policies being assigned to users’ supervisors and managers. | Security Awareness & Training (SAT) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Training and awareness activities are decentralized (e.g., a localized/regionalized function) and use non-standardized methods to implement secure and compliant practices.
• The Human Resources (HR) department works with cybersecurity personnel to facilitate workforce development and awareness to help ensure secure practices are implemented.
• Security awareness and training methods are role-based (e.g., handling sensitive/regulated data).
• IT/cybersecurity personnel:
o Identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for security training and awareness activities.
o Create/govern security and awareness training to meet specific statutory, regulatory and/ or contractual compliance obligations.
o Self-manage their professional certification requirements to support their assigned duties.
• Business process owners are required to incorporate vendor-specific security training in support of new technology initiatives. | Security Awareness & Training (SAT) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A Governance, Risk & Compliance (GRC) function, or similar function:
o Provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data with regards to security awareness and training.
o Defines minimum cybersecurity training (including certifications) for personnel, based on their specific roles.
o Creates/governs security and awareness training to meet specific statutory, regulatory and/ or contractual compliance obligations.
• A steering committee is formally established to provide executive oversight of the cybersecurity & data privacy program, including security awareness and training.
• Security awareness and training methods are role-based (e.g., handling sensitive/regulated data).
• The Human Resources (HR) department:
o Identifies and implements industry-recognized HR practices related to security workforce development and awareness to help ensure secure practices are implemented in personnel management operations.
o Documents, retains and monitors individual training activities, including basic security awareness training, ongoing awareness training and specific-system training.
o Ensures that every user accessing a system processing, storing or transmitting sensitive/regulated data is formally trained in data handling requirements.
o Ensures all employees and contractors receive awareness education and training that is relevant for their job function, including social engineering-related threats.
• Business process owners are required to incorporate vendor-specific security training in support of new technology initiatives. | Security Awareness & Training (SAT) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to incorporate vendor-specific security training in support of new technology initiatives. | null | null | null | null | null | null | null | null | null | null | TRN-02 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | I.1.6 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | CIP-004-6
R2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | DEV-04 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
R-SA-2 | R-AC-1 | R-AC-2 | R-AC-3 | R-AC-4 | R-AM-1 | R-AM-2 | null | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | R-EX-6 | R-EX-7 | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | R-GV-8 | R-IR-1 | R-IR-2 | R-IR-3 | R-IR-4 | R-SA-1 | R-SA-2 | NT-7
MT-1
MT-2
MT-7
MT-8
MT-9
MT-11
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | null | null | MT-7 | MT-8 | MT-9 | null | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Security Awareness & Training | Privileged Users | SAT-03.5 | Mechanisms exist to provide specific training for privileged users to ensure privileged users understand their unique roles and responsibilities | null | E-SAT-05 | Does the organization provide specific training for privileged users to ensure privileged users understand their unique roles and responsibilities | 9 | Protect | null | X | null | There is no evidence of a capability to provide specific training for privileged users to ensure privileged users understand their unique roles and responsibilities | Security Awareness & Training (SAT) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Training activities are decentralized.
• Security awareness and training methods are often generic, without organization-specific content.
• IT/cybersecurity personnel self-manage their professional certification requirements to support their assigned duties. | Security Awareness & Training (SAT) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Training and awareness activities are decentralized (e.g., a localized/regionalized function) and use non-standardized methods to implement secure and compliant practices.
• The Human Resources (HR) department works with cybersecurity personnel to facilitate workforce development and awareness to help ensure secure practices are implemented.
• Security awareness and training methods are role-based (e.g., handling sensitive/regulated data).
• IT/cybersecurity personnel:
o Identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for security training and awareness activities.
o Create/govern security and awareness training to meet specific statutory, regulatory and/ or contractual compliance obligations.
o Self-manage their professional certification requirements to support their assigned duties.
• Privileged users receive formal security and/ or data privacy awareness training to ensure they understand their unique roles and responsibilities. | Security Awareness & Training (SAT) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A Governance, Risk & Compliance (GRC) function, or similar function:
o Provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data with regards to security awareness and training.
o Defines minimum cybersecurity training (including certifications) for personnel, based on their specific roles.
o Creates/governs security and awareness training to meet specific statutory, regulatory and/ or contractual compliance obligations.
• A steering committee is formally established to provide executive oversight of the cybersecurity & data privacy program, including security awareness and training.
• Security awareness and training methods are role-based (e.g., handling sensitive/regulated data).
• The Human Resources (HR) department:
o Identifies and implements industry-recognized HR practices related to security workforce development and awareness to help ensure secure practices are implemented in personnel management operations.
o Documents, retains and monitors individual training activities, including basic security awareness training, ongoing awareness training and specific-system training.
o Ensures that every user accessing a system processing, storing or transmitting sensitive/regulated data is formally trained in data handling requirements.
o Ensures all employees and contractors receive awareness education and training that is relevant for their job function, including social engineering-related threats.
• Privileged users receive formal security and/ or data privacy awareness training to ensure they understand their unique roles and responsibilities. | Security Awareness & Training (SAT) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to provide specific training for privileged users to ensure privileged users understand their unique roles and responsibilities | null | CC2.2-POF9 | null | null | null | null | null | null | null | IAM-09 | null | null | null | null | null | null | null | null | null | null | 7.2.2 | null | null | null | null | null | null | OR-3.2 | null | GOVERN 2.2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 3.2.1e | null | PR.AT-2
PR.AT-5 | PR.AT-02 | null | null | null | null | null | null | null | null | null | null | null | null | P.3 | 7.2 | null | null | null | null | null | null | 4.3
4.4 | null | null | null | null | null | null | AT.L3-3.2.1e | null | null | null | null | null | null | null | § 11.10
§ 11.10(i) | null | null | null | null | null | null | null | null | null | null | null | D1.TC.Tr.E.3
D1.R.St.E.3 | null | null | 314.4(e)(3) | null | null | null | null | null | null | CIP-004-6
R2 | null | 2.2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 1-10-4-1 | 1-8-1
1-8-2
1-8-3 | null | null | null | null | null | null | null | null | null | B6.b | null | null | null | null | null | null | null | null | null | 1565 | null | null | null | null | null | null | null | null | null | null | 7.2.2.19.PB | null | null | null | null | null | null | null | 6.1.5 | null | null | null | null | null | null | null | 1.7 | null | null | null | null | null | null | null | null | null | null | null | x | null | null | null | R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
R-SA-2 | R-AC-1 | R-AC-2 | R-AC-3 | R-AC-4 | R-AM-1 | R-AM-2 | null | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | R-EX-6 | R-EX-7 | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | R-GV-8 | R-IR-1 | R-IR-2 | R-IR-3 | R-IR-4 | R-SA-1 | R-SA-2 | NT-1
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-11
MT-12
MT-13
MT-14
MT-15 | NT-1 | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | NT-9 | NT-10 | NT-11 | NT-12 | NT-13 | NT-14 | MT-1 | MT-2 | MT-3 | MT-4 | MT-5 | MT-6 | MT-7 | MT-8 | MT-9 | null | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Security Awareness & Training | Cyber Threat Environment | SAT-03.6 | Mechanisms exist to provide role-based cybersecurity & data privacy awareness training that is specific to the cyber threats that the user might encounter the user's specific day-to-day business operations. | null | E-SAT-04 | Does the organization provide role-based cybersecurity & data privacy awareness training that is specific to the cyber threats that the user might encounter the user's specific day-to-day business operations? | 8 | Identify | null | X | null | There is no evidence of a capability to provide role-based cybersecurity & data privacy awareness training that is specific to the cyber threats that the user might encounter the user's specific day-to-day business operations. | SP-CMM1 is N/A, since a structured process is required to provide role-based cybersecurity & data privacy awareness training that is specific to the cyber threats that the user might encounter the user's specific day-to-day business operations. | Security Awareness & Training (SAT) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Training and awareness activities are decentralized (e.g., a localized/regionalized function) and use non-standardized methods to implement secure and compliant practices.
• The Human Resources (HR) department works with cybersecurity personnel to facilitate workforce development and awareness to help ensure secure practices are implemented.
• Security awareness and training methods are role-based (e.g., handling sensitive/regulated data).
• IT/cybersecurity personnel:
o Identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for security training and awareness activities.
o Create/govern security and awareness training to meet specific statutory, regulatory and/ or contractual compliance obligations.
o Self-manage their professional certification requirements to support their assigned duties. | Security Awareness & Training (SAT) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A Governance, Risk & Compliance (GRC) function, or similar function:
o Provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data with regards to security awareness and training.
o Defines minimum cybersecurity training (including certifications) for personnel, based on their specific roles.
o Creates/governs security and awareness training to meet specific statutory, regulatory and/ or contractual compliance obligations.
• A steering committee is formally established to provide executive oversight of the cybersecurity & data privacy program, including security awareness and training.
• Security awareness and training methods are role-based (e.g., handling sensitive/regulated data).
• The Human Resources (HR) department:
o Identifies and implements industry-recognized HR practices related to security workforce development and awareness to help ensure secure practices are implemented in personnel management operations.
o Documents, retains and monitors individual training activities, including basic security awareness training, ongoing awareness training and specific-system training.
o Ensures that every user accessing a system processing, storing or transmitting sensitive/regulated data is formally trained in data handling requirements.
o Ensures all employees and contractors receive awareness education and training that is relevant for their job function, including social engineering-related threats. | See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to provide role-based cybersecurity & data privacy awareness training that is specific to the cyber threats that the user might encounter the user's specific day-to-day business operations. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to provide role-based cybersecurity & data privacy awareness training that is specific to the cyber threats that the user might encounter the user's specific day-to-day business operations. | null | CC2.2-POF8 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | OR-3.2 | null | GOVERN 2.2 | null | null | null | null | null | null | null | null | AT-2(6) | null | null | null | null | AT-2(6) | null | null | null | null | null | AT-2(6) | null | null | null | AT-2(6) | null | null | 3.2.1.a.1
3.2.1.a.2
3.2.1.a.3
3.2.1.b
3.2.2.a
3.2.2.a.1
3.2.2.a.2
3.2.2.b | null | A.03.02.01.a.03[01]
A.03.02.01.a.03[02]
A.03.02.01.a.03[03]
A.03.02.01.a.03[04]
A.03.02.01.a.03[05]
A.03.02.01.a.03[06] | 3.2.1e
3.2.2e | null | null | PR.AT-02 | null | null | 9.5.1
9.5.1.3
12.6.3
12.6.3.1
12.6.3.2 | null | 12.6.3.1 | 9.5.1
9.5.1.3 | 9.5.1
9.5.1.3 | 9.5.1
9.5.1.3
12.6.3.1 | 12.6.3.1 | 9.5.1
9.5.1.3
12.6.3
12.6.3.1
12.6.3.2 | 9.5.1
9.5.1.3
12.6.3
12.6.3.1
12.6.3.2 | 9.5.1
9.5.1.3 | P.3 | 7.2 | 8.2.3 | null | null | null | WORKFORCE-2.C.MIL2
WORKFORCE-2.F.MIL3
WORKFORCE-2.G.MIL3 | null | 4.3
4.4 | null | null | null | TBD - 3.2.1e | null | null | AT.L3-3.2.1e
AT.L3-3.2.2e | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 314.4(e)(1) | null | null | null | null | null | null | null | null | null | 6.1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Art 13.6 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 1-8-1
1-8-2
1-8-3 | null | null | null | null | null | null | null | null | null | B6.a
B6.b | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 1.7
1.8
1.9 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
R-SA-2 | R-AC-1 | R-AC-2 | R-AC-3 | R-AC-4 | R-AM-1 | R-AM-2 | null | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | R-EX-6 | R-EX-7 | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | R-GV-8 | R-IR-1 | R-IR-2 | R-IR-3 | R-IR-4 | R-SA-1 | R-SA-2 | NT-7
MT-1
MT-2
MT-7
MT-8
MT-9
MT-11
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | null | null | MT-7 | MT-8 | MT-9 | null | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Security Awareness & Training | Continuing Professional Education (CPE) - Cybersecurity & Data Privacy Personnel | SAT-03.7 | Mechanisms exist to ensure cybersecurity & data privacy personnel receive Continuing Professional Education (CPE) training to maintain currency and proficiency with industry-recognized secure practices that are pertinent to their assigned roles and responsibilities. | null | E-SAT-01
E-SAT-04 | Does the organization ensure cybersecurity & data privacy personnel receive Continuing Professional Education (CPE) training to maintain currency and proficiency with industry-recognized secure practices that are pertinent to their assigned roles and responsibilities? | 8 | Identify | null | X | null | There is no evidence of a capability to ensure cybersecurity & data privacy personnel receive Continuing Professional Education (CPE) training to maintain currency and proficiency with industry-recognized secure practices that are pertinent to their assigned roles and responsibilities. | SP-CMM1 is N/A, since a structured process is required to ensure cybersecurity & data privacy personnel receive Continuing Professional Education (CPE) training to maintain currency and proficiency with industry-recognized secure practices that are pertinent to their assigned roles and responsibilities. | SP-CMM2 is N/A, since a well-defined process is required to ensure cybersecurity & data privacy personnel receive Continuing Professional Education (CPE) training to maintain currency and proficiency with industry-recognized secure practices that are pertinent to their assigned roles and responsibilities. | Security Awareness & Training (SAT) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A Governance, Risk & Compliance (GRC) function, or similar function:
o Provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data with regards to security awareness and training.
o Defines minimum cybersecurity training (including certifications) for personnel, based on their specific roles.
o Creates/governs security and awareness training to meet specific statutory, regulatory and/ or contractual compliance obligations.
• A steering committee is formally established to provide executive oversight of the cybersecurity & data privacy program, including security awareness and training.
• Security awareness and training methods are role-based (e.g., handling sensitive/regulated data).
• The Human Resources (HR) department:
o Identifies and implements industry-recognized HR practices related to security workforce development and awareness to help ensure secure practices are implemented in personnel management operations.
o Documents, retains and monitors individual training activities, including basic security awareness training, ongoing awareness training and specific-system training.
o Ensures that every user accessing a system processing, storing or transmitting sensitive/regulated data is formally trained in data handling requirements.
o Ensures all employees and contractors receive awareness education and training that is relevant for their job function, including social engineering-related threats.
• Cybersecurity and/ or data privacy personnel receive necessary Continuing Professional Education (CPE) training to maintain currency and proficiency with industry-recognized secure practices pertinent to their assigned roles and responsibilities. | See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to ensure cybersecurity & data privacy personnel receive Continuing Professional Education (CPE) training to maintain currency and proficiency with industry-recognized secure practices that are pertinent to their assigned roles and responsibilities. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to ensure cybersecurity & data privacy personnel receive Continuing Professional Education (CPE) training to maintain currency and proficiency with industry-recognized secure practices that are pertinent to their assigned roles and responsibilities. | null | CC1.4-POF7 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | E.1.5 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 314.4(e)(4) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | B6.b | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | R-BC-1
R-BC-3
R-EX-7
R-GV-1
R-GV-4
R-SA-2 | null | null | null | null | null | null | null | R-BC-1 | null | R-BC-3 | null | null | null | null | null | null | null | null | R-EX-7 | R-GV-1 | null | null | R-GV-4 | null | null | null | null | null | null | null | null | null | R-SA-2 | NT-1
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-8
MT-9
MT-12
MT-13
MT-14
MT-15 | NT-1 | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | NT-9 | NT-10 | NT-11 | NT-12 | NT-13 | NT-14 | null | null | null | null | null | null | null | MT-8 | MT-9 | null | null | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Security Awareness & Training | Continuing Professional Education (CPE) - DevOps Personnel | SAT-03.8 | Mechanisms exist to ensure application development and operations (DevOps) personnel receive Continuing Professional Education (CPE) training on Secure Software Development Practices (SSDP) to appropriately address evolving threats. | null | null | Does the organization ensure application development and operations (DevOps) personnel receive Continuing Professional Education (CPE) training on Secure Software Development Practices (SSDP) to appropriately address evolving threats? | 8 | Identify | null | X | null | There is no evidence of a capability to ensure application development and operations (DevOps) personnel receive Continuing Professional Education (CPE) training on Secure Software Development Practices (SSDP) to appropriately address evolving threats. | SP-CMM1 is N/A, since a structured process is required to ensure application development and operations (DevOps) personnel receive Continuing Professional Education (CPE) training on Secure Software Development Practices (SSDP) to appropriately address evolving threats. | SP-CMM2 is N/A, since a well-defined process is required to ensure application development and operations (DevOps) personnel receive Continuing Professional Education (CPE) training on Secure Software Development Practices (SSDP) to appropriately address evolving threats. | Security Awareness & Training (SAT) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A Governance, Risk & Compliance (GRC) function, or similar function:
o Provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data with regards to security awareness and training.
o Defines minimum cybersecurity training (including certifications) for personnel, based on their specific roles.
o Creates/governs security and awareness training to meet specific statutory, regulatory and/ or contractual compliance obligations.
• A steering committee is formally established to provide executive oversight of the cybersecurity & data privacy program, including security awareness and training.
• Security awareness and training methods are role-based (e.g., handling sensitive/regulated data).
• The Human Resources (HR) department:
o Identifies and implements industry-recognized HR practices related to security workforce development and awareness to help ensure secure practices are implemented in personnel management operations.
o Documents, retains and monitors individual training activities, including basic security awareness training, ongoing awareness training and specific-system training.
o Ensures that every user accessing a system processing, storing or transmitting sensitive/regulated data is formally trained in data handling requirements.
o Ensures all employees and contractors receive awareness education and training that is relevant for their job function, including social engineering-related threats.
• Cybersecurity and/ or data privacy personnel receive necessary Continuing Professional Education (CPE) training to maintain currency and proficiency with industry-recognized secure practices pertinent to their assigned roles and responsibilities.
• Application development and operations (DevOps) personnel receive CPE training on Secure Software Development Practices (SSDP) to appropriately address evolving threats. | See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to ensure application development and operations (DevOps) personnel receive Continuing Professional Education (CPE) training on Secure Software Development Practices (SSDP) to appropriately address evolving threats. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to ensure application development and operations (DevOps) personnel receive Continuing Professional Education (CPE) training on Secure Software Development Practices (SSDP) to appropriately address evolving threats. | null | CC1.4-POF7 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 6.2.2 | null | 6.2.2 | null | null | 6.2.2 | null | 6.2.2 | 6.2.2 | null | L.24.2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | B6.b | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | R-BC-1
R-BC-3
R-EX-7
R-GV-1
R-GV-4
R-SA-2 | null | null | null | null | null | null | null | R-BC-1 | null | R-BC-3 | null | null | null | null | null | null | null | null | R-EX-7 | R-GV-1 | null | null | R-GV-4 | null | null | null | null | null | null | null | null | null | R-SA-2 | NT-1
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-8
MT-9
MT-12
MT-13
MT-14
MT-15 | NT-1 | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | NT-9 | NT-10 | NT-11 | NT-12 | NT-13 | NT-14 | null | null | null | null | null | null | null | MT-8 | MT-9 | null | null | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Security Awareness & Training | Cybersecurity & Data Privacy Training Records | SAT-04 | Mechanisms exist to document, retain and monitor individual training activities, including basic cybersecurity & data privacy awareness training, ongoing awareness training and specific-system training. | - KnowB4 (https://www.knowbe4.com/) | E-SAT-02
E-SAT-03
E-SAT-04
E-SAT-05 | Does the organization document, retain and monitor individual training activities, including basic cybersecurity & data privacy awareness training, ongoing awareness training and specific-system training? | 9 | Protect | null | X | null | There is no evidence of a capability to document, retain and monitor individual training activities, including basic cybersecurity & data privacy awareness training, ongoing awareness training and specific-system training. | Security Awareness & Training (SAT) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Training activities are decentralized.
• Security awareness and training methods are often generic, without organization-specific content.
• IT/cybersecurity personnel self-manage their professional certification requirements to support their assigned duties. | Security Awareness & Training (SAT) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Training and awareness activities are decentralized (e.g., a localized/regionalized function) and use non-standardized methods to implement secure and compliant practices.
• The Human Resources (HR) department works with cybersecurity personnel to facilitate workforce development and awareness to help ensure secure practices are implemented.
• Security awareness and training methods are role-based (e.g., handling sensitive/regulated data).
• IT/cybersecurity personnel:
o Identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for security training and awareness activities.
o Create/govern security and awareness training to meet specific statutory, regulatory and/ or contractual compliance obligations.
o Self-manage their professional certification requirements to support their assigned duties. | Security Awareness & Training (SAT) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A Governance, Risk & Compliance (GRC) function, or similar function:
o Provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data with regards to cybersecurity & data privacy awareness and training.
o Defines minimum cybersecurity training (including certifications) for personnel, based on their specific roles.
o Creates/governs security and awareness training to meet specific statutory, regulatory and/ or contractual compliance obligations.
• A steering committee is formally established to provide executive oversight of the cybersecurity & data privacy program, including cybersecurity & data privacy awareness and training.
• Security awareness and training methods are role-based (e.g., handling sensitive/regulated data).
• The Human Resources (HR) department:
o Identifies and implements industry-recognized HR practices related to security workforce development and awareness to help ensure secure practices are implemented in personnel management operations.
o Documents, retains and monitors individual training activities, including basic cybersecurity & data privacy awareness training, ongoing awareness training and specific-system training.
o Ensures that every user accessing a system processing, storing or transmitting sensitive/regulated data is formally trained in data handling requirements.
o Ensures all employees and contractors receive awareness education and training that is relevant for their job function, including social engineering-related threats. | Security Awareness & Training (SAT) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to document, retain and monitor individual training activities, including basic cybersecurity & data privacy awareness training, ongoing awareness training and specific-system training. | null | null | null | null | null | null | null | null | null | HRS-13 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | OR-3.1
OR-3.2 | null | null | null | null | null | null | AT-4 | AT-4 | AT-4 | AT-4 | AT-4 | AT-4 | AT-4 | AT-4 | AT-4 | null | null | AT-4 | AT-4 | AT-4 | null | AT-4 | AT-4 | null | null | AT-4 | null | NFO - AT-4 | null | null | null | null | null | null | null | null | 12.6.2 | 12.6
12.6.1 | null | 12.6.1 | 12.6.1 | 12.6.1 | 12.6.1 | 12.6.1 | 12.6.1 | 12.6.1 | 12.6.1 | D.4 | null | null | null | null | null | null | OTA:SG2.SP2
OTA:SG4.SP2 | null | 5.2.3 | null | null | null | null | null | null | AT-4 | null | null | null | null | null | null | null | AT-4 | AT-4 | AT-4 | AT-4 | AT-4 | AT-4 | AT-4 | AT-4 | AT-4 | AT-4 | null | null | null | null | null | null | null | null | null | AT-4 | null | null | 8-103
8-104 | 2.3 | null | null | null | null | 5.10 | AT-4 | AT-4 | AT-4 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | AT-4 | AT-4 | AT-4 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | B6.b | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-GV-1
R-GV-4
R-GV-5
R-GV-6
R-GV-7 | null | null | null | null | null | null | null | null | null | null | null | null | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | null | R-GV-1 | null | null | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | null | null | null | null | null | null | null | NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-11
MT-12
MT-13
MT-14
MT-15 | null | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | NT-9 | NT-10 | NT-11 | NT-12 | NT-13 | NT-14 | MT-1 | MT-2 | MT-3 | MT-4 | MT-5 | MT-6 | MT-7 | MT-8 | MT-9 | null | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Technology Development & Acquisition | Technology Development & Acquisition | TDA-01 | Mechanisms exist to facilitate the implementation of tailored development and acquisition strategies, contract tools and procurement methods to meet unique business needs. | null | E-TDA-01
E-TDA-02
E-TDA-08 | Does the organization facilitate the implementation of tailored development and acquisition strategies, contract tools and procurement methods to meet unique business needs? | 10 | Protect | X | X | X | There is no evidence of a capability to facilitate the implementation of tailored development and acquisition strategies, contract tools and procurement methods to meet unique business needs. | Technology Development & Acquisition (TDA) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• IT personnel use an informal process to govern technology development and acquisition.
• Secure development practices loosely conform to industry-recognized standards for secure engineering (e.g., OWASP, NIST SP 800-218, NIST SP 800-160, etc.).
• IT personnel work with data/process owners to help ensure secure practices are implemented throughout the System Development Lifecycle (SDLC) for all high-value projects.
• Project management is decentralized and generally lacks formal project management managers or broader oversight. | Technology Development & Acquisition (TDA) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Development and acquisition management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for technology development and acquisition management.
• IT/cybersecurity personnel implement secure practices to protect the confidentiality, integrity, availability and safety of the organization’s technology assets, data and network(s).
• Secure development practices mostly conform to industry-recognized standards for secure engineering (e.g., OWASP, NIST SP 800-218, NIST SP 800-160, etc.).
• Procurement practices require third-party developers of systems, system components or services to follow secure engineering practices.
• A Project Management office (PMO), or project management function, enables the implementation of cybersecurity & data privacy-related resource planning controls across the System Development Lifecycle (SDLC) for all high-value projects. | Technology Development & Acquisition (TDA) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• The Chief Information Security Officer (CISO), or similar function, analyzes the organization’s business strategy to determine prioritized and authoritative guidance for technology development and acquisition practices.
• The CISO, or similar function, develops a security-focused Concept of Operations (CONOPS) that documents management, operational and technical measures to apply defense-in-depth techniques across the enterprise for technology development and acquisition.
• A steering committee is formally established to provide executive oversight of the cybersecurity & data privacy program, including technology development and acquisition.
• A Validated Architecture Design Review (VADR) evaluates design criteria for secure practices and conformance with requirements for applicable statutory, regulatory and contractual controls to determine if the system/application/service is designed, built and operated in a secure and resilient manner.
• Secure development practices conform to industry-recognized standards for secure engineering (e.g., OWASP, NIST SP 800-218, NIST SP 800-160, etc.).
• A procurement team, or similar function, ensures that third party development and/ or acquisitions meet, or exceed, the organization's business, cybersecurity & data privacy requirements to have secure and resilient systems, applications, services and processes.
• A Software Assurance Maturity Model (SAMM) governs a secure development lifecycle for the development of systems, applications and services.
• Administrative processes exist and technologies are configured to implement secure configuration settings by default to reduce the likelihood of software being deployed with weak security settings, putting the asset at a greater risk of compromise.
• An IT Asset Management (ITAM) function, or similar function, categorizes devices according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data.
• A formal Change Management (CM) program help to ensure that no unauthorized changes are made, all changes are documented, services are not disrupted and resources are used efficiently.
• A Governance, Risk & Compliance (GRC) function, or similar function;
o Provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data for technology development and acquisition.
o Ensures the Information Assurance Program (IAP) evaluates applicable cybersecurity & data privacy controls as part of “business as usual” pre-production testing.
o Operates the Cybersecurity Supply Chain Risk Management (C-SCRM) program to identify and mitigate supply chain-related risks and threats.
• A Project Management Office (PMO), or project management function, enables IAP pre-production testing of cybersecurity & data privacy controls as part of the organization’s established project management processes. | See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to facilitate the implementation of tailored development and acquisition strategies, contract tools and procurement methods to meet unique business needs. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to facilitate the implementation of tailored development and acquisition strategies, contract tools and procurement methods to meet unique business needs. | CC5.2 | CC2.3-POF10
CC5.2-POF4 | null | 16.0 | null | null | null | APO03.02
APO03.03
APO04.01
BAI03.02
BAI03.03
BAI03.04
DSS03.01
DSS03.02
DSS03.03
DSS03.04
DSS03.05 | Principle 11 | AIS-01
AIS-04 | SET-06 | null | null | null | RC-05-13
RQ-06-10
RQ-06-15.a
RQ-06-15.b
RQ-06-15.c
RQ-06-16.a
RQ-06-16.b
RQ-06-16.c
RQ-06-16.d
RQ-06-17.a
RQ-06-17.b | null | null | null | 14.2.7 | 8.25
8.30 | 14.2.7 | null | null | null | null | null | T1078, T1078.001, T1078.003, T1078.004, T1134.005, T1574.002 | null | Sec 4(D)(2)(e) | MANAGE 1.0
MANAGE 2.0 | null | PO.2.3 | null | null | PL-1
SA-1
SA-4 | PL-1
SA-1
SA-4 | PL-1
SA-1
SA-4 | PL-1
SA-1
SA-4 | PL-1
SA-1
SA-4
SA-23 | PL-1
SA-1
SA-4 | PL-1
SA-1
SA-4 | PL-1
SA-1
SA-4 | PL-1
SA-1
SA-4 | SA-23 | null | PL-1
SA-1
SA-4 | PL-1
SA-1
SA-4 | PL-1
SA-1
SA-4 | 3.1
3.1.1
3.1.2 | PL-1
SA-1 | PL-1
SA-1 | null | SA-1 | PL-1
SA-1 | SA-1 | NFO - SA-4 | 3.16.1
3.17.2 | null | A.03.17.02[01]
A.03.17.02[02]
A.03.17.02[03] | null | PO.3
PO.3.1
PO.3.2
PO.3.3 | PR.DS-7 | GV.SC-03
ID.RA
ID.RA-09 | A01:2021
A02:2021
A03:2021
A04:2021
A05:2021
A06:2021
A07:2021
A08:2021
A09:2021
A10:2021 | null | 6.2
6.2.1 | null | 6.2.1 | null | null | 6.2.1 | null | 6.2.1 | 6.2.1 | null | K.1 | 2.8A | 5.3
5.3.1 | 11.1
11.2
11.3
11.4
11.5
11.6
11.7
11.8 | null | null | RISK-2.J.MIL3
ARCHITECTURE-4.A.MIL2
ARCHITECTURE-4.D.MIL3 | EF:SG3.SP3
EF:SG4.SP1 | null | null | null | null | null | null | null | null | PL-1
SA-1 | null | null | null | null | null | null | null | PL-1
SA-1 | PL-1
SA-1 | PL-1
SA-1 | PL-1
SA-1 | PL-1
SA-1 | PL-1
SA-1 | PL-1
SA-1 | PL-1
SA-1 | PL-1
SA-1 | PL-1
SA-1 | null | null | null | null | 314.4(c)(4) | null | null | null | null | PL-1
SA-1 | null | null | null | 16.2 | null | null | null | null | null | PL-1
SA-1 | PL-1
SA-1 | PL-1
SA-1 | null | null | null | null | null | null | null | null | null | null | null | null | Sec 4(2)(b)(ii)(B)(1) | null | 38-99-20(D)(2)(e) | null | null | PL-1
SA-1 | PL-1
SA-1 | PL-1
SA-1 | null | null | null | 3.6.2(67)
3.6.2(74) | Art 13.7 | null | Art 32.1
Art 32.2 | Article 21.2(e)
Article 21.3 | null | null | Sec 14
Sec 15 | Art 16 | null | null | null | null | null | 7.7
7.8
7.9
7.10
7.11
7.12
7.13
7.14 | DEV-01 | null | null | null | 17.1
17.9 | null | null | null | null | null | null | null | null | null | Article 11.4
Article 11.5
Article 11.6 | null | 2-13
2-13-3-1
2-13-3-2
2-13-3-3
2-13-3-4 | null | 3.3.6 | 1-6-3
2-5-4 | 1-1-2 | null | null | null | null | 7.1.3 [OP.PL.3]
8.6.1 [MP.SW.1] | null | null | null | null | A4.a | null | null | null | null | null | null | null | null | null | 0938
1780 | null | null | null | null | null | null | null | null | null | null | 14.2.7 | null | 16.1 | null | null | null | null | null | 5.3.1
5.3.2
6.1.1
6.1.2
6.1.3
6.1.4
6.1.5
6.1.6
6.1.7
6.2.1
6.2.2
6.3.1
6.3.2
6.4.1
6.4.2
6.4.3
6.4.4
6.4.5
6.4.6
6.4.7
6.4.8
6.5.1
6.5.2
6.5.3 | null | null | null | null | null | null | null | 4.8
4.9 | 2.4.4 | null | null | null | null | null | null | null | null | null | null | x | NAIC | x | x | R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
R-SA-2 | R-AC-1 | R-AC-2 | R-AC-3 | R-AC-4 | R-AM-1 | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | R-EX-6 | R-EX-7 | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | R-GV-8 | R-IR-1 | R-IR-2 | R-IR-3 | R-IR-4 | R-SA-1 | R-SA-2 | NT-1
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-11
MT-12
MT-13
MT-14
MT-15
MT-16 | NT-1 | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | NT-9 | NT-10 | NT-11 | NT-12 | NT-13 | NT-14 | MT-1 | MT-2 | MT-3 | MT-4 | MT-5 | MT-6 | MT-7 | MT-8 | MT-9 | null | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | MT-16 | null |
Technology Development & Acquisition | Product Management | TDA-01.1 | Mechanisms exist to design and implement product management processes to update products, including systems, software and services, to improve functionality and correct security deficiencies. | null | E-CPL-06
E-TDA-05
E-TDA-06
E-TDA-07
E-TDA-15 | Does the organization design and implement product management processes to update products, including systems, software and services, to improve functionality and correct security deficiencies? | 10 | Protect | X | X | null | There is no evidence of a capability to design and implement product management processes to update products, including systems, software and services, to improve functionality and correct security deficiencies. | Technology Development & Acquisition (TDA) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• IT personnel use an informal process to govern technology development and acquisition.
• Secure development practices loosely conform to industry-recognized standards for secure engineering (e.g., OWASP, NIST SP 800-218, NIST SP 800-160, etc.).
• IT personnel work with data/process owners to help ensure secure practices are implemented throughout the System Development Lifecycle (SDLC) for all high-value projects.
• Project management is decentralized and generally lacks formal project management managers or broader oversight. | Technology Development & Acquisition (TDA) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Development and acquisition management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for technology development and acquisition management.
• IT/cybersecurity personnel implement secure practices to protect the confidentiality, integrity, availability and safety of the organization’s technology assets, data and network(s).
• Secure development practices mostly conform to industry-recognized standards for secure engineering (e.g., OWASP, NIST SP 800-218, NIST SP 800-160, etc.).
• Procurement practices require third-party developers of systems, system components or services to follow secure engineering practices.
• A Project Management office (PMO), or project management function, enables the implementation of cybersecurity & data privacy-related resource planning controls across the System Development Lifecycle (SDLC) for all high-value projects. | Technology Development & Acquisition (TDA) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Secure development practices conform to industry-recognized standards for secure engineering (e.g., OWASP, NIST SP 800-218, NIST SP 800-160, etc.).
• A procurement team, or similar function, ensures that third party development and/ or acquisitions meet, or exceed, the organization's business, cybersecurity & data privacy requirements to have secure and resilient systems, applications, services and processes.
• A Software Assurance Maturity Model (SAMM) governs a secure development lifecycle for the development of systems, applications and services.
• Administrative processes exist and technologies are configured to implement secure configuration settings by default to reduce the likelihood of software being deployed with weak security settings, putting the asset at a greater risk of compromise.
• An IT Asset Management (ITAM) function, or similar function, categorizes devices according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data.
• A formal Change Management (CM) program help to ensure that no unauthorized changes are made, all changes are documented, services are not disrupted and resources are used efficiently.
• A Governance, Risk & Compliance (GRC) function, or similar function;
o Provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data for technology development and acquisition.
o Ensures the Information Assurance Program (IAP) evaluates applicable cybersecurity & data privacy controls as part of “business as usual” pre-production testing.
o Operates the Cybersecurity Supply Chain Risk Management (C-SCRM) program to identify and mitigate supply chain-related risks and threats.
• A Project Management Office (PMO), or project management function, enables IAP pre-production testing of cybersecurity & data privacy controls as part of the organization’s established project management processes. | Technology Development & Acquisition (TDA) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to design and implement product management processes to update products, including systems, software and services, to improve functionality and correct security deficiencies. | null | PI1.1-POF1
PI1.1-POF2
PI1.1-POF3 | null | null | null | null | null | APO03.02
APO03.03
BAI05.01
BAI05.02
BAI05.03
BAI05.04
BAI05.05
BAI05.06
BAI05.07
BAI06.01
BAI06.02
BAI06.03
BAI06.04
BAI07.01
BAI07.02
BAI07.04
BAI07.05
BAI07.06
BAI07.07
BAI07.08
BAI08.01
BAI08.02
BAI08.03
BAI08.04
DSS03.01
DSS03.02
DSS03.03
DSS03.04
DSS03.05 | null | null | SET-05 | null | null | CR 3.10 (7.12) | RQ-05-12
RC-05-13
RC-05-15
RC-05-16
RQ-06-01
RQ-06-05.a
RQ-06-05.b
RQ-06-09
RQ-06-18
RQ-06-19
RQ-06-20
RQ-06-21.a
RQ-06-21.b
RQ-06-21.c
RQ-10-01.a
RQ-10-01.b
RQ-10-01.c
RQ-10-02
RQ-10-03
RQ-12-01
RQ-12-02.a
RQ-12-02.b
RQ-12-02.c
RQ-12-02.d
RQ-12-03
RQ-14-02 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | MANAGE 2.0 | null | PW.4
PW.4.1
RV.3
RV.3.1
RV.3.2
RV.3.3
RV.3.4 | null | null | null | null | null | null | SA-23 | null | null | null | null | SA-23 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | PW.1
PW.1.2
PW.1.3 | null | null | A01:2021
A02:2021
A03:2021
A04:2021
A05:2021
A06:2021
A07:2021
A08:2021
A09:2021
A10:2021 | null | null | null | null | null | null | null | null | null | null | null | G.3 | null | 5.3.1
8.1.1 | 11.5
11.6
11.7
11.8 | 7.2.2.1(a)
7.2.2.1(b)
7.2.2.1(c)
7.2.2.2(a)
7.2.2.2(b)
7.2.2.2(c)
7.2.2.2(d)
7.2.2.2(e)
7.2.2.2(f)
7.2.2.2(g)
7.2.2.2(h)
7.2.2.3
7.2.2.4(a)
7.2.2.4(b)
7.2.2.5
7.4.1
7.4.2
8.1
8.1.1
8.1.2
8.1.3 | 7.2.2.1(a)
7.2.2.1(b)
7.2.2.1(c)
7.2.2.2(a)
7.2.2.2(b)
7.2.2.2(c)
7.2.2.2(d)
7.2.2.2(e)
7.2.2.2(f)
7.2.2.2(g)
7.2.2.2(h)
7.2.2.3
7.2.2.4(a)
7.2.2.4(b)
7.2.2.5
7.4.1
7.4.2
8.1
8.1.1
8.1.2
8.1.3 | RISK-2.J.MIL3 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 1798.91.04(a)
1798.91.04(a)(1)
1798.91.04(a)(2)
1798.91.04(a)(3)
1798.91.04(b)
1798.91.04(b)(1)
1798.91.04(b)(2) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 3.6.2(68) | Art 13.7 | null | null | null | null | null | null | null | null | null | null | null | null | 7.7
7.8
7.9
7.10
7.11
7.12
7.13
7.14 | null | null | null | null | 17.9 | null | null | null | null | null | null | null | null | null | Article 11.4
Article 11.5
Article 11.6 | null | 2-13-1
2-13-2
2-13-3-1
2-13-3-2
2-13-3-3
2-13-3-4 | null | null | null | 1-1-2
4-1-1-1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 1796
1797
1798 | null | null | null | null | null | null | null | null | null | null | 8.1.2.7.PB | null | null | 12.1.31.C.01
12.1.32.C.01
12.1.32.C.02
12.1.32.C.03
12.1.33.C.01
12.1.34.C.01
12.1.34.C.02
12.1.35.C.01
12.1.36.C.01
12.1.37.C.01
12.4.3.C.01
12.4.4.C.01
12.4.4.C.02
12.4.4.C.03
12.4.4.C.04
12.4.4.C.05
12.4.4.C.06
12.4.5.C.01
12.4.6.C.01
12.4.7.C.01 | null | null | null | null | 5.8.1
5.8.2
7.6.1
7.6.2
14.4.1
14.4.2
14.4.3 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | null | x | null | R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1 | R-AC-1 | R-AC-2 | R-AC-3 | R-AC-4 | R-AM-1 | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | R-EX-6 | R-EX-7 | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | R-GV-8 | R-IR-1 | R-IR-2 | R-IR-3 | R-IR-4 | R-SA-1 | null | NT-7
MT-1
MT-2
MT-7
MT-8
MT-9
MT-11
MT-12
MT-13
MT-14
MT-15
MT-16 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | null | null | MT-7 | MT-8 | MT-9 | null | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | MT-16 | null |
Technology Development & Acquisition | Integrity Mechanisms for Software / Firmware Updates | TDA-01.2 | Mechanisms exist to utilize integrity validation mechanisms for security updates. | - Checksum comparison
- CimTrak Integrity Suite (https://www.cimcor.com/cimtrak/)
- NNT Change Tracker (https://www.newnettechnologies.com) | E-TDA-15 | Does the organization utilize integrity validation mechanisms for security updates? | 5 | Protect | null | X | X | There is no evidence of a capability to utilize integrity validation mechanisms for security updates. | Technology Development & Acquisition (TDA) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• IT personnel use an informal process to govern technology development and acquisition.
• Secure development practices loosely conform to industry-recognized standards for secure engineering (e.g., OWASP, NIST SP 800-218, NIST SP 800-160, etc.).
• IT personnel work with data/process owners to help ensure secure practices are implemented throughout the System Development Lifecycle (SDLC) for all high-value projects. | Technology Development & Acquisition (TDA) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Development and acquisition management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for technology development and acquisition management.
• IT/cybersecurity personnel implement secure practices to protect the confidentiality, integrity, availability and safety of the organization’s technology assets, data and network(s).
• Secure development practices mostly conform to industry-recognized standards for secure engineering (e.g., OWASP, NIST SP 800-218, NIST SP 800-160, etc.).
• Procurement practices require third-party developers of systems, system components or services to follow secure engineering practices.
• A Project Management office (PMO), or project management function, enables the implementation of cybersecurity & data privacy-related resource planning controls across the System Development Lifecycle (SDLC) for all high-value projects. | Technology Development & Acquisition (TDA) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Secure development practices conform to industry-recognized standards for secure engineering (e.g., OWASP, NIST SP 800-218, NIST SP 800-160, etc.).
• A procurement team, or similar function, ensures that third party development and/ or acquisitions meet, or exceed, the organization's business, cybersecurity & data privacy requirements to have secure and resilient systems, applications, services and processes.
• A Software Assurance Maturity Model (SAMM) governs a secure development lifecycle for the development of systems, applications and services.
• Administrative processes exist and technologies are configured to implement secure configuration settings by default to reduce the likelihood of software being deployed with weak security settings, putting the asset at a greater risk of compromise.
• An IT Asset Management (ITAM) function, or similar function, categorizes devices according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data.
• A formal Change Management (CM) program help to ensure that no unauthorized changes are made, all changes are documented, services are not disrupted and resources are used efficiently.
• A Governance, Risk & Compliance (GRC) function, or similar function;
o Provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data for technology development and acquisition.
o Ensures the Information Assurance Program (IAP) evaluates applicable cybersecurity & data privacy controls as part of “business as usual” pre-production testing.
o Operates the Cybersecurity Supply Chain Risk Management (C-SCRM) program to identify and mitigate supply chain-related risks and threats.
• A Project Management Office (PMO), or project management function, enables IAP pre-production testing of cybersecurity & data privacy controls as part of the organization’s established project management processes. | Technology Development & Acquisition (TDA) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | Technology Development & Acquisition (TDA) efforts are “world-class” capabilities that leverage predictive analysis (e.g., machine learning, AI, etc.). In addition to CMM Level 4 criteria, CMM Level 5 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Stakeholders make time-sensitive decisions to support operational efficiency, which may include automated remediation actions.
▪ Based on predictive analysis, process improvements are implemented according to “continuous improvement” practices that affect process changes. | null | null | null | null | null | null | null | null | null | null | CCM-06
IAM-22 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | PR.DS-P6 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | A08:2021 | null | null | null | null | null | null | null | null | null | null | null | I.3.11 | null | null | 11.6
11.7
11.8 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | null | x | null | R-AC-1
R-AC-3
R-AC-4
R-AM-3
R-BC-1
R-BC-2
R-BC-4
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-SA-1 | R-AC-1 | null | R-AC-3 | R-AC-4 | null | null | R-AM-3 | R-BC-1 | R-BC-2 | null | R-BC-4 | null | null | null | null | null | null | R-EX-6 | R-EX-7 | R-GV-1 | R-GV-2 | null | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | null | null | null | null | null | R-SA-1 | null | NT-7
MT-1
MT-2
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | null | null | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Technology Development & Acquisition | Malware Testing Prior to Release | TDA-01.3 | Mechanisms exist to utilize at least one (1) malware detection tool to identify if any known malware exists in the final binaries of the product or security update. | - CimTrak Integrity Suite (https://www.cimcor.com/cimtrak/)
- NNT Change Tracker (https://www.newnettechnologies.com) | null | Does the organization utilize at least one (1) malware detection tool to identify if any known malware exists in the final binaries of the product or security update? | 9 | Protect | null | X | X | There is no evidence of a capability to utilize at least one (1) malware detection tool to identify if any known malware exists in the final binaries of the product or security update. | Technology Development & Acquisition (TDA) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• IT personnel use an informal process to govern technology development and acquisition.
• Secure development practices loosely conform to industry-recognized standards for secure engineering (e.g., OWASP, NIST SP 800-218, NIST SP 800-160, etc.).
• IT personnel work with data/process owners to help ensure secure practices are implemented throughout the System Development Lifecycle (SDLC) for all high-value projects. | Technology Development & Acquisition (TDA) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Development and acquisition management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for technology development and acquisition management.
• IT/cybersecurity personnel implement secure practices to protect the confidentiality, integrity, availability and safety of the organization’s technology assets, data and network(s).
• Secure development practices mostly conform to industry-recognized standards for secure engineering (e.g., OWASP, NIST SP 800-218, NIST SP 800-160, etc.).
• Procurement practices require third-party developers of systems, system components or services to follow secure engineering practices.
• A Project Management office (PMO), or project management function, enables the implementation of cybersecurity & data privacy-related resource planning controls across the System Development Lifecycle (SDLC) for all high-value projects.
• Administrative processes exist to enable use of at least one (1) malware detection tool to identify if any known malware exists in the final binaries of any product or security update the organization creates. | Technology Development & Acquisition (TDA) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Secure development practices conform to industry-recognized standards for secure engineering (e.g., OWASP, NIST SP 800-218, NIST SP 800-160, etc.).
• A procurement team, or similar function, ensures that third party development and/ or acquisitions meet, or exceed, the organization's business, cybersecurity & data privacy requirements to have secure and resilient systems, applications, services and processes.
• A Software Assurance Maturity Model (SAMM) governs a secure development lifecycle for the development of systems, applications and services.
• Administrative processes exist and technologies are configured to implement secure configuration settings by default to reduce the likelihood of software being deployed with weak security settings, putting the asset at a greater risk of compromise.
• An IT Asset Management (ITAM) function, or similar function, categorizes devices according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data.
• A formal Change Management (CM) program help to ensure that no unauthorized changes are made, all changes are documented, services are not disrupted and resources are used efficiently.
• A Governance, Risk & Compliance (GRC) function, or similar function;
o Provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data for technology development and acquisition.
o Ensures the Information Assurance Program (IAP) evaluates applicable cybersecurity & data privacy controls as part of “business as usual” pre-production testing.
o Operates the Cybersecurity Supply Chain Risk Management (C-SCRM) program to identify and mitigate supply chain-related risks and threats.
• A Project Management Office (PMO), or project management function, enables IAP pre-production testing of cybersecurity & data privacy controls as part of the organization’s established project management processes.
• Administrative processes exist to enable use of at least one (1) malware detection tool to identify if any known malware exists in the final binaries of any product or security update the organization creates. | Technology Development & Acquisition (TDA) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | Technology Development & Acquisition (TDA) efforts are “world-class” capabilities that leverage predictive analysis (e.g., machine learning, AI, etc.). In addition to CMM Level 4 criteria, CMM Level 5 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Stakeholders make time-sensitive decisions to support operational efficiency, which may include automated remediation actions.
▪ Based on predictive analysis, process improvements are implemented according to “continuous improvement” practices that affect process changes. | null | null | null | null | null | null | null | null | null | TVM-02 | null | null | null | SAR 3.2 (12.3.1) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | T.3.1 | null | null | 14.1
14.2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | null | x | null | R-AC-1
R-AC-3
R-AC-4
R-AM-3
R-BC-1
R-BC-2
R-BC-4
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-SA-1 | R-AC-1 | null | R-AC-3 | R-AC-4 | null | null | R-AM-3 | R-BC-1 | R-BC-2 | null | R-BC-4 | null | null | null | null | null | null | R-EX-6 | R-EX-7 | R-GV-1 | R-GV-2 | null | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | null | null | null | null | null | R-SA-1 | null | NT-7
MT-1
MT-2
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | null | null | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Technology Development & Acquisition | Minimum Viable Product (MVP) Security Requirements | TDA-02 | Mechanisms exist to ensure risk-based technical and functional specifications are established to define a Minimum Viable Product (MVP). | null | E-TDA-06 | Does the organization ensure risk-based technical and functional specifications are established to define a Minimum Viable Product (MVP)? | 9 | Protect | X | X | X | There is no evidence of a capability to ensure risk-based technical and functional specifications are established to define a Minimum Viable Product (MVP). | Technology Development & Acquisition (TDA) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• IT personnel use an informal process to govern technology development and acquisition.
• Secure development practices loosely conform to industry-recognized standards for secure engineering (e.g., OWASP, NIST SP 800-218, NIST SP 800-160, etc.).
• IT personnel work with data/process owners to help ensure secure practices are implemented throughout the System Development Lifecycle (SDLC) for all high-value projects.
• Project management is decentralized and generally lacks formal project management managers or broader oversight. | Technology Development & Acquisition (TDA) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Development and acquisition management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for technology development and acquisition management.
• IT/cybersecurity personnel implement secure practices to protect the confidentiality, integrity, availability and safety of the organization’s technology assets, data and network(s).
• Secure development practices mostly conform to industry-recognized standards for secure engineering (e.g., OWASP, NIST SP 800-218, NIST SP 800-160, etc.).
• Procurement practices require third-party developers of systems, system components or services to follow secure engineering practices.
• A Project Management Office (PMO), or project management function, enables the implementation of cybersecurity & data privacy-related resource planning controls across the System Development Lifecycle (SDLC) for all high-value projects. | Technology Development & Acquisition (TDA) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Secure development practices conform to industry-recognized standards for secure engineering (e.g., OWASP, NIST SP 800-218, NIST SP 800-160, etc.).
• A procurement team, or similar function, ensures that third party development and/ or acquisitions meet, or exceed, the organization's business, cybersecurity & data privacy requirements to have secure and resilient systems, applications, services and processes.
• A Software Assurance Maturity Model (SAMM) governs a secure development lifecycle for the development of systems, applications and services.
• Administrative processes exist and technologies are configured to implement secure configuration settings by default to reduce the likelihood of software being deployed with weak security settings, putting the asset at a greater risk of compromise.
• An IT Asset Management (ITAM) function, or similar function, categorizes devices according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data.
• A formal Change Management (CM) program help to ensure that no unauthorized changes are made, all changes are documented, services are not disrupted and resources are used efficiently.
• A Governance, Risk & Compliance (GRC) function, or similar function;
o Provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data for technology development and acquisition.
o Ensures the Information Assurance Program (IAP) evaluates applicable cybersecurity & data privacy controls as part of “business as usual” pre-production testing.
o Operates the Cybersecurity Supply Chain Risk Management (C-SCRM) program to identify and mitigate supply chain-related risks and threats.
• A Project Management Office (PMO), or project management function, enables IAP pre-production testing of cybersecurity & data privacy controls as part of the organization’s established project management processes. | Technology Development & Acquisition (TDA) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to ensure risk-based technical and functional specifications are established to define a Minimum Viable Product (MVP). | CC5.2 | PI1.1-POF1
PI1.1-POF2
PI1.1-POF3 | null | null | null | null | null | null | Principle 11 | null | SDV-07 | null | null | null | null | null | null | null | 14.2.9 | 8.25
8.29
8.30 | 14.2.9 | null | null | null | null | null | null | null | null | null | null | null | null | null | SA-4 | SA-4 | SA-4 | SA-4 | SA-4 | SA-4 | SA-4 | SA-4 | SA-4 | null | null | SA-4 | SA-4 | SA-4 | null | SA-4 | SA-4 | null | SA-4 | SA-4 | SA-4 | NFO - SA-4 | null | null | A.03.16.01
A.03.16.01.ODP[01]
A.03.16.03.ODP[01] | null | PO.1
PO.1.1
PO.1.2
PO.1.3 | null | null | A01:2021
A02:2021
A03:2021
A04:2021
A05:2021
A06:2021
A07:2021
A08:2021
A09:2021
A10:2021 | null | null | null | null | null | null | null | null | null | null | null | C.1.4 | 2.8A
2.9
2.10 | 5.3.1
8.1.1 | 4.1
5.1
8.1
8.2
8.3
8.4
8.5
8.6
8.7
8.8
8.9
12.1
12.2
12.3
12.4
12.5
12.6
12.7
12.8 | 7.2.2.1(a)
7.2.2.1(b)
7.2.2.1(c)
7.2.2.2(a)
7.2.2.2(b)
7.2.2.2(c)
7.2.2.2(d)
7.2.2.2(e)
7.2.2.2(f)
7.2.2.2(g)
7.2.2.2(h)
7.2.2.3
7.2.2.4(a)
7.2.2.4(b)
7.2.2.5
7.3.4 | 7.2.2.1(a)
7.2.2.1(b)
7.2.2.1(c)
7.2.2.2(a)
7.2.2.2(b)
7.2.2.2(c)
7.2.2.2(d)
7.2.2.2(e)
7.2.2.2(f)
7.2.2.2(g)
7.2.2.2(h)
7.2.2.3
7.2.2.4(a)
7.2.2.4(b)
7.2.2.5
7.3.4 | null | EXD:SG3.SP4
RTSE:SG1.SP1
RTSE:SG1.SP2
RTSE:SG1.SP3
RTSE:SG1.SP4
RTSE:SG1.SP5 | null | null | null | null | null | null | null | null | SA-4 | null | null | null | null | null | null | null | SA-4 | SA-4 | SA-4 | SA-4 | SA-4 | SA-4 | SA-4 | SA-4 | SA-4 | SA-4 | null | null | null | null | null | null | null | null | null | SA-4 | null | null | 8-302
8-613 | null | null | null | null | null | null | null | null | null | null | null | 1798.91.04(a)
1798.91.04(a)(1)
1798.91.04(a)(2)
1798.91.04(a)(3)
1798.91.04(b)
1798.91.04(b)(1)
1798.91.04(b)(2) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | SA-4 | SA-4 | SA-4 | null | null | null | 3.6.2(68) | null | null | null | null | null | null | null | null | null | null | null | null | null | 7.7 | DEV-02 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 2-13-1
2-13-2
2-13-3-1
2-13-3-2
2-13-3-3
2-13-3-4 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 14.2.9 | null | null | null | null | null | null | null | 5.3.3 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | null | x | x | R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1 | R-AC-1 | R-AC-2 | R-AC-3 | R-AC-4 | R-AM-1 | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | R-EX-6 | R-EX-7 | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | R-GV-8 | R-IR-1 | R-IR-2 | R-IR-3 | R-IR-4 | R-SA-1 | null | NT-1
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-11
MT-12
MT-13
MT-14
MT-15 | NT-1 | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | NT-9 | NT-10 | NT-11 | NT-12 | NT-13 | NT-14 | MT-1 | MT-2 | MT-3 | MT-4 | MT-5 | MT-6 | MT-7 | MT-8 | MT-9 | null | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Technology Development & Acquisition | Ports, Protocols & Services In Use | TDA-02.1 | Mechanisms exist to require the developers of systems, system components or services to identify early in the Secure Development Life Cycle (SDLC), the functions, ports, protocols and services intended for use. | - Ports, Protocols & Services (PPS) | E-CPL-06
E-TDA-07 | Does the organization require the developers of systems, system components or services to identify early in the Secure Development Life Cycle (SDLC), the functions, ports, protocols and services intended for use? | 8 | Protect | null | X | X | There is no evidence of a capability to require the developers of systems, system components or services to identify early in the Secure Development Life Cycle (SDLC), the functions, ports, protocols and services intended for use. | SP-CMM1 is N/A, since a structured process is required to require the developers of systems, system components or services to identify early in the Secure Development Life Cycle (SDLC), the functions, ports, protocols and services intended for use. | Technology Development & Acquisition (TDA) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Development and acquisition management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for technology development and acquisition management.
• IT/cybersecurity personnel implement secure practices to protect the confidentiality, integrity, availability and safety of the organization’s technology assets, data and network(s).
• Secure development practices mostly conform to industry-recognized standards for secure engineering (e.g., OWASP, NIST SP 800-218, NIST SP 800-160, etc.).
• Procurement practices require third-party developers of systems, system components or services to follow secure engineering practices.
• A Project Management Office (PMO), or project management function, enables the implementation of cybersecurity & data privacy-related resource planning controls across the System Development Lifecycle (SDLC) for all high-value projects. | Technology Development & Acquisition (TDA) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Secure development practices conform to industry-recognized standards for secure engineering (e.g., OWASP, NIST SP 800-218, NIST SP 800-160, etc.).
• A procurement team, or similar function, ensures that third party development and/ or acquisitions meet, or exceed, the organization's business, cybersecurity & data privacy requirements to have secure and resilient systems, applications, services and processes.
• A Software Assurance Maturity Model (SAMM) governs a secure development lifecycle for the development of systems, applications and services.
• Administrative processes exist and technologies are configured to implement secure configuration settings by default to reduce the likelihood of software being deployed with weak security settings, putting the asset at a greater risk of compromise.
• An IT Asset Management (ITAM) function, or similar function, categorizes devices according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data.
• A formal Change Management (CM) program help to ensure that no unauthorized changes are made, all changes are documented, services are not disrupted and resources are used efficiently.
• A Governance, Risk & Compliance (GRC) function, or similar function;
o Provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data for technology development and acquisition.
o Ensures the Information Assurance Program (IAP) evaluates applicable cybersecurity & data privacy controls as part of “business as usual” pre-production testing.
o Operates the Cybersecurity Supply Chain Risk Management (C-SCRM) program to identify and mitigate supply chain-related risks and threats.
• A Project Management Office (PMO), or project management function, enables IAP pre-production testing of cybersecurity & data privacy controls as part of the organization’s established project management processes. | Technology Development & Acquisition (TDA) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to require the developers of systems, system components or services to identify early in the Secure Development Life Cycle (SDLC), the functions, ports, protocols and services intended for use. | null | null | null | 12.6 | null | 12.6 | 12.6 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | SA-4(9) | null | SA-4(9) | SA-4(9) | SA-4(9) | null | null | SA-4(9) | SA-4(9) | null | null | null | SA-4(9) | SA-4(9) | null | null | null | null | null | null | null | NFO - SA-4(9) | null | null | null | null | PO.1
PO.1.1
PO.1.2
PO.1.3 | null | null | null | null | 1.2.4 | null | 1.2.4 | null | null | null | null | 1.2.4 | 1.2.4 | null | I.1.4.1 | null | null | 4.1 | null | null | null | null | null | null | null | null | null | null | null | null | SA-4(9) | null | null | null | null | null | null | null | SA-4(9) | null | SA-4(9) | SA-4(9) | null | SA-4(9) | null | SA-4(9) | SA-4(9) | null | null | null | null | null | null | null | null | null | null | SA-4(9) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | SA-4(9) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 12.9
12.29 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 2-5-3-5
2-15-3-3 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 18.1.15.C.01
18.1.15.C.02
18.1.15.C.03
18.1.15.C.04 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | null | x | x | R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1 | R-AC-1 | R-AC-2 | R-AC-3 | R-AC-4 | R-AM-1 | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | R-EX-6 | R-EX-7 | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | R-GV-8 | R-IR-1 | R-IR-2 | R-IR-3 | R-IR-4 | R-SA-1 | null | NT-7
MT-1
MT-2
MT-7
MT-8
MT-9
MT-11
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | null | null | MT-7 | MT-8 | MT-9 | null | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Technology Development & Acquisition | Information Assurance Enabled Products | TDA-02.2 | Mechanisms exist to limit the use of commercially-provided Information Assurance (IA) and IA-enabled IT products to those products that have been successfully evaluated against a National Information Assurance partnership (NIAP)-approved Protection Profile or the cryptographic module is FIPS-validated or NSA-approved. | - FIPS 201 | null | Does the organization limit the use of commercially-provided Information Assurance (IA) and IA-enabled IT products to those products that have been successfully evaluated against a National Information Assurance partnership (NIAP)-approved Protection Profile or the cryptographic module is FIPS-validated or NSA-approved? | 2 | Protect | null | X | X | There is no evidence of a capability to limit the use of commercially-provided Information Assurance (IA) and IA-enabled IT products to those products that have been successfully evaluated against a National Information Assurance partnership (NIAP)-approved Protection Profile or the cryptographic module is FIPS-validated or NSA-approved. | Technology Development & Acquisition (TDA) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• IT personnel use an informal process to govern technology development and acquisition.
• Secure development practices loosely conform to industry-recognized standards for secure engineering (e.g., OWASP, NIST SP 800-218, NIST SP 800-160, etc.).
• IT personnel work with data/process owners to help ensure secure practices are implemented throughout the System Development Lifecycle (SDLC) for all high-value projects. | Technology Development & Acquisition (TDA) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Development and acquisition management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for technology development and acquisition management.
• IT/cybersecurity personnel implement secure practices to protect the confidentiality, integrity, availability and safety of the organization’s technology assets, data and network(s).
• Secure development practices mostly conform to industry-recognized standards for secure engineering (e.g., OWASP, NIST SP 800-218, NIST SP 800-160, etc.).
• Procurement practices require third-party developers of systems, system components or services to follow secure engineering practices.
• A Project Management Office (PMO), or project management function, enables the implementation of cybersecurity & data privacy-related resource planning controls across the System Development Lifecycle (SDLC) for all high-value projects. | Technology Development & Acquisition (TDA) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Secure development practices conform to industry-recognized standards for secure engineering (e.g., OWASP, NIST SP 800-218, NIST SP 800-160, etc.).
• A procurement team, or similar function, ensures that third party development and/ or acquisitions meet, or exceed, the organization's business, cybersecurity & data privacy requirements to have secure and resilient systems, applications, services and processes.
• A Software Assurance Maturity Model (SAMM) governs a secure development lifecycle for the development of systems, applications and services.
• Administrative processes exist and technologies are configured to implement secure configuration settings by default to reduce the likelihood of software being deployed with weak security settings, putting the asset at a greater risk of compromise.
• An IT Asset Management (ITAM) function, or similar function, categorizes devices according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data.
• A formal Change Management (CM) program help to ensure that no unauthorized changes are made, all changes are documented, services are not disrupted and resources are used efficiently.
• A Governance, Risk & Compliance (GRC) function, or similar function;
o Provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data for technology development and acquisition.
o Ensures the Information Assurance Program (IAP) evaluates applicable cybersecurity & data privacy controls as part of “business as usual” pre-production testing.
o Operates the Cybersecurity Supply Chain Risk Management (C-SCRM) program to identify and mitigate supply chain-related risks and threats.
• A Project Management Office (PMO), or project management function, enables IAP pre-production testing of cybersecurity & data privacy controls as part of the organization’s established project management processes. | Technology Development & Acquisition (TDA) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to limit the use of commercially-provided Information Assurance (IA) and IA-enabled IT products to those products that have been successfully evaluated against a National Information Assurance partnership (NIAP)-approved Protection Profile or the cryptographic module is FIPS-validated or NSA-approved. | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | SA-4(10)
IA-5(11) | SA-4(10)
IA-5(11) | SA-4(10)
IA-5(11) | SA-4(10)
IA-5(11) | SA-4(7)
SA-4(10)
IA-2(1)
IA-2(2) | null | SA-4(10)
IA-2(1)
IA-2(2) | SA-4(10)
IA-2(1)
IA-2(2) | SA-4(10)
IA-2(1)
IA-2(2) | null | null | SA-4(10)
IA-2(1)
IA-2(2) | SA-4(10)
IA-2(1)
IA-2(2) | SA-4(10)
IA-2(1)
IA-2(2) | null | SA-4(7) | null | null | null | SA-4(7) | SA-4(7) | NFO - SA-4(10) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | IA-5(11) | null | null | null | null | null | null | null | SA-4(10)
IA-5(11) | IA-5(11) | SA-4(10)
IA-5(11) | SA-4(10)
IA-5(11) | SA-4(10)
IA-5(11) | SA-4(10) | SA-4(10) | SA-4(10) | SA-4(10) | SA-4(10) | null | null | null | null | null | null | null | null | null | IA-2(1)
IA-2(2) | null | null | null | null | null | null | null | null | 5.3 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | IA-2(1)
IA-2(2) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-GV-1 | null | null | null | null | null | null | null | null | null | null | null | null | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | null | R-GV-1 | null | null | null | null | null | null | null | null | null | null | null | null | null | NT-7
MT-1
MT-2
MT-7
MT-8
MT-9
MT-11
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | null | null | MT-7 | MT-8 | MT-9 | null | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Technology Development & Acquisition | Development Methods, Techniques & Processes | TDA-02.3 | Mechanisms exist to require software vendors / manufacturers to demonstrate that their software development processes employ industry-recognized secure practices for secure programming, engineering methods, quality control processes and validation techniques to minimize flawed or malformed software. | null | E-TDA-04 | Does the organization require software vendors / manufacturers to demonstrate that their software development processes employ industry-recognized secure practices for secure programming, engineering methods, quality control processes and validation techniques to minimize flawed or malformed software? | 5 | Identify | X | X | X | There is no evidence of a capability to require software vendors / manufacturers to demonstrate that their software development processes employ industry-recognized secure practices for secure programming, engineering methods, quality control processes and validation techniques to minimize flawed or malformed software. | SP-CMM1 is N/A, since a structured process is required to require software vendors / manufacturers to demonstrate that their software development processes employ industry-recognized secure practices for secure programming, engineering methods, quality control processes and validation techniques to minimize flawed or malformed software. | Technology Development & Acquisition (TDA) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Development and acquisition management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for technology development and acquisition management.
• IT/cybersecurity personnel implement secure practices to protect the confidentiality, integrity, availability and safety of the organization’s technology assets, data and network(s).
• Secure development practices mostly conform to industry-recognized standards for secure engineering (e.g., OWASP, NIST SP 800-218, NIST SP 800-160, etc.).
• Procurement practices require third-party developers of systems, system components or services to follow secure engineering practices.
• A Project Management Office (PMO), or project management function, enables the implementation of cybersecurity & data privacy-related resource planning controls across the System Development Lifecycle (SDLC) for all high-value projects. | Technology Development & Acquisition (TDA) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Secure development practices conform to industry-recognized standards for secure engineering (e.g., OWASP, NIST SP 800-218, NIST SP 800-160, etc.).
• A procurement team, or similar function, ensures that third party development and/ or acquisitions meet, or exceed, the organization's business, cybersecurity & data privacy requirements to have secure and resilient systems, applications, services and processes.
• A Software Assurance Maturity Model (SAMM) governs a secure development lifecycle for the development of systems, applications and services.
• Administrative processes exist and technologies are configured to implement secure configuration settings by default to reduce the likelihood of software being deployed with weak security settings, putting the asset at a greater risk of compromise.
• An IT Asset Management (ITAM) function, or similar function, categorizes devices according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data.
• A formal Change Management (CM) program help to ensure that no unauthorized changes are made, all changes are documented, services are not disrupted and resources are used efficiently.
• A Governance, Risk & Compliance (GRC) function, or similar function;
o Provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data for technology development and acquisition.
o Ensures the Information Assurance Program (IAP) evaluates applicable cybersecurity & data privacy controls as part of “business as usual” pre-production testing.
o Operates the Cybersecurity Supply Chain Risk Management (C-SCRM) program to identify and mitigate supply chain-related risks and threats.
• A Project Management Office (PMO), or project management function, enables IAP pre-production testing of cybersecurity & data privacy controls as part of the organization’s established project management processes. | See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to require software vendors / manufacturers to demonstrate that their software development processes employ industry-recognized secure practices for secure programming, engineering methods, quality control processes and validation techniques to minimize flawed or malformed software. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to require software vendors / manufacturers to demonstrate that their software development processes employ industry-recognized secure practices for secure programming, engineering methods, quality control processes and validation techniques to minimize flawed or malformed software. | null | null | null | 16.1 | null | 16.1 | 16.1 | null | null | null | SDV-07 | null | null | null | null | null | null | null | 14.2.9 | 8.25
8.29 | 14.2.9 | null | null | null | null | null | null | null | null | null | CT.DM-P9
CT.DM-P10 | null | null | null | SA-4(3) | null | null | null | SA-4(3)
SR-3(1) | null | null | null | null | SA-4(3)
SR-3(1) | null | null | null | null | null | SR-3(1) | null | null | null | SR-3(1) | SR-3(1) | null | 3.16.1 | null | null | null | PO.1
PO.1.1
PO.1.2
PO.1.3
PO.3
PO.3.1
PO.3.2
PO.3.3 | null | null | A04:2021 | null | 6.2
6.2.1 | null | 6.2.1 | null | null | 6.2.1 | null | 6.2.1 | 6.2.1 | null | i.1.4.2 | null | 5.3.1 | null | null | null | ARCHITECTURE-4.B.MIL2
ARCHITECTURE-4.E.MIL3 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 3.6.2(69)
3.6.2(74) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 8.6.1 [MP.SW.1] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 14.2.9 | null | null | null | null | null | null | null | 6.1.4
6.1.5
6.1.6
6.1.7 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
R-SA-2 | R-AC-1 | R-AC-2 | R-AC-3 | R-AC-4 | R-AM-1 | R-AM-2 | null | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | R-EX-6 | R-EX-7 | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | R-GV-8 | R-IR-1 | R-IR-2 | R-IR-3 | R-IR-4 | R-SA-1 | R-SA-2 | NT-7
MT-1
MT-2
MT-7
MT-8
MT-9
MT-11
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | null | null | MT-7 | MT-8 | MT-9 | null | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Technology Development & Acquisition | Pre-Established Secure Configurations | TDA-02.4 | Mechanisms exist to ensure vendors / manufacturers:
▪ Deliver the system, component, or service with a pre-established, secure configuration implemented; and
▪ Use the pre-established, secure configuration as the default for any subsequent system, component, or service reinstallation or upgrade. | null | null | Does the organization ensure vendors / manufacturers:
▪ Deliver the system, component, or service with a pre-established, secure configuration implemented; and
▪ Use the pre-established, secure configuration as the default for any subsequent system, component, or service reinstallation or upgrade? | 8 | Protect | null | X | X | There is no evidence of a capability to ensure software vendors / manufacturers:
▪ Deliver the system, component, or service with pre-established security configurations implemented; and
▪ Use the pre-established security configurations as the default for any subsequent system, component, or service reinstallation or upgrade. | SP-CMM1 is N/A, since a structured process is required to ensure software vendors / manufacturers:
▪ Deliver the system, component, or service with pre-established security configurations implemented; and
▪ Use the pre-established security configurations as the default for any subsequent system, component, or service reinstallation or upgrade. | Technology Development & Acquisition (TDA) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Development and acquisition management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for technology development and acquisition management.
• IT/cybersecurity personnel implement secure practices to protect the confidentiality, integrity, availability and safety of the organization’s technology assets, data and network(s).
• Secure development practices mostly conform to industry-recognized standards for secure engineering (e.g., OWASP, NIST SP 800-218, NIST SP 800-160, etc.).
• Procurement practices require third-party developers of systems, system components or services to follow secure engineering practices.
• A Project Management Office (PMO), or project management function, enables the implementation of cybersecurity & data privacy-related resource planning controls across the System Development Lifecycle (SDLC) for all high-value projects. | Technology Development & Acquisition (TDA) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Secure development practices conform to industry-recognized standards for secure engineering (e.g., OWASP, NIST SP 800-218, NIST SP 800-160, etc.).
• A procurement team, or similar function, ensures that third party development and/ or acquisitions meet, or exceed, the organization's business, cybersecurity & data privacy requirements to have secure and resilient systems, applications, services and processes.
• A Software Assurance Maturity Model (SAMM) governs a secure development lifecycle for the development of systems, applications and services.
• Administrative processes exist and technologies are configured to implement secure configuration settings by default to reduce the likelihood of software being deployed with weak security settings, putting the asset at a greater risk of compromise.
• An IT Asset Management (ITAM) function, or similar function, categorizes devices according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data.
• A formal Change Management (CM) program help to ensure that no unauthorized changes are made, all changes are documented, services are not disrupted and resources are used efficiently.
• A Governance, Risk & Compliance (GRC) function, or similar function;
o Provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data for technology development and acquisition.
o Ensures the Information Assurance Program (IAP) evaluates applicable cybersecurity & data privacy controls as part of “business as usual” pre-production testing.
o Operates the Cybersecurity Supply Chain Risk Management (C-SCRM) program to identify and mitigate supply chain-related risks and threats.
• A Project Management Office (PMO), or project management function, enables IAP pre-production testing of cybersecurity & data privacy controls as part of the organization’s established project management processes. | See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to ensure software vendors / manufacturers:
▪ Deliver the system, component, or service with pre-established security configurations implemented; and
▪ Use the pre-established security configurations as the default for any subsequent system, component, or service reinstallation or upgrade. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to ensure software vendors / manufacturers:
▪ Deliver the system, component, or service with pre-established security configurations implemented; and
▪ Use the pre-established security configurations as the default for any subsequent system, component, or service reinstallation or upgrade. | null | null | null | null | null | null | null | null | null | null | null | null | null | CR 7.6 (11.8.1) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | SA-4(5) | null | null | null | SA-4(5) | null | null | null | null | SA-4(5) | null | SA-4(5) | null | null | null | null | SA-4(5) | null | 3.16.1 | null | null | null | PW.1
PW.1.3 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | V.4.3
V.4.4
V.4.5 | null | null | null | null | null | ARCHITECTURE-4.C.MIL2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | SA-4(5) | null | null | SA-4(5) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 3.6.2(69) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
R-SA-2 | R-AC-1 | R-AC-2 | R-AC-3 | R-AC-4 | R-AM-1 | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | R-EX-6 | R-EX-7 | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | R-GV-8 | R-IR-1 | R-IR-2 | R-IR-3 | R-IR-4 | R-SA-1 | R-SA-2 | NT-7
MT-1
MT-2
MT-7
MT-8
MT-9
MT-11
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | null | null | MT-7 | MT-8 | MT-9 | null | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Technology Development & Acquisition | Identification & Justification of Ports, Protocols & Services | TDA-02.5 | Mechanisms exist to require process owners to identify, document and justify the business need for the ports, protocols and other services necessary to operate their technology solutions. | null | E-CPL-06
E-TDA-07 | Does the organization require process owners to identify, document and justify the business need for the ports, protocols and other services necessary to operate their technology solutions? | 8 | Identify | null | X | X | There is no evidence of a capability to require process owners to identify, document and justify the business need for the ports, protocols and other services necessary to operate their technology solutions. | SP-CMM1 is N/A, since a structured process is required to require process owners to identify, document and justify the business need for the ports, protocols and other services necessary to operate their technology solutions. | SP-CMM2 is N/A, since a well-defined process is required to require process owners to identify, document and justify the business need for the ports, protocols and other services necessary to operate their technology solutions. | Technology Development & Acquisition (TDA) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Secure development practices conform to industry-recognized standards for secure engineering (e.g., OWASP, NIST SP 800-218, NIST SP 800-160, etc.).
• A procurement team, or similar function, ensures that third party development and/ or acquisitions meet, or exceed, the organization's business, cybersecurity & data privacy requirements to have secure and resilient systems, applications, services and processes.
• A Software Assurance Maturity Model (SAMM) governs a secure development lifecycle for the development of systems, applications and services.
• Administrative processes exist and technologies are configured to implement secure configuration settings by default to reduce the likelihood of software being deployed with weak security settings, putting the asset at a greater risk of compromise.
• An IT Asset Management (ITAM) function, or similar function, categorizes devices according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data.
• A formal Change Management (CM) program help to ensure that no unauthorized changes are made, all changes are documented, services are not disrupted and resources are used efficiently.
• A Governance, Risk & Compliance (GRC) function, or similar function;
o Provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data for technology development and acquisition.
o Ensures the Information Assurance Program (IAP) evaluates applicable cybersecurity & data privacy controls as part of “business as usual” pre-production testing.
o Operates the Cybersecurity Supply Chain Risk Management (C-SCRM) program to identify and mitigate supply chain-related risks and threats.
• A Project Management Office (PMO), or project management function, enables IAP pre-production testing of cybersecurity & data privacy controls as part of the organization’s established project management processes. | See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to require process owners to identify, document and justify the business need for the ports, protocols and other services necessary to operate their technology solutions. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to require process owners to identify, document and justify the business need for the ports, protocols and other services necessary to operate their technology solutions. | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 1.2.5 | null | 1.2.5 | null | 1.2.5 | null | null | 1.2.5 | 1.2.5 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1 | R-AC-1 | R-AC-2 | R-AC-3 | R-AC-4 | R-AM-1 | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | R-EX-6 | R-EX-7 | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | null | R-IR-1 | R-IR-2 | R-IR-3 | R-IR-4 | R-SA-1 | null | MT-8
MT-9
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | MT-8 | MT-9 | null | null | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Technology Development & Acquisition | Insecure Ports, Protocols & Services | TDA-02.6 | Mechanisms exist to mitigate the risk associated with the use of insecure ports, protocols and services necessary to operate technology solutions. | null | null | Does the organization mitigate the risk associated with the use of insecure ports, protocols and services necessary to operate technology solutions? | 9 | Protect | null | X | X | There is no evidence of a capability to mitigate the risk associated with the use of insecure ports, protocols and services necessary to operate technology solutions. | SP-CMM1 is N/A, since a structured process is required to mitigate the risk associated with the use of insecure ports, protocols and services necessary to operate technology solutions. | SP-CMM2 is N/A, since a well-defined process is required to mitigate the risk associated with the use of insecure ports, protocols and services necessary to operate technology solutions. | Technology Development & Acquisition (TDA) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Secure development practices conform to industry-recognized standards for secure engineering (e.g., OWASP, NIST SP 800-218, NIST SP 800-160, etc.).
• A procurement team, or similar function, ensures that third party development and/ or acquisitions meet, or exceed, the organization's business, cybersecurity & data privacy requirements to have secure and resilient systems, applications, services and processes.
• A Software Assurance Maturity Model (SAMM) governs a secure development lifecycle for the development of systems, applications and services.
• Administrative processes exist and technologies are configured to implement secure configuration settings by default to reduce the likelihood of software being deployed with weak security settings, putting the asset at a greater risk of compromise.
• An IT Asset Management (ITAM) function, or similar function, categorizes devices according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data.
• A formal Change Management (CM) program help to ensure that no unauthorized changes are made, all changes are documented, services are not disrupted and resources are used efficiently.
• A Governance, Risk & Compliance (GRC) function, or similar function;
o Provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data for technology development and acquisition.
o Ensures the Information Assurance Program (IAP) evaluates applicable cybersecurity & data privacy controls as part of “business as usual” pre-production testing.
o Operates the Cybersecurity Supply Chain Risk Management (C-SCRM) program to identify and mitigate supply chain-related risks and threats.
• A Project Management Office (PMO), or project management function, enables IAP pre-production testing of cybersecurity & data privacy controls as part of the organization’s established project management processes. | See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to mitigate the risk associated with the use of insecure ports, protocols and services necessary to operate technology solutions. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to mitigate the risk associated with the use of insecure ports, protocols and services necessary to operate technology solutions. | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 1.2.6
2.2.5 | null | 1.2.6
2.2.5 | null | 1.2.6 | 2.2.5 | 2.2.5 | 1.2.6
2.2.5 | 1.2.6
2.2.5 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1 | R-AC-1 | R-AC-2 | R-AC-3 | R-AC-4 | R-AM-1 | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | R-EX-6 | R-EX-7 | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | null | R-IR-1 | R-IR-2 | R-IR-3 | R-IR-4 | R-SA-1 | null | MT-8
MT-9
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | MT-8 | MT-9 | null | null | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Technology Development & Acquisition | Cybersecurity & Data Privacy Representatives For Product Changes | TDA-02.7 | Mechanisms exist to include appropriate cybersecurity & data privacy representatives in the product feature and/or functionality change control review process. | null | null | Does the organization include appropriate cybersecurity & data privacy representatives in the product feature and/or functionality change control review process? | 10 | Identify | X | X | null | There is no evidence of a capability to include appropriate cybersecurity & data privacy representatives in the product feature and/ or functionality change control review process. | SP-CMM1 is N/A, since a structured process is required to include appropriate cybersecurity & data privacy representatives in the product feature and/ or functionality change control review process. | SP-CMM2 is N/A, since a well-defined process is required to include appropriate cybersecurity & data privacy representatives in the product feature and/ or functionality change control review process. | Technology Development & Acquisition (TDA) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Secure development practices conform to industry-recognized standards for secure engineering (e.g., OWASP, NIST SP 800-218, NIST SP 800-160, etc.).
• A procurement team, or similar function, ensures that third party development and/ or acquisitions meet, or exceed, the organization's business, cybersecurity & data privacy requirements to have secure and resilient systems, applications, services and processes.
• A Software Assurance Maturity Model (SAMM) governs a secure development lifecycle for the development of systems, applications and services.
• Administrative processes exist and technologies are configured to implement secure configuration settings by default to reduce the likelihood of software being deployed with weak security settings, putting the asset at a greater risk of compromise.
• An IT Asset Management (ITAM) function, or similar function, categorizes devices according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data.
• A formal Change Management (CM) program help to ensure that no unauthorized changes are made, all changes are documented, services are not disrupted and resources are used efficiently.
• A Governance, Risk & Compliance (GRC) function, or similar function;
o Provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data for technology development and acquisition.
o Ensures the Information Assurance Program (IAP) evaluates applicable cybersecurity & data privacy controls as part of “business as usual” pre-production testing.
o Operates the Cybersecurity Supply Chain Risk Management (C-SCRM) program to identify and mitigate supply chain-related risks and threats.
• A Project Management Office (PMO), or project management function, enables IAP pre-production testing of cybersecurity & data privacy controls as part of the organization’s established project management processes. | See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to include appropriate cybersecurity & data privacy representatives in the product feature and/ or functionality change control review process. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to include appropriate cybersecurity & data privacy representatives in the product feature and/ or functionality change control review process. | null | null | null | null | null | null | null | null | null | null | null | null | null | null | RC-05-13 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | SA-10(7) | null | null | null | null | SA-10(7) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | ARCHITECTURE-4.F.MIL3 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | SA-10(7) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 3.6.2(69) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1 | R-AC-1 | R-AC-2 | R-AC-3 | R-AC-4 | R-AM-1 | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | R-EX-6 | R-EX-7 | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | R-GV-8 | R-IR-1 | R-IR-2 | R-IR-3 | R-IR-4 | R-SA-1 | null | NT-1
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-11
MT-12
MT-13
MT-14
MT-15 | NT-1 | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | NT-9 | NT-10 | NT-11 | NT-12 | NT-13 | NT-14 | MT-1 | MT-2 | MT-3 | MT-4 | MT-5 | MT-6 | MT-7 | MT-8 | MT-9 | null | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Technology Development & Acquisition | Commercial Off-The-Shelf (COTS) Security Solutions | TDA-03 | Mechanisms exist to utilize only Commercial Off-the-Shelf (COTS) security products. | null | null | Does the organization utilize only Commercial Off-the-Shelf (COTS) security products? | 5 | Protect | null | X | X | There is no evidence of a capability to utilize only Commercial Off-the-Shelf (COTS) security products. | Technology Development & Acquisition (TDA) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• IT personnel use an informal process to govern technology development and acquisition.
• Secure development practices loosely conform to industry-recognized standards for secure engineering (e.g., OWASP, NIST SP 800-218, NIST SP 800-160, etc.).
• IT personnel work with data/process owners to help ensure secure practices are implemented throughout the System Development Lifecycle (SDLC) for all high-value projects. | Technology Development & Acquisition (TDA) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Development and acquisition management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for technology development and acquisition management.
• IT/cybersecurity personnel implement secure practices to protect the confidentiality, integrity, availability and safety of the organization’s technology assets, data and network(s).
• Secure development practices mostly conform to industry-recognized standards for secure engineering (e.g., OWASP, NIST SP 800-218, NIST SP 800-160, etc.).
• Procurement practices require third-party developers of systems, system components or services to follow secure engineering practices.
• A Project Management Office (PMO), or project management function, enables the implementation of cybersecurity & data privacy-related resource planning controls across the System Development Lifecycle (SDLC) for all high-value projects. | Technology Development & Acquisition (TDA) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Secure development practices conform to industry-recognized standards for secure engineering (e.g., OWASP, NIST SP 800-218, NIST SP 800-160, etc.).
• A procurement team, or similar function, ensures that third party development and/ or acquisitions meet, or exceed, the organization's business, cybersecurity & data privacy requirements to have secure and resilient systems, applications, services and processes.
• A Software Assurance Maturity Model (SAMM) governs a secure development lifecycle for the development of systems, applications and services.
• Administrative processes exist and technologies are configured to implement secure configuration settings by default to reduce the likelihood of software being deployed with weak security settings, putting the asset at a greater risk of compromise.
• An IT Asset Management (ITAM) function, or similar function, categorizes devices according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data.
• A formal Change Management (CM) program help to ensure that no unauthorized changes are made, all changes are documented, services are not disrupted and resources are used efficiently.
• A Governance, Risk & Compliance (GRC) function, or similar function;
o Provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data for technology development and acquisition.
o Ensures the Information Assurance Program (IAP) evaluates applicable cybersecurity & data privacy controls as part of “business as usual” pre-production testing.
o Operates the Cybersecurity Supply Chain Risk Management (C-SCRM) program to identify and mitigate supply chain-related risks and threats.
• A Project Management Office (PMO), or project management function, enables IAP pre-production testing of cybersecurity & data privacy controls as part of the organization’s established project management processes. | Technology Development & Acquisition (TDA) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to utilize only Commercial Off-the-Shelf (COTS) security products. | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | SA-4(6) | null | null | null | SA-4(6) | null | null | null | null | SA-4(6) | null | null | null | null | null | null | null | null | null | null | null | null | 3.16.1 | null | null | null | PW.4
PW.4.1
PW.4.2
PW.4.4 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 5.3.3
6.1.3 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-GV-1 | null | null | null | null | null | null | null | null | null | null | null | null | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | null | R-GV-1 | null | null | null | null | null | null | null | null | null | null | null | null | null | NT-7
MT-1
MT-2
MT-7
MT-8
MT-9
MT-11
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | null | null | MT-7 | MT-8 | MT-9 | null | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Technology Development & Acquisition | Supplier Diversity | TDA-03.1 | Mechanisms exist to obtain cybersecurity & data privacy technologies from different suppliers to minimize supply chain risk. | - Supplier diversity | null | Does the organization obtain cybersecurity & data privacy technologies from different suppliers to minimize supply chain risk? | 3 | Protect | null | X | X | There is no evidence of a capability to obtain cybersecurity & data privacy technologies from different suppliers to minimize supply chain risk. | Technology Development & Acquisition (TDA) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• IT personnel use an informal process to govern technology development and acquisition.
• Secure development practices loosely conform to industry-recognized standards for secure engineering (e.g., OWASP, NIST SP 800-218, NIST SP 800-160, etc.).
• IT personnel work with data/process owners to help ensure secure practices are implemented throughout the System Development Lifecycle (SDLC) for all high-value projects. | Technology Development & Acquisition (TDA) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Development and acquisition management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for technology development and acquisition management.
• IT/cybersecurity personnel implement secure practices to protect the confidentiality, integrity, availability and safety of the organization’s technology assets, data and network(s).
• Secure development practices mostly conform to industry-recognized standards for secure engineering (e.g., OWASP, NIST SP 800-218, NIST SP 800-160, etc.).
• Procurement practices require third-party developers of systems, system components or services to follow secure engineering practices.
• A Project Management Office (PMO), or project management function, enables the implementation of cybersecurity & data privacy-related resource planning controls across the System Development Lifecycle (SDLC) for all high-value projects. | Technology Development & Acquisition (TDA) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Secure development practices conform to industry-recognized standards for secure engineering (e.g., OWASP, NIST SP 800-218, NIST SP 800-160, etc.).
• A procurement team, or similar function, ensures that third party development and/ or acquisitions meet, or exceed, the organization's business, cybersecurity & data privacy requirements to have secure and resilient systems, applications, services and processes.
• A Software Assurance Maturity Model (SAMM) governs a secure development lifecycle for the development of systems, applications and services.
• Administrative processes exist and technologies are configured to implement secure configuration settings by default to reduce the likelihood of software being deployed with weak security settings, putting the asset at a greater risk of compromise.
• An IT Asset Management (ITAM) function, or similar function, categorizes devices according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data.
• A formal Change Management (CM) program help to ensure that no unauthorized changes are made, all changes are documented, services are not disrupted and resources are used efficiently.
• A Governance, Risk & Compliance (GRC) function, or similar function;
o Provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data for technology development and acquisition.
o Ensures the Information Assurance Program (IAP) evaluates applicable cybersecurity & data privacy controls as part of “business as usual” pre-production testing.
o Operates the Cybersecurity Supply Chain Risk Management (C-SCRM) program to identify and mitigate supply chain-related risks and threats.
• A Project Management Office (PMO), or project management function, enables IAP pre-production testing of cybersecurity & data privacy controls as part of the organization’s established project management processes. | Technology Development & Acquisition (TDA) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to obtain cybersecurity & data privacy technologies from different suppliers to minimize supply chain risk. | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | PL-8(2) | null | null | null | PL-8(2)
SR-3(1) | null | null | null | null | PL-8(2)
SR-3(1) | null | null | null | null | null | PL-8(2)
SR-3(1) | null | null | null | PL-8(2)
SR-3(1) | PL-8(2)
SR-3(1) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | I.1.16 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | R-AM-3
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-GV-1 | null | null | null | null | null | null | R-AM-3 | null | null | null | null | null | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | null | R-GV-1 | null | null | null | null | null | null | null | null | null | null | null | null | null | NT-1
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-11
MT-12
MT-13
MT-14
MT-15
MT-16 | NT-1 | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | NT-9 | NT-10 | NT-11 | NT-12 | NT-13 | NT-14 | MT-1 | MT-2 | MT-3 | MT-4 | MT-5 | MT-6 | MT-7 | MT-8 | MT-9 | null | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | MT-16 | null |
Technology Development & Acquisition | Documentation Requirements | TDA-04 | Mechanisms exist to obtain, protect and distribute administrator documentation for systems that describe:
▪ Secure configuration, installation and operation of the system;
▪ Effective use and maintenance of security features/functions; and
▪ Known vulnerabilities regarding configuration and use of administrative (e.g., privileged) functions. | null | E-CPL-06
E-TDA-06
E-TDA-10 | Does the organization obtain, protect and distribute administrator documentation for systems that describe:
▪ Secure configuration, installation and operation of the system;
▪ Effective use and maintenance of security features/functions; and
▪ Known vulnerabilities regarding configuration and use of administrative (e?g?, privileged) functions? | 8 | Protect | null | null | X | There is no evidence of a capability to obtain, protect and distribute administrator documentation for systems that describe:
▪ Secure configuration, installation and operation of the system;
▪ Effective use and maintenance of security features/functions; and
▪ Known vulnerabilities regarding configuration and use of administrative (e.g., privileged) functions. | SP-CMM1 is N/A, since a structured process is required to obtain, protect and distribute administrator documentation for systems that describe:
▪ Secure configuration, installation and operation of the system;
▪ Effective use and maintenance of security features/functions; and
▪ Known vulnerabilities regarding configuration and use of administrative (e.g., privileged) functions. | Technology Development & Acquisition (TDA) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Development and acquisition management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for technology development and acquisition management.
• IT/cybersecurity personnel implement secure practices to protect the confidentiality, integrity, availability and safety of the organization’s technology assets, data and network(s).
• Secure development practices mostly conform to industry-recognized standards for secure engineering (e.g., OWASP, NIST SP 800-218, NIST SP 800-160, etc.).
• Procurement practices require third-party developers of systems, system components or services to follow secure engineering practices.
• A Project Management Office (PMO), or project management function, enables the implementation of cybersecurity & data privacy-related resource planning controls across the System Development Lifecycle (SDLC) for all high-value projects. | Technology Development & Acquisition (TDA) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Secure development practices conform to industry-recognized standards for secure engineering (e.g., OWASP, NIST SP 800-218, NIST SP 800-160, etc.).
• A procurement team, or similar function, ensures that third party development and/ or acquisitions meet, or exceed, the organization's business, cybersecurity & data privacy requirements to have secure and resilient systems, applications, services and processes.
• A Software Assurance Maturity Model (SAMM) governs a secure development lifecycle for the development of systems, applications and services.
• Administrative processes exist and technologies are configured to implement secure configuration settings by default to reduce the likelihood of software being deployed with weak security settings, putting the asset at a greater risk of compromise.
• An IT Asset Management (ITAM) function, or similar function, categorizes devices according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data.
• A formal Change Management (CM) program help to ensure that no unauthorized changes are made, all changes are documented, services are not disrupted and resources are used efficiently.
• A Governance, Risk & Compliance (GRC) function, or similar function;
o Provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data for technology development and acquisition.
o Ensures the Information Assurance Program (IAP) evaluates applicable cybersecurity & data privacy controls as part of “business as usual” pre-production testing.
o Operates the Cybersecurity Supply Chain Risk Management (C-SCRM) program to identify and mitigate supply chain-related risks and threats.
• A Project Management Office (PMO), or project management function, enables IAP pre-production testing of cybersecurity & data privacy controls as part of the organization’s established project management processes. | Technology Development & Acquisition (TDA) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to obtain, protect and distribute administrator documentation for systems that describe:
▪ Secure configuration, installation and operation of the system;
▪ Effective use and maintenance of security features/functions; and
▪ Known vulnerabilities regarding configuration and use of administrative (e.g., privileged) functions. | null | null | null | null | null | null | null | null | null | IVS-08 | null | null | null | null | RQ-06-11
RQ-06-12
RQ-06-14
RQ-06-16
RQ-06-17
RQ-06-18
RQ-06-21
RQ-06-21.c
RQ-06-22 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | SA-5 | SA-5 | SA-5 | SA-5 | SA-5 | null | SA-5 | SA-5 | SA-5 | null | null | SA-5 | SA-5 | SA-5 | null | SA-5 | SA-5 | null | null | null | SA-5 | NFO - SA-5 | null | null | null | null | PO.1
PO.1.1
PO.1.2
PO.1.3 | null | null | A01:2021
A02:2021
A03:2021
A04:2021
A05:2021
A06:2021
A07:2021
A08:2021
A09:2021
A10:2021 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 4.1
5.1
6.1
6.2
6.3
6.4
6.5
6.6
6.7
6.8
6.9 | null | null | null | TM:SG4.SP2 | null | null | null | null | null | null | null | null | SA-5 | null | null | null | null | null | null | null | SA-5 | SA-5 | SA-5 | SA-5 | SA-5 | SA-5 | SA-5 | SA-5 | SA-5 | SA-5 | null | null | null | null | null | null | null | null | null | SA-5 | null | null | 8-202
8-320
8-610 | null | null | null | null | null | null | SA-5 | SA-5 | SA-5 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | SA-5 | SA-5 | SA-5 | null | null | null | 3.6.2(73) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | DEV-02 | null | null | null | 17.6
17.10 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 1-1-2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 1798 | null | null | null | null | null | null | null | null | null | null | null | null | null | 3.4.10.C.01
3.4.10.C.02 | null | null | null | null | 6.1.4 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | null | x | x | R-AM-3
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-GV-1
R-GV-2
R-GV-4
R-GV-5
R-IR-3
R-SA-1 | null | null | null | null | null | null | R-AM-3 | null | null | null | null | null | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | null | R-GV-1 | R-GV-2 | null | R-GV-4 | R-GV-5 | null | null | null | null | null | R-IR-3 | null | R-SA-1 | null | NT-7
MT-1
MT-2
MT-7
MT-8
MT-9
MT-11
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | null | null | MT-7 | MT-8 | MT-9 | null | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Technology Development & Acquisition | Functional Properties | TDA-04.1 | Mechanisms exist to require vendors/contractors to provide information describing the functional properties of the security controls to be utilized within systems, system components or services in sufficient detail to permit analysis and testing of the controls. | - SSAE-16 SOC2 report | E-CPL-06
E-TDA-06
E-TDA-10
E-TDA-15 | Does the organization require vendors/contractors to provide information describing the functional properties of the security controls to be utilized within systems, system components or services in sufficient detail to permit analysis and testing of the controls? | 8 | Protect | null | X | X | There is no evidence of a capability to require vendors/contractors to provide information describing the functional properties of the security controls to be utilized within systems, system components or services in sufficient detail to permit analysis and testing of the controls. | Technology Development & Acquisition (TDA) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• IT personnel use an informal process to govern technology development and acquisition.
• Secure development practices loosely conform to industry-recognized standards for secure engineering (e.g., OWASP, NIST SP 800-218, NIST SP 800-160, etc.).
• IT personnel work with data/process owners to help ensure secure practices are implemented throughout the System Development Lifecycle (SDLC) for all high-value projects. | Technology Development & Acquisition (TDA) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Development and acquisition management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for technology development and acquisition management.
• IT/cybersecurity personnel implement secure practices to protect the confidentiality, integrity, availability and safety of the organization’s technology assets, data and network(s).
• Secure development practices mostly conform to industry-recognized standards for secure engineering (e.g., OWASP, NIST SP 800-218, NIST SP 800-160, etc.).
• Procurement practices require third-party developers of systems, system components or services to follow secure engineering practices.
• A Project Management Office (PMO), or project management function, enables the implementation of cybersecurity & data privacy-related resource planning controls across the System Development Lifecycle (SDLC) for all high-value projects. | Technology Development & Acquisition (TDA) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Secure development practices conform to industry-recognized standards for secure engineering (e.g., OWASP, NIST SP 800-218, NIST SP 800-160, etc.).
• A procurement team, or similar function, ensures that third party development and/ or acquisitions meet, or exceed, the organization's business, cybersecurity & data privacy requirements to have secure and resilient systems, applications, services and processes.
• A Software Assurance Maturity Model (SAMM) governs a secure development lifecycle for the development of systems, applications and services.
• Administrative processes exist and technologies are configured to implement secure configuration settings by default to reduce the likelihood of software being deployed with weak security settings, putting the asset at a greater risk of compromise.
• An IT Asset Management (ITAM) function, or similar function, categorizes devices according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data.
• A formal Change Management (CM) program help to ensure that no unauthorized changes are made, all changes are documented, services are not disrupted and resources are used efficiently.
• A Governance, Risk & Compliance (GRC) function, or similar function;
o Provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data for technology development and acquisition.
o Ensures the Information Assurance Program (IAP) evaluates applicable cybersecurity & data privacy controls as part of “business as usual” pre-production testing.
o Operates the Cybersecurity Supply Chain Risk Management (C-SCRM) program to identify and mitigate supply chain-related risks and threats.
• A Project Management Office (PMO), or project management function, enables IAP pre-production testing of cybersecurity & data privacy controls as part of the organization’s established project management processes. | Technology Development & Acquisition (TDA) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to require vendors/contractors to provide information describing the functional properties of the security controls to be utilized within systems, system components or services in sufficient detail to permit analysis and testing of the controls. | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | SA-4(1)
SA-4(2) | null | SA-4(1)
SA-4(2) | SA-4(1)
SA-4(2) | SA-4(1)
SA-4(2) | null | null | SA-4(1)
SA-4(2) | SA-4(1)
SA-4(2) | null | null | null | SA-4(1)
SA-4(2) | SA-4(1)
SA-4(2) | null | null | null | null | null | null | null | NFO - SA-4(1)
NFO - SA-4(2) | null | null | null | null | null | null | null | A01:2021
A02:2021
A03:2021
A04:2021
A05:2021
A06:2021
A07:2021
A08:2021
A09:2021
A10:2021 | null | null | null | null | null | null | null | null | null | null | null | B.1.1.1 | null | null | 4.1
5.1
6.1
6.2
6.3
6.4
6.5
6.6
6.7
6.8
6.9 | null | null | null | null | null | null | null | null | null | null | null | null | SA-4(1)
SA-4(2) | null | null | null | null | null | null | null | SA-4(1)
SA-4(2) | null | SA-4(1)
SA-4(2) | SA-4(1)
SA-4(2) | null | SA-4(1)
SA-4(2) | null | SA-4(1)
SA-4(2) | SA-4(1)
SA-4(2) | null | null | null | null | null | null | null | null | null | null | SA-4(1)
SA-4(2) | null | null | null | null | null | null | null | null | null | null | null | SA-4(1) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | SA-4(1) | SA-4(1)
SA-4(2) | null | null | null | 3.6.2(69) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | DEV-02 | null | null | null | 17.6
17.10 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 1798 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | null | x | x | R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-GV-1
R-GV-2
R-GV-4
R-GV-5
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1 | R-AC-1 | R-AC-2 | R-AC-3 | R-AC-4 | null | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | null | R-GV-1 | R-GV-2 | null | R-GV-4 | R-GV-5 | null | null | null | R-IR-1 | R-IR-2 | R-IR-3 | R-IR-4 | R-SA-1 | null | NT-7
MT-1
MT-2
MT-7
MT-8
MT-9
MT-11
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | null | null | MT-7 | MT-8 | MT-9 | null | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Technology Development & Acquisition | Software Bill of Materials (SBOM) | TDA-04.2 | Mechanisms exist to require a Software Bill of Materials (SBOM) for systems, applications and services that lists software packages in use, including versions and applicable licenses. | null | E-TDA-12 | Does the organization require a Software Bill of Materials (SBOM) for systems, applications and services that lists software packages in use, including versions and applicable licenses? | 9 | Identify | null | X | X | There is no evidence of a capability to require a Software Bill of Materials (SBOM) for systems, applications and services that lists software packages in use, including versions and applicable licenses. | SP-CMM1 is N/A, since a structured process is required to require a Software Bill of Materials (SBOM) for systems, applications and services that lists software packages in use, including versions and applicable licenses. | SP-CMM2 is N/A, since a well-defined process is required to require a Software Bill of Materials (SBOM) for systems, applications and services that lists software packages in use, including versions and applicable licenses. | Technology Development & Acquisition (TDA) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Secure development practices conform to industry-recognized standards for secure engineering (e.g., OWASP, NIST SP 800-218, NIST SP 800-160, etc.).
• A procurement team, or similar function, ensures that third party development and/ or acquisitions meet, or exceed, the organization's business, cybersecurity & data privacy requirements to have secure and resilient systems, applications, services and processes.
• A Software Assurance Maturity Model (SAMM) governs a secure development lifecycle for the development of systems, applications and services.
• Administrative processes exist and technologies are configured to implement secure configuration settings by default to reduce the likelihood of software being deployed with weak security settings, putting the asset at a greater risk of compromise.
• An IT Asset Management (ITAM) function, or similar function, categorizes devices according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data.
• A formal Change Management (CM) program help to ensure that no unauthorized changes are made, all changes are documented, services are not disrupted and resources are used efficiently.
• A Governance, Risk & Compliance (GRC) function, or similar function;
o Provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data for technology development and acquisition.
o Ensures the Information Assurance Program (IAP) evaluates applicable cybersecurity & data privacy controls as part of “business as usual” pre-production testing.
o Operates the Cybersecurity Supply Chain Risk Management (C-SCRM) program to identify and mitigate supply chain-related risks and threats.
• A Project Management Office (PMO), or project management function, enables IAP pre-production testing of cybersecurity & data privacy controls as part of the organization’s established project management processes.
• A Software Bill of Materials (SBOM) is required, for systems, applications and services, listing software packages in use, including versions and applicable licenses. | See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to require a Software Bill of Materials (SBOM) for systems, applications and services that lists software packages in use, including versions and applicable licenses. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to require a Software Bill of Materials (SBOM) for systems, applications and services that lists software packages in use, including versions and applicable licenses. | null | null | null | 16.2
16.4 | null | 16.2
16.4 | 16.2
16.4 | null | null | null | SDV-02 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | PO.1
PO.1.1
PO.1.2
PO.1.3
PS.3.2 | null | null | null | null | 6.3.2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 1730 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | R-AM-3
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-GV-1
R-GV-4
R-GV-6
R-GV-7 | null | null | null | null | null | null | R-AM-3 | null | null | null | null | null | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | null | R-GV-1 | null | null | R-GV-4 | null | R-GV-6 | R-GV-7 | null | null | null | null | null | null | null | NT-7
MT-1
MT-2
MT-8
MT-9
MT-11
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | null | null | null | MT-8 | MT-9 | null | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Technology Development & Acquisition | Developer Architecture & Design | TDA-05 | Mechanisms exist to require the developers of systems, system components or services to produce a design specification and security architecture that:
▪ Is consistent with and supportive of the organization’s security architecture which is established within and is an integrated part of the organization’s enterprise architecture;
▪ Accurately and completely describes the required security functionality and the allocation of security controls among physical and logical components; and
▪ Expresses how individual security functions, mechanisms and services work together to provide required security capabilities and a unified approach to protection. | null | E-TDA-04 | Does the organization require the developers of systems, system components or services to produce a design specification and security architecture that:
▪ Is consistent with and supportive of the organization’s security architecture which is established within and is an integrated part of the organization’s enterprise architecture;
▪ Accurately and completely describes the required security functionality and the allocation of security controls among physical and logical components; and
▪ Expresses how individual security functions, mechanisms and services work together to provide required security capabilities and a unified approach to protection? | 8 | Protect | null | X | X | There is no evidence of a capability to require the developers of systems, system components or services to produce a design specification and security architecture that:
▪ Is consistent with and supportive of the organization’s security architecture which is established within and is an integrated part of the organization’s enterprise architecture;
▪ Accurately and completely describes the required security functionality and the allocation of security controls among physical and logical components; and
▪ Expresses how individual security functions, mechanisms and services work together to provide required security capabilities and a unified approach to protection. | SP-CMM1 is N/A, since a structured process is required to require the developers of systems, system components or services to produce a design specification and security architecture that:
▪ Is consistent with and supportive of the organization’s security architecture which is established within and is an integrated part of the organization’s enterprise architecture;
▪ Accurately and completely describes the required security functionality and the allocation of security controls among physical and logical components; and
▪ Expresses how individual security functions, mechanisms and services work together to provide required security capabilities and a unified approach to protection. | Technology Development & Acquisition (TDA) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Development and acquisition management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for technology development and acquisition management.
• IT/cybersecurity personnel implement secure practices to protect the confidentiality, integrity, availability and safety of the organization’s technology assets, data and network(s).
• Secure development practices mostly conform to industry-recognized standards for secure engineering (e.g., OWASP, NIST SP 800-218, NIST SP 800-160, etc.).
• Procurement practices require third-party developers of systems, system components or services to follow secure engineering practices.
• A Project Management Office (PMO), or project management function, enables the implementation of cybersecurity & data privacy-related resource planning controls across the System Development Lifecycle (SDLC) for all high-value projects. | Technology Development & Acquisition (TDA) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Secure development practices conform to industry-recognized standards for secure engineering (e.g., OWASP, NIST SP 800-218, NIST SP 800-160, etc.).
• A procurement team, or similar function, ensures that third party development and/ or acquisitions meet, or exceed, the organization's business, cybersecurity & data privacy requirements to have secure and resilient systems, applications, services and processes.
• A Software Assurance Maturity Model (SAMM) governs a secure development lifecycle for the development of systems, applications and services.
• Administrative processes exist and technologies are configured to implement secure configuration settings by default to reduce the likelihood of software being deployed with weak security settings, putting the asset at a greater risk of compromise.
• An IT Asset Management (ITAM) function, or similar function, categorizes devices according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data.
• A formal Change Management (CM) program help to ensure that no unauthorized changes are made, all changes are documented, services are not disrupted and resources are used efficiently.
• A Governance, Risk & Compliance (GRC) function, or similar function;
o Provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data for technology development and acquisition.
o Ensures the Information Assurance Program (IAP) evaluates applicable cybersecurity & data privacy controls as part of “business as usual” pre-production testing.
o Operates the Cybersecurity Supply Chain Risk Management (C-SCRM) program to identify and mitigate supply chain-related risks and threats.
• A Project Management Office (PMO), or project management function, enables IAP pre-production testing of cybersecurity & data privacy controls as part of the organization’s established project management processes. | Technology Development & Acquisition (TDA) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to require the developers of systems, system components or services to produce a design specification and security architecture that:
▪ Is consistent with and supportive of the organization’s security architecture which is established within and is an integrated part of the organization’s enterprise architecture;
▪ Accurately and completely describes the required security functionality and the allocation of security controls among physical and logical components; and
▪ Expresses how individual security functions, mechanisms and services work together to provide required security capabilities and a unified approach to protection. | null | null | null | 16.1
16.10 | null | 16.1
16.10 | 16.1
16.10 | null | null | null | null | null | null | null | RQ-06-15.a
RQ-06-15.b
RQ-06-15.c
RQ-06-16.a
RQ-06-16.b
RQ-06-16.c
RQ-06-16.d
RQ-06-17.a
RQ-06-17.b
RQ-06-18
RQ-06-19
RQ-06-20
RQ-06-21.a
RQ-06-21.b
RQ-06-21.c
RQ-10-01.a
RQ-10-01.b
RQ-10-01.c
RQ-10-02
RQ-10-03
RQ-10-04.a
RQ-10-04.b
RQ-10-04.c
RQ-10-04.d
RQ-10-04.e
RQ-10-04.f
RQ-10-05
RQ-10-06
RQ-10-07
RQ-10-08
RQ-10-09 | null | null | null | null | 8.27
8.30 | null | null | null | null | null | null | T1078, T1078.001, T1078.003, T1078.004, T1134.005, T1482, T1574.002 | null | null | null | null | null | null | null | SA-17 | null | null | SA-17 | SA-17 | null | null | null | SA-17 | null | null | null | null | SA-17 | null | SA-17 | null | null | null | SA-17 | SA-17 | null | 3.16.1 | null | null | 3.14.1e
3.14.7e | PO.1
PO.1.1
PO.1.2
PO.1.3
PO.3
PO.3.1
PO.3.2
PO.3.3 | null | null | A04:2021 | null | 6.2
6.2.1 | null | 6.2.1 | null | null | 6.2.1 | null | 6.2.1 | 6.2.1 | null | G.3 | null | 5.3.1 | 5.1 | null | null | null | RTSE:SG1.SP3 | null | null | null | null | TBD - 3.14.1e
TBD - 3.14.7e | null | null | SI.L3-3.14.1e | null | null | null | null | null | null | null | null | SA-17 | null | null | SA-17 | null | SA-17 | null | null | SA-17 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 3.6.2(69) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | DEV-02 | null | null | null | 17.6 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 1-6-3-4 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 6.1.5
6.2.1
6.2.2
6.3.1
6.3.2
6.4.1
6.4.2
6.4.3
6.4.4
6.4.5
6.4.6
6.4.7
6.4.8
6.5.1
6.5.2
6.5.3 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | null | null | null | R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
R-SA-2 | R-AC-1 | R-AC-2 | R-AC-3 | R-AC-4 | R-AM-1 | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | R-EX-6 | R-EX-7 | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | R-GV-8 | R-IR-1 | R-IR-2 | R-IR-3 | R-IR-4 | R-SA-1 | R-SA-2 | NT-1
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-11
MT-12
MT-13
MT-14
MT-15
MT-16 | NT-1 | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | NT-9 | NT-10 | NT-11 | NT-12 | NT-13 | NT-14 | MT-1 | MT-2 | MT-3 | MT-4 | MT-5 | MT-6 | MT-7 | MT-8 | MT-9 | null | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | MT-16 | null |
Technology Development & Acquisition | Physical Diagnostic & Test Interfaces | TDA-05.1 | Mechanisms exist to secure physical diagnostic and test interfaces to prevent misuse. | null | null | Does the organization secure physical diagnostic and test interfaces to prevent misuse? | 5 | Detect | null | null | X | There is no evidence of a capability to secure physical diagnostic and test interfaces to prevent misuse. | SP-CMM1 is N/A, since a structured process is required to secure physical diagnostic and test interfaces to prevent misuse. | Technology Development & Acquisition (TDA) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Development and acquisition management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for technology development and acquisition management.
• IT/cybersecurity personnel implement secure practices to protect the confidentiality, integrity, availability and safety of the organization’s technology assets, data and network(s).
• Secure development practices mostly conform to industry-recognized standards for secure engineering (e.g., OWASP, NIST SP 800-218, NIST SP 800-160, etc.).
• Procurement practices require third-party developers of systems, system components or services to follow secure engineering practices.
• A Project Management Office (PMO), or project management function, enables the implementation of cybersecurity & data privacy-related resource planning controls across the System Development Lifecycle (SDLC) for all high-value projects. | Technology Development & Acquisition (TDA) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Secure development practices conform to industry-recognized standards for secure engineering (e.g., OWASP, NIST SP 800-218, NIST SP 800-160, etc.).
• A procurement team, or similar function, ensures that third party development and/ or acquisitions meet, or exceed, the organization's business, cybersecurity & data privacy requirements to have secure and resilient systems, applications, services and processes.
• A Software Assurance Maturity Model (SAMM) governs a secure development lifecycle for the development of systems, applications and services.
• Administrative processes exist and technologies are configured to implement secure configuration settings by default to reduce the likelihood of software being deployed with weak security settings, putting the asset at a greater risk of compromise.
• An IT Asset Management (ITAM) function, or similar function, categorizes devices according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data.
• A formal Change Management (CM) program help to ensure that no unauthorized changes are made, all changes are documented, services are not disrupted and resources are used efficiently.
• A Governance, Risk & Compliance (GRC) function, or similar function;
o Provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data for technology development and acquisition.
o Ensures the Information Assurance Program (IAP) evaluates applicable cybersecurity & data privacy controls as part of “business as usual” pre-production testing.
o Operates the Cybersecurity Supply Chain Risk Management (C-SCRM) program to identify and mitigate supply chain-related risks and threats.
• A Project Management Office (PMO), or project management function, enables IAP pre-production testing of cybersecurity & data privacy controls as part of the organization’s established project management processes. | See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to secure physical diagnostic and test interfaces to prevent misuse. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to secure physical diagnostic and test interfaces to prevent misuse. | null | null | null | null | null | null | null | null | null | null | null | null | null | CR 2.13 (6.15)
EDR 2.13 (13.3.1)
HDR 2.13 (14.3.1)
NDR 2.13 (15.5.1) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 2.2.6 | null | 2.2.6 | null | null | 2.2.6 | 2.2.6 | 2.2.6 | 2.2.6 | null | F.1.2.8.1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-2
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-GV-1
R-GV-2
R-GV-4
R-GV-5
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1 | R-AC-1 | R-AC-2 | R-AC-3 | R-AC-4 | null | R-AM-2 | null | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | null | R-GV-1 | R-GV-2 | null | R-GV-4 | R-GV-5 | null | null | null | R-IR-1 | R-IR-2 | R-IR-3 | R-IR-4 | R-SA-1 | null | NT-7
MT-1
MT-2
MT-7
MT-8
MT-9
MT-11
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | null | null | MT-7 | MT-8 | MT-9 | null | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Technology Development & Acquisition | Diagnostic & Test Interface Monitoring | TDA-05.2 | Mechanisms exist to enable endpoint devices to log events and generate alerts for attempts to access diagnostic and test interfaces. | null | null | Does the organization enable endpoint devices to log events and generate alerts for attempts to access diagnostic and test interfaces? | 3 | Detect | null | null | X | There is no evidence of a capability to enable endpoint devices to log events and generate alerts for attempts to access diagnostic and test interfaces. | SP-CMM1 is N/A, since a structured process is required to enable endpoint devices to log events and generate alerts for attempts to access diagnostic and test interfaces. | Technology Development & Acquisition (TDA) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Development and acquisition management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for technology development and acquisition management.
• IT/cybersecurity personnel implement secure practices to protect the confidentiality, integrity, availability and safety of the organization’s technology assets, data and network(s).
• Secure development practices mostly conform to industry-recognized standards for secure engineering (e.g., OWASP, NIST SP 800-218, NIST SP 800-160, etc.).
• Procurement practices require third-party developers of systems, system components or services to follow secure engineering practices.
• A Project Management Office (PMO), or project management function, enables the implementation of cybersecurity & data privacy-related resource planning controls across the System Development Lifecycle (SDLC) for all high-value projects. | Technology Development & Acquisition (TDA) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Secure development practices conform to industry-recognized standards for secure engineering (e.g., OWASP, NIST SP 800-218, NIST SP 800-160, etc.).
• A procurement team, or similar function, ensures that third party development and/ or acquisitions meet, or exceed, the organization's business, cybersecurity & data privacy requirements to have secure and resilient systems, applications, services and processes.
• A Software Assurance Maturity Model (SAMM) governs a secure development lifecycle for the development of systems, applications and services.
• Administrative processes exist and technologies are configured to implement secure configuration settings by default to reduce the likelihood of software being deployed with weak security settings, putting the asset at a greater risk of compromise.
• An IT Asset Management (ITAM) function, or similar function, categorizes devices according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data.
• A formal Change Management (CM) program help to ensure that no unauthorized changes are made, all changes are documented, services are not disrupted and resources are used efficiently.
• A Governance, Risk & Compliance (GRC) function, or similar function;
o Provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data for technology development and acquisition.
o Ensures the Information Assurance Program (IAP) evaluates applicable cybersecurity & data privacy controls as part of “business as usual” pre-production testing.
o Operates the Cybersecurity Supply Chain Risk Management (C-SCRM) program to identify and mitigate supply chain-related risks and threats.
• A Project Management Office (PMO), or project management function, enables IAP pre-production testing of cybersecurity & data privacy controls as part of the organization’s established project management processes. | See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to enable endpoint devices to log events and generate alerts for attempts to access diagnostic and test interfaces. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to enable endpoint devices to log events and generate alerts for attempts to access diagnostic and test interfaces. | null | null | null | null | null | null | null | null | null | null | null | null | null | EDR 2.13 (13.3.3(1))
HDR 2.13 (14.3.3(1))
NDR 2.13 (15.5.3(1)) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | M.1.1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-2
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-GV-1
R-GV-2
R-GV-4
R-GV-5
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1 | R-AC-1 | R-AC-2 | R-AC-3 | R-AC-4 | null | R-AM-2 | null | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | null | R-GV-1 | R-GV-2 | null | R-GV-4 | R-GV-5 | null | null | null | R-IR-1 | R-IR-2 | R-IR-3 | R-IR-4 | R-SA-1 | null | NT-7
MT-1
MT-2
MT-7
MT-8
MT-9
MT-11
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | null | null | MT-7 | MT-8 | MT-9 | null | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Technology Development & Acquisition | Secure Coding | TDA-06 | Mechanisms exist to develop applications based on secure coding principles. | - OWASP's Application Security Verification Standard (ASVS)
- Mobile Application Security Verification Standard (MASVS) | E-TDA-08
E-TDA-11 | Does the organization develop applications based on secure coding principles? | 10 | Protect | X | X | X | There is no evidence of a capability to develop applications based on secure coding principles. | SP-CMM1 is N/A, since a structured process is required to develop applications based on secure coding principles. | Technology Development & Acquisition (TDA) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Development and acquisition management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for technology development and acquisition management.
• IT/cybersecurity personnel implement secure practices to protect the confidentiality, integrity, availability and safety of the organization’s technology assets, data and network(s).
• Secure development practices mostly conform to industry-recognized standards for secure engineering (e.g., OWASP, NIST SP 800-218, NIST SP 800-160, etc.).
• Procurement practices require third-party developers of systems, system components or services to follow secure engineering practices.
• A Project Management Office (PMO), or project management function, enables the implementation of cybersecurity & data privacy-related resource planning controls across the System Development Lifecycle (SDLC) for all high-value projects. | Technology Development & Acquisition (TDA) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Secure development practices conform to industry-recognized standards for secure engineering (e.g., OWASP, NIST SP 800-218, NIST SP 800-160, etc.).
• A procurement team, or similar function, ensures that third party development and/ or acquisitions meet, or exceed, the organization's business, cybersecurity & data privacy requirements to have secure and resilient systems, applications, services and processes.
• A Software Assurance Maturity Model (SAMM) governs a secure development lifecycle for the development of systems, applications and services.
• Administrative processes exist and technologies are configured to implement secure configuration settings by default to reduce the likelihood of software being deployed with weak security settings, putting the asset at a greater risk of compromise.
• An IT Asset Management (ITAM) function, or similar function, categorizes devices according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data.
• A formal Change Management (CM) program help to ensure that no unauthorized changes are made, all changes are documented, services are not disrupted and resources are used efficiently.
• A Governance, Risk & Compliance (GRC) function, or similar function;
o Provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data for technology development and acquisition.
o Ensures the Information Assurance Program (IAP) evaluates applicable cybersecurity & data privacy controls as part of “business as usual” pre-production testing.
o Operates the Cybersecurity Supply Chain Risk Management (C-SCRM) program to identify and mitigate supply chain-related risks and threats.
• A Project Management Office (PMO), or project management function, enables IAP pre-production testing of cybersecurity & data privacy controls as part of the organization’s established project management processes. | Technology Development & Acquisition (TDA) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | Technology Development & Acquisition (TDA) efforts are “world-class” capabilities that leverage predictive analysis (e.g., machine learning, AI, etc.). In addition to CMM Level 4 criteria, CMM Level 5 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Stakeholders make time-sensitive decisions to support operational efficiency, which may include automated remediation actions.
▪ Based on predictive analysis, process improvements are implemented according to “continuous improvement” practices that affect process changes. | PI1.1
PI1.2
PI1.3
PI1.4
PI1.5 | PI1.2-POF1
PI1.2-POF2
PI1.2-POF3
PI1.3-POF1
PI1.3-POF2
PI1.3-POF3
PI1.3-POF4
PI1.3-POF5
PI1.4-POF1
PI1.4-POF2
PI1.4-POF3
PI1.4-POF4
PI1.5-POF1
PI1.5-POF2
PI1.5-POF3
PI1.5-POF4 | null | 16.0
16.1
16.5
16.10
16.11 | null | 16.1
16.5
16.10
16.11 | 16.1
16.5
16.10
16.11 | APO03.02 | null | AIS-04 | SDV-05 | null | null | CCSC 4 (4.5) | RQ-10-01.a
RQ-10-01.b
RQ-10-01.c
RQ-10-02
RQ-10-03
RQ-10-04.a
RQ-10-04.b
RQ-10-04.c
RQ-10-04.d
RQ-10-04.e
RQ-10-04.f
RQ-10-05
RQ-10-06
RQ-10-07
RQ-10-08
RQ-10-09 | null | null | null | 14.2.1
14.2.5 | 8.25
8.26
8.27
8.28
8.30 | 14.2.1
14.2.5 | null | 6.11.2
6.11.2.1
6.11.2.5 | null | null | null | T1078, T1078.001, T1078.003, T1078.004, T1213.003, T1528, T1552, T1552.001, T1552.002, T1552.004, T1552.006, T1558.004, T1574.002 | TS-1.12
TS-1.13 | Sec 4(D)(2)(e) | null | CT.PO-P1
CT.DM-P7
CT.DM-P8
CT.DM-P9
CT.DM-P10 | PW.1
PW.1.1
PW.4
PW.4.1
PW.4.2
PW.4.3
PW.5
PW.5.1 | null | null | SA-1
SA-15 | SA-1 | SA-1 | SA-1
SA-15 | SA-1
SA-4(3)
SA-15 | SA-1 | SA-1 | SA-1
SA-15 | SA-1
SA-15 | SA-4(3) | null | SA-1 | SA-1
SA-15 | SA-1
SA-15 | null | SA-1
SA-15 | SA-1 | null | SA-1 | SA-1
SA-15 | SA-1
SA-15 | NFO - SA-1 | 3.16.1 | 3.13.2[b]
3.13.2[e] | null | null | PO.1
PO.1.1
PO.1.2
PO.1.3
PO.3
PO.3.1
PO.3.2
PO.3.3
PW.5
PW.5.1
PW.6
PW.6.1
PW.6.2 | null | PR.PS-06 | A01:2021
A02:2021
A03:2021
A04:2021
A05:2021
A06:2021
A07:2021
A08:2021
A09:2021
A10:2021 | 6.3
6.3.1
6.3.2
6.5
6.5.1
6.5.2
6.5.3
6.5.4
6.5.5
6.5.6
6.5.7
6.5.8
6.5.9
6.5.10 | 6.2
6.2.1
6.2.4 | null | 6.2.1
6.2.4 | null | null | 6.2.1
6.2.4 | null | 6.2.1
6.2.4 | 6.2.1
6.2.4 | null | G.2.12 | 2.10 | 5.3.1 | 4.1
5.1 | null | null | null | CTRL:SG2.SP1
IMC:SG1.SP1
MA:SG1.SP2
MA:SG2.SP4
RTSE:SG1.SP1 | null | 5.10.4.5 | null | null | null | null | null | null | SA-1 | null | null | null | null | null | null | null | SA-1
SA-15 | SA-1 | SA-1 | SA-1
SA-15 | SA-1 | SA-1
SA-15 | SA-1 | SA-1
SA-15 | SA-1
SA-15 | SA-1 | null | null | null | null | 314.4(c)(4) | null | null | null | null | SA-1
SA-15 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 500.08 | null | null | 38-99-20(D)(2)(e) | null | null | SA-1 | SA-1 | SA-1 | null | null | null | 3.6.2(69) | null | null | null | Article 21.3 | null | null | null | null | null | null | null | null | null | 7.6
7.7
7.8
7.9
7.10 | DEV-02
DEV-07
DEV-08 | null | null | null | 11.9
17.6
17.9
17.20
17.25 | null | null | null | null | null | null | null | null | null | null | null | 1-3-2-3
2-13-1
2-13-2
2-13-3-1
2-13-3-2
2-13-3-3
2-13-3-4 | TPC-60
TPC-62 | null | 1-6-3-1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 1419
0401
1239
1552 | null | null | null | null | null | null | null | null | null | null | 14.2.1
14.2.1.13.PB
14.2.5 | null | null | 14.4.5.C.01 | null | null | null | null | 5.3.2
6.1.1
6.1.2
6.2.1
6.2.2
6.3.1
6.3.2
6.4.1
6.4.2
6.4.3
6.4.4
6.4.5
6.4.6
6.4.7
6.4.8
6.5.1
6.5.2
6.5.3 | null | null | null | null | null | 6.20 | null | 4.8
4.9 | 2.4.5 | null | null | null | null | null | null | null | null | null | null | x | NAIC | x | x | R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
R-SA-2 | R-AC-1 | R-AC-2 | R-AC-3 | R-AC-4 | R-AM-1 | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | R-EX-6 | R-EX-7 | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | null | R-IR-1 | R-IR-2 | R-IR-3 | R-IR-4 | R-SA-1 | R-SA-2 | NT-7
MT-1
MT-2
MT-7
MT-8
MT-9
MT-11
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | null | null | MT-7 | MT-8 | MT-9 | null | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Technology Development & Acquisition | Criticality Analysis | TDA-06.1 | Mechanisms exist to require the developer of the system, system component or service to perform a criticality analysis at organization-defined decision points in the Secure Development Life Cycle (SDLC). | - Secure Development Life Cycle (SDLC) | null | Does the organization require the developer of the system, system component or service to perform a criticality analysis at organization-defined decision points in the Secure Development Life Cycle (SDLC)? | 9 | Protect | null | X | X | There is no evidence of a capability to require the developer of the system, system component or service to perform a criticality analysis at organization-defined decision points in the Secure Development Life Cycle (SDLC). | SP-CMM1 is N/A, since a structured process is required to require the developer of the system, system component or service to perform a criticality analysis at organization-defined decision points in the Secure Development Life Cycle (SDLC). | Technology Development & Acquisition (TDA) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Development and acquisition management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for technology development and acquisition management.
• IT/cybersecurity personnel implement secure practices to protect the confidentiality, integrity, availability and safety of the organization’s technology assets, data and network(s).
• Secure development practices mostly conform to industry-recognized standards for secure engineering (e.g., OWASP, NIST SP 800-218, NIST SP 800-160, etc.).
• Procurement practices require third-party developers of systems, system components or services to follow secure engineering practices.
• A Project Management Office (PMO), or project management function, enables the implementation of cybersecurity & data privacy-related resource planning controls across the System Development Lifecycle (SDLC) for all high-value projects. | Technology Development & Acquisition (TDA) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Secure development practices conform to industry-recognized standards for secure engineering (e.g., OWASP, NIST SP 800-218, NIST SP 800-160, etc.).
• A procurement team, or similar function, ensures that third party development and/ or acquisitions meet, or exceed, the organization's business, cybersecurity & data privacy requirements to have secure and resilient systems, applications, services and processes.
• A Software Assurance Maturity Model (SAMM) governs a secure development lifecycle for the development of systems, applications and services.
• Administrative processes exist and technologies are configured to implement secure configuration settings by default to reduce the likelihood of software being deployed with weak security settings, putting the asset at a greater risk of compromise.
• An IT Asset Management (ITAM) function, or similar function, categorizes devices according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data.
• A formal Change Management (CM) program help to ensure that no unauthorized changes are made, all changes are documented, services are not disrupted and resources are used efficiently.
• A Governance, Risk & Compliance (GRC) function, or similar function;
o Provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data for technology development and acquisition.
o Ensures the Information Assurance Program (IAP) evaluates applicable cybersecurity & data privacy controls as part of “business as usual” pre-production testing.
o Operates the Cybersecurity Supply Chain Risk Management (C-SCRM) program to identify and mitigate supply chain-related risks and threats.
• A Project Management Office (PMO), or project management function, enables IAP pre-production testing of cybersecurity & data privacy controls as part of the organization’s established project management processes. | Technology Development & Acquisition (TDA) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to require the developer of the system, system component or service to perform a criticality analysis at organization-defined decision points in the Secure Development Life Cycle (SDLC). | PI1.1 | null | null | null | null | null | null | null | null | null | SET-01 | null | null | null | null | null | null | null | null | 8.29 | null | null | null | null | null | 5.3.3 | T1195.003, T1495, T1542, T1542.001, T1542.003, T1542.004, T1542.005, T1553, T1553.006, T1601, T1601.001, T1601.002 | null | null | null | ID.BE-P3 | PW.1.1 | null | null | null | null | null | null | PM-30(1)
RA-9
SA-15(3) | null | null | SA-15(3) | SA-15(3) | PM-30(1) | null | null | SA-15(3) | SA-15(3) | null | SA-15(3) | null | null | null | SA-15(3) | SA-15(3) | null | null | null | null | null | PW.1
PW.1.1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | K.11.2 | null | null | null | 7.3.3 | 7.3.3 | ASSET-1.C.MIL2
ASSET-1.D.MIL2
ASSET-2.C.MIL2
ASSET-2.D.MIL2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | RA-9
SA-15(3) | null | RA-9
SA-15(3) | RA-9
SA-15(3) | null | null | null | null | null | null | null | null | null | null | SA-15(3) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | A4 | null | null | null | null | null | null | null | null | null | null | null | 21(b) | null | null | null | null | null | null | null | null | null | null | 14.4.6.C.01
14.4.6.C.02
14.4.6.C.03 | null | null | null | null | null | null | null | null | null | null | null | null | null | 3.2.3 | null | null | null | null | null | null | null | null | null | null | x | null | null | null | R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-GV-1
R-GV-2
R-GV-4
R-GV-5
R-IR-2
R-IR-3
R-IR-4
R-SA-1 | null | null | null | null | R-AM-1 | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | null | null | null | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | null | R-GV-1 | R-GV-2 | null | R-GV-4 | R-GV-5 | null | null | null | null | R-IR-2 | R-IR-3 | R-IR-4 | R-SA-1 | null | NT-7
MT-1
MT-2
MT-7
MT-8
MT-9
MT-11
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | null | null | MT-7 | MT-8 | MT-9 | null | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Technology Development & Acquisition | Threat Modeling | TDA-06.2 | Mechanisms exist to perform threat modelling and other secure design techniques, to ensure that threats to software and solutions are identified and accounted for. | null | E-TDA-03
E-TDA-10
E-THR-05 | Does the organization perform threat modelling and other secure design techniques, to ensure that threats to software and solutions are identified and accounted for? | 7 | Identify | null | X | X | There is no evidence of a capability to perform threat modelling and other secure design techniques, to ensure that threats to software and solutions are identified and accounted for. | SP-CMM1 is N/A, since a structured process is required to perform threat modelling and other secure design techniques, to ensure that threats to software and solutions are identified and accounted for. | Technology Development & Acquisition (TDA) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Development and acquisition management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for technology development and acquisition management.
• IT/cybersecurity personnel implement secure practices to protect the confidentiality, integrity, availability and safety of the organization’s technology assets, data and network(s).
• Secure development practices mostly conform to industry-recognized standards for secure engineering (e.g., OWASP, NIST SP 800-218, NIST SP 800-160, etc.).
• Procurement practices require third-party developers of systems, system components or services to follow secure engineering practices.
• A Project Management Office (PMO), or project management function, enables the implementation of cybersecurity & data privacy-related resource planning controls across the System Development Lifecycle (SDLC) for all high-value projects. | Technology Development & Acquisition (TDA) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Secure development practices conform to industry-recognized standards for secure engineering (e.g., OWASP, NIST SP 800-218, NIST SP 800-160, etc.).
• A procurement team, or similar function, ensures that third party development and/ or acquisitions meet, or exceed, the organization's business, cybersecurity & data privacy requirements to have secure and resilient systems, applications, services and processes.
• A Software Assurance Maturity Model (SAMM) governs a secure development lifecycle for the development of systems, applications and services.
• Administrative processes exist and technologies are configured to implement secure configuration settings by default to reduce the likelihood of software being deployed with weak security settings, putting the asset at a greater risk of compromise.
• An IT Asset Management (ITAM) function, or similar function, categorizes devices according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data.
• A formal Change Management (CM) program help to ensure that no unauthorized changes are made, all changes are documented, services are not disrupted and resources are used efficiently.
• A Governance, Risk & Compliance (GRC) function, or similar function;
o Provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data for technology development and acquisition.
o Ensures the Information Assurance Program (IAP) evaluates applicable cybersecurity & data privacy controls as part of “business as usual” pre-production testing.
o Operates the Cybersecurity Supply Chain Risk Management (C-SCRM) program to identify and mitigate supply chain-related risks and threats.
• A Project Management Office (PMO), or project management function, enables IAP pre-production testing of cybersecurity & data privacy controls as part of the organization’s established project management processes. | See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to perform threat modelling and other secure design techniques, to ensure that threats to software and solutions are identified and accounted for. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to perform threat modelling and other secure design techniques, to ensure that threats to software and solutions are identified and accounted for. | null | null | null | 16.2
16.14 | null | 16.2 | 16.2
16.14 | null | null | null | SDV-06 | null | null | null | PM-06-08
RQ-15-02
RQ-15-03
RQ-15-04
RQ-15-05
RQ-15-06
RQ-15-07
RQ-15-08
RQ-15-09
RQ-15-10
RQ-15-11.a
RQ-15-11.b
RQ-15-11.c
RQ-15-12.a
RQ-15-12.b
RQ-15-12.c
RQ-15-12.d
RQ-15-12.e
RQ-15-13.a
RQ-15-13.b
RQ-15-13.c
RQ-15-13.d
RQ-15-14
RQ-15-15
RQ-15-16 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | PW.1.1 | null | null | null | null | null | null | SA-15(4)
SA-15(8) | null | null | null | null | null | null | null | null | null | null | SA-15(4)
SA-15(8) | null | null | null | SA-15(4) | SA-15(4)
SA-15(8) | null | null | null | null | null | PW.1
PW.1.1 | null | null | A04:2021
A08:2021 | null | null | null | null | null | null | null | null | null | null | null | G.3.2 | 7.4A | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 3.6.2(69) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 1238 | null | null | null | null | null | null | null | null | null | null | null | null | null | 14.4.6.C.01
14.4.6.C.02
14.4.6.C.03 | null | null | null | null | null | null | null | null | null | null | null | null | null | 3.1.6 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-GV-1
R-GV-2
R-GV-4
R-GV-5
R-IR-2
R-IR-3
R-IR-4
R-SA-1 | null | null | null | null | R-AM-1 | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | null | null | null | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | null | R-GV-1 | R-GV-2 | null | R-GV-4 | R-GV-5 | null | null | null | null | R-IR-2 | R-IR-3 | R-IR-4 | R-SA-1 | null | NT-7
MT-1
MT-2
MT-7
MT-8
MT-9
MT-11
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | null | null | MT-7 | MT-8 | MT-9 | null | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Technology Development & Acquisition | Software Assurance Maturity Model (SAMM) | TDA-06.3 | Mechanisms exist to utilize a Software Assurance Maturity Model (SAMM) to govern a secure development lifecycle for the development of systems, applications and services. | null | E-TDA-04
E-TDA-11 | Does the organization utilize a Software Assurance Maturity Model (SAMM) to govern a secure development lifecycle for the development of systems, applications and services? | 9 | Identify | null | X | null | There is no evidence of a capability to utilize a Software Assurance Maturity Model (SAMM) to govern a secure development lifecycle for the development of systems, applications and services. | SP-CMM1 is N/A, since a structured process is required to utilize a Software Assurance Maturity Model (SAMM) to govern a secure development lifecycle for the development of systems, applications and services. | SP-CMM2 is N/A, since a well-defined process is required to utilize a Software Assurance Maturity Model (SAMM) to govern a secure development lifecycle for the development of systems, applications and services. | Technology Development & Acquisition (TDA) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Secure development practices conform to industry-recognized standards for secure engineering (e.g., OWASP, NIST SP 800-218, NIST SP 800-160, etc.).
• A procurement team, or similar function, ensures that third party development and/ or acquisitions meet, or exceed, the organization's business, cybersecurity & data privacy requirements to have secure and resilient systems, applications, services and processes.
• A Software Assurance Maturity Model (SAMM) governs a secure development lifecycle for the development of systems, applications and services.
• Administrative processes exist and technologies are configured to implement secure configuration settings by default to reduce the likelihood of software being deployed with weak security settings, putting the asset at a greater risk of compromise.
• An IT Asset Management (ITAM) function, or similar function, categorizes devices according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data.
• A formal Change Management (CM) program help to ensure that no unauthorized changes are made, all changes are documented, services are not disrupted and resources are used efficiently.
• A Governance, Risk & Compliance (GRC) function, or similar function;
o Provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data for technology development and acquisition.
o Ensures the Information Assurance Program (IAP) evaluates applicable cybersecurity & data privacy controls as part of “business as usual” pre-production testing.
o Operates the Cybersecurity Supply Chain Risk Management (C-SCRM) program to identify and mitigate supply chain-related risks and threats.
• A Project Management Office (PMO), or project management function, enables IAP pre-production testing of cybersecurity & data privacy controls as part of the organization’s established project management processes. | See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to utilize a Software Assurance Maturity Model (SAMM) to govern a secure development lifecycle for the development of systems, applications and services. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to utilize a Software Assurance Maturity Model (SAMM) to govern a secure development lifecycle for the development of systems, applications and services. | null | null | null | 16.1
16.5
16.11 | null | 16.1
16.5
16.11 | 16.1
16.5
16.11 | null | null | null | SDV-03 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | TS-1.13 | null | null | null | PW.1
PW.1.1
PW.4.2
PW.4.3
PW.5
PW.5.1
PW.5.2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | PW.1
PW.1.1
PW.1.2
PW.1.3
PW.6
PW.6.1
PW.6.2
RV.1
RV.1.1
RV.1.2
RV.1.3 | null | null | A04:2021
A08:2021 | null | 6.2.2 | null | 6.2.2 | null | null | 6.2.2 | null | 6.2.2 | 6.2.2 | null | G.2.18 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 8.6.1 [MP.SW.1] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 6.1.1
6.1.2
6.2.1
6.2.2
6.3.1
6.3.2
6.4.1
6.4.2
6.4.3
6.4.4
6.4.5
6.4.6
6.4.7
6.4.8
6.5.1
6.5.2
6.5.3
7.6.1
7.6.2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | R-AM-3
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-GV-1
R-GV-4
R-GV-6
R-GV-7 | null | null | null | null | null | null | R-AM-3 | null | null | null | null | null | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | null | R-GV-1 | null | null | R-GV-4 | null | R-GV-6 | R-GV-7 | null | null | null | null | null | null | null | NT-7
MT-1
MT-2
MT-8
MT-9
MT-11
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | null | null | null | MT-8 | MT-9 | null | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Technology Development & Acquisition | Supporting Toolchain | TDA-06.4 | Automated mechanisms exist to improve the accuracy, consistency and comprehensiveness of secure practices throughout the asset's lifecycle. | null | null | Does the organization use automated mechanisms to improve the accuracy, consistency and comprehensiveness of secure practices throughout the asset's lifecycle? | 6 | Identify | null | X | X | There is no evidence of a capability to improve the accuracy, consistency and comprehensiveness of secure practices throughout the asset's lifecycle. | SP-CMM1 is N/A, since a structured process is required to improve the accuracy, consistency and comprehensiveness of secure practices throughout the asset's lifecycle. | SP-CMM2 is N/A, since a well-defined process is required to improve the accuracy, consistency and comprehensiveness of secure practices throughout the asset's lifecycle. | Technology Development & Acquisition (TDA) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Secure development practices conform to industry-recognized standards for secure engineering (e.g., OWASP, NIST SP 800-218, NIST SP 800-160, etc.).
• A procurement team, or similar function, ensures that third party development and/ or acquisitions meet, or exceed, the organization's business, cybersecurity & data privacy requirements to have secure and resilient systems, applications, services and processes.
• A Software Assurance Maturity Model (SAMM) governs a secure development lifecycle for the development of systems, applications and services.
• Administrative processes exist and technologies are configured to implement secure configuration settings by default to reduce the likelihood of software being deployed with weak security settings, putting the asset at a greater risk of compromise.
• An IT Asset Management (ITAM) function, or similar function, categorizes devices according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data.
• A formal Change Management (CM) program help to ensure that no unauthorized changes are made, all changes are documented, services are not disrupted and resources are used efficiently.
• A Governance, Risk & Compliance (GRC) function, or similar function;
o Provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data for technology development and acquisition.
o Ensures the Information Assurance Program (IAP) evaluates applicable cybersecurity & data privacy controls as part of “business as usual” pre-production testing.
o Operates the Cybersecurity Supply Chain Risk Management (C-SCRM) program to identify and mitigate supply chain-related risks and threats.
• A Project Management Office (PMO), or project management function, enables IAP pre-production testing of cybersecurity & data privacy controls as part of the organization’s established project management processes. | See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to improve the accuracy, consistency and comprehensiveness of secure practices throughout the asset's lifecycle. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to improve the accuracy, consistency and comprehensiveness of secure practices throughout the asset's lifecycle. | null | null | null | null | null | null | null | null | null | null | null | null | null | null | RC-05-15 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | PO.3
PO.3.1
PO.3.2
PO.3.3
PW.6
PW.6.1
PW.6.2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | PO.3
PO.3.1
PO.3.2
PO.3.3 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | J.3.2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | R-AM-3
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-GV-1
R-GV-4
R-GV-6
R-GV-7 | null | null | null | null | null | null | R-AM-3 | null | null | null | null | null | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | null | R-GV-1 | null | null | R-GV-4 | null | R-GV-6 | R-GV-7 | null | null | null | null | null | null | null | NT-7
MT-1
MT-2
MT-8
MT-9
MT-11
MT-12
MT-13
MT-14 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | null | null | null | MT-8 | MT-9 | null | MT-11 | MT-12 | MT-13 | MT-14 | null | null | null |
Technology Development & Acquisition | Software Design Review | TDA-06.5 | Mechanisms exist to have an independent review of the software design to confirm that all cybersecurity & data privacy requirements are met and that any identified risks are satisfactorily addressed. | null | E-TDA-05 | Does the organization have an independent review of the software design to confirm that all cybersecurity & data privacy requirements are met and that any identified risks are satisfactorily addressed? | 10 | Detect | null | X | X | There is no evidence of a capability to have an independent review of the software design to confirm that all cybersecurity & data privacy requirements are met and that any identified risks are satisfactorily addressed. | SP-CMM1 is N/A, since a structured process is required to have an independent review of the software design to confirm that all cybersecurity & data privacy requirements are met and that any identified risks are satisfactorily addressed. | SP-CMM2 is N/A, since a well-defined process is required to have an independent review of the software design to confirm that all cybersecurity & data privacy requirements are met and that any identified risks are satisfactorily addressed. | Technology Development & Acquisition (TDA) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Secure development practices conform to industry-recognized standards for secure engineering (e.g., OWASP, NIST SP 800-218, NIST SP 800-160, etc.).
• A procurement team, or similar function, ensures that third party development and/ or acquisitions meet, or exceed, the organization's business, cybersecurity & data privacy requirements to have secure and resilient systems, applications, services and processes.
• A Software Assurance Maturity Model (SAMM) governs a secure development lifecycle for the development of systems, applications and services.
• Administrative processes exist and technologies are configured to implement secure configuration settings by default to reduce the likelihood of software being deployed with weak security settings, putting the asset at a greater risk of compromise.
• An IT Asset Management (ITAM) function, or similar function, categorizes devices according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data.
• A formal Change Management (CM) program help to ensure that no unauthorized changes are made, all changes are documented, services are not disrupted and resources are used efficiently.
• A Governance, Risk & Compliance (GRC) function, or similar function;
o Provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data for technology development and acquisition.
o Ensures the Information Assurance Program (IAP) evaluates applicable cybersecurity & data privacy controls as part of “business as usual” pre-production testing.
o Operates the Cybersecurity Supply Chain Risk Management (C-SCRM) program to identify and mitigate supply chain-related risks and threats.
• A Project Management Office (PMO), or project management function, enables IAP pre-production testing of cybersecurity & data privacy controls as part of the organization’s established project management processes.
• An independent software engineer reviews the software design to confirm that it meets all of the security requirements and satisfactorily addresses any identified risks. | See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to have an independent review of the software design to confirm that all cybersecurity & data privacy requirements are met and that any identified risks are satisfactorily addressed. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to have an independent review of the software design to confirm that all cybersecurity & data privacy requirements are met and that any identified risks are satisfactorily addressed. | null | null | null | 16.2
16.7
16.12 | null | 16.2
16.7 | 16.2
16.7
16.12 | null | null | null | null | null | null | null | RQ-10-10.a
RQ-10-10.b
RQ-10-10.c
RQ-10-10.d
RQ-10-11
RQ-10-12
RQ-10-13
RQ-11-01.a
RQ-11-01.b
RQ-11-01.c
RQ-11-01.d
RQ-11-02 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | PW.2
PW.2.1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | PO.4
PO.4.1
PO.4.2
PW.1
PW.1.1
PW.1.2
PW.1.3
PW.2
PW.2.1
PW.7
PW.7.1
PW.7.2
PW.8
PW.8.1
PW.8.2
RV.1
RV.1.1
RV.1.2
RV.1.3 | null | null | null | null | 6.2.3 | null | null | null | null | null | null | 6.2.3 | 6.2.3 | null | I.2.5.3 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 3.6.2(69) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 8.6.2 [MP.SW.2] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 5.7.4
6.1.1
6.1.2
6.1.3
6.1.4
6.1.6
6.1.7 | null | null | null | null | null | null | null | null | 3.2.9 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | R-AM-3
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-GV-1
R-GV-4
R-GV-6
R-GV-7 | null | null | null | null | null | null | R-AM-3 | null | null | null | null | null | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | null | R-GV-1 | null | null | R-GV-4 | null | R-GV-6 | R-GV-7 | null | null | null | null | null | null | null | NT-7
MT-1
MT-2
MT-8
MT-9
MT-11
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | null | null | null | MT-8 | MT-9 | null | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Technology Development & Acquisition | Secure Development Environments | TDA-07 | Mechanisms exist to maintain a segmented development network to ensure a secure development environment. | null | null | Does the organization maintain a segmented development network to ensure a secure development environment? | 9 | Protect | X | X | X | There is no evidence of a capability to maintain a segmented development network to ensure a secure development environment. | Technology Development & Acquisition (TDA) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• IT personnel use an informal process to govern technology development and acquisition.
• Secure development practices loosely conform to industry-recognized standards for secure engineering (e.g., OWASP, NIST SP 800-218, NIST SP 800-160, etc.).
• IT personnel work with data/process owners to help ensure secure practices are implemented throughout the System Development Lifecycle (SDLC) for all high-value projects. | Technology Development & Acquisition (TDA) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Development and acquisition management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for technology development and acquisition management.
• IT/cybersecurity personnel implement secure practices to protect the confidentiality, integrity, availability and safety of the organization’s technology assets, data and network(s).
• Secure development practices mostly conform to industry-recognized standards for secure engineering (e.g., OWASP, NIST SP 800-218, NIST SP 800-160, etc.).
• Procurement practices require third-party developers of systems, system components or services to follow secure engineering practices.
• A Project Management Office (PMO), or project management function, enables the implementation of cybersecurity & data privacy-related resource planning controls across the System Development Lifecycle (SDLC) for all high-value projects.
• IT/cybersecurity architects manage separate development, testing and operational environments to reduce the risks of unauthorized access or changes to the operational environment and to ensure no impact to production systems. | Technology Development & Acquisition (TDA) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Secure development practices conform to industry-recognized standards for secure engineering (e.g., OWASP, NIST SP 800-218, NIST SP 800-160, etc.).
• A procurement team, or similar function, ensures that third party development and/ or acquisitions meet, or exceed, the organization's business, cybersecurity & data privacy requirements to have secure and resilient systems, applications, services and processes.
• A Software Assurance Maturity Model (SAMM) governs a secure development lifecycle for the development of systems, applications and services.
• Administrative processes exist and technologies are configured to implement secure configuration settings by default to reduce the likelihood of software being deployed with weak security settings, putting the asset at a greater risk of compromise.
• An IT Asset Management (ITAM) function, or similar function, categorizes devices according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data.
• A formal Change Management (CM) program help to ensure that no unauthorized changes are made, all changes are documented, services are not disrupted and resources are used efficiently.
• A Governance, Risk & Compliance (GRC) function, or similar function;
o Provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data for technology development and acquisition.
o Ensures the Information Assurance Program (IAP) evaluates applicable cybersecurity & data privacy controls as part of “business as usual” pre-production testing.
o Operates the Cybersecurity Supply Chain Risk Management (C-SCRM) program to identify and mitigate supply chain-related risks and threats.
• A Project Management Office (PMO), or project management function, enables IAP pre-production testing of cybersecurity & data privacy controls as part of the organization’s established project management processes.
• IT/cybersecurity architects manage separate development, testing and operational environments to reduce the risks of unauthorized access or changes to the operational environment and to ensure no impact to production systems. | Technology Development & Acquisition (TDA) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | Technology Development & Acquisition (TDA) efforts are “world-class” capabilities that leverage predictive analysis (e.g., machine learning, AI, etc.). In addition to CMM Level 4 criteria, CMM Level 5 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Stakeholders make time-sensitive decisions to support operational efficiency, which may include automated remediation actions.
▪ Based on predictive analysis, process improvements are implemented according to “continuous improvement” practices that affect process changes. | null | null | null | 16.8 | null | 16.8 | 16.8 | null | null | AIS-06
IVS-05 | null | null | null | null | RC-05-15 | null | null | null | 14.2.1
14.2.6 | 8.25
8.31 | 14.2.1
14.2.6 | null | 6.11.2.6 | null | null | null | null | TS-1.0
TS-2.5 | null | null | PR.DS-P7 | null | null | null | null | null | null | null | SA-3(1) | null | null | null | null | SA-3(1) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | PO.5
PO.5.1
PO.5.2 | null | null | null | null | 6.5.3 | null | null | null | null | null | null | 6.5.3 | 6.5.3 | null | D.21 | null | 5.2.2 | null | 7.3.5 | 7.3.5 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 3.6.2(69)
3.6.2(72) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | DEV-02
DEV-10 | null | null | null | 10.1 | null | null | null | null | null | null | null | null | null | null | null | 1-3-2-4 | TPC-73 | null | null | 1-4-1-4 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 1419
0400 | null | null | null | null | null | null | null | null | null | null | 14.2.1
14.2.1.13.PB
14.2.6 | null | null | 14.4.4.C.01 | null | null | null | null | 5.7.3 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | null | null | null | R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
R-SA-2 | R-AC-1 | R-AC-2 | R-AC-3 | R-AC-4 | R-AM-1 | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | R-EX-6 | R-EX-7 | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | R-GV-8 | R-IR-1 | R-IR-2 | R-IR-3 | R-IR-4 | R-SA-1 | R-SA-2 | NT-7
MT-1
MT-2
MT-7
MT-8
MT-9
MT-11
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | null | null | MT-7 | MT-8 | MT-9 | null | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Technology Development & Acquisition | Separation of Development, Testing and Operational Environments | TDA-08 | Mechanisms exist to manage separate development, testing and operational environments to reduce the risks of unauthorized access or changes to the operational environment and to ensure no impact to production systems. | null | null | Does the organization manage separate development, testing and operational environments to reduce the risks of unauthorized access or changes to the operational environment and to ensure no impact to production systems? | 10 | Protect | null | X | X | There is no evidence of a capability to manage separate development, testing and operational environments to reduce the risks of unauthorized access or changes to the operational environment and to ensure no impact to production systems. | Technology Development & Acquisition (TDA) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• IT personnel use an informal process to govern technology development and acquisition.
• Secure development practices loosely conform to industry-recognized standards for secure engineering (e.g., OWASP, NIST SP 800-218, NIST SP 800-160, etc.).
• IT personnel work with data/process owners to help ensure secure practices are implemented throughout the System Development Lifecycle (SDLC) for all high-value projects. | Technology Development & Acquisition (TDA) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Development and acquisition management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for technology development and acquisition management.
• IT/cybersecurity personnel implement secure practices to protect the confidentiality, integrity, availability and safety of the organization’s technology assets, data and network(s).
• Secure development practices mostly conform to industry-recognized standards for secure engineering (e.g., OWASP, NIST SP 800-218, NIST SP 800-160, etc.).
• Procurement practices require third-party developers of systems, system components or services to follow secure engineering practices.
• A Project Management Office (PMO), or project management function, enables the implementation of cybersecurity & data privacy-related resource planning controls across the System Development Lifecycle (SDLC) for all high-value projects.
• IT/cybersecurity architects manage separate development, testing and operational environments to reduce the risks of unauthorized access or changes to the operational environment and to ensure no impact to production systems. | Technology Development & Acquisition (TDA) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Secure development practices conform to industry-recognized standards for secure engineering (e.g., OWASP, NIST SP 800-218, NIST SP 800-160, etc.).
• A procurement team, or similar function, ensures that third party development and/ or acquisitions meet, or exceed, the organization's business, cybersecurity & data privacy requirements to have secure and resilient systems, applications, services and processes.
• A Software Assurance Maturity Model (SAMM) governs a secure development lifecycle for the development of systems, applications and services.
• Administrative processes exist and technologies are configured to implement secure configuration settings by default to reduce the likelihood of software being deployed with weak security settings, putting the asset at a greater risk of compromise.
• An IT Asset Management (ITAM) function, or similar function, categorizes devices according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data.
• A formal Change Management (CM) program help to ensure that no unauthorized changes are made, all changes are documented, services are not disrupted and resources are used efficiently.
• A Governance, Risk & Compliance (GRC) function, or similar function;
o Provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data for technology development and acquisition.
o Ensures the Information Assurance Program (IAP) evaluates applicable cybersecurity & data privacy controls as part of “business as usual” pre-production testing.
o Operates the Cybersecurity Supply Chain Risk Management (C-SCRM) program to identify and mitigate supply chain-related risks and threats.
• A Project Management Office (PMO), or project management function, enables IAP pre-production testing of cybersecurity & data privacy controls as part of the organization’s established project management processes.
• IT/cybersecurity architects manage separate development, testing and operational environments to reduce the risks of unauthorized access or changes to the operational environment and to ensure no impact to production systems. | See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to manage separate development, testing and operational environments to reduce the risks of unauthorized access or changes to the operational environment and to ensure no impact to production systems. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to manage separate development, testing and operational environments to reduce the risks of unauthorized access or changes to the operational environment and to ensure no impact to production systems. | null | null | null | 16.8 | null | 16.8 | 16.8 | null | null | AIS-06
IVS-05 | null | null | null | null | RC-05-15 | null | null | null | 12.1.4 | 8.25
8.31 | 12.1.4 | null | 6.9.1.4 | null | null | null | null | TS-1.0
TS-2.5 | null | null | PR.DS-P7 | null | null | null | CM-4(1) | null | null | CM-4(1) | CM-4(1) | null | null | null | CM-4(1) | null | null | null | null | CM-4(1) | null | CM-4(1) | null | null | null | null | CM-4(1) | 3.4.5 | null | null | null | null | PO.5
PO.5.1
PO.5.2 | PR.DS-7 | null | null | 6.4.1 | 6.5.3
6.5.6 | null | null | null | null | null | null | 6.5.3
6.5.6 | 6.5.3
6.5.6 | null | I.1.1 | null | 5.2.2 | null | null | null | null | null | null | null | null | CM.L2-3.4.5 | null | null | CM.L2-3.4.5 | CM.L2-3.4.5 | CM-4(1) | null | null | null | null | null | null | null | CM-4(1) | null | null | CM-4(1) | null | CM-4(1) | null | null | CM-4(1) | null | null | D3.PC.Am.B.10 | null | null | null | null | 6.S.A | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 3.6.2(69)
3.6.2(72) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | DEV-10 | null | null | null | 10.1 | null | null | null | null | null | null | null | null | null | null | null | 1-3-2-4 | TPC-73 | null | 2-5-3-2 | 1-4-1-4 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0400 | null | null | null | null | null | null | null | null | null | null | 12.1.4 | null | null | null | null | null | null | null | 5.7.3 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | null | null | x | R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
R-SA-2 | R-AC-1 | R-AC-2 | R-AC-3 | R-AC-4 | R-AM-1 | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | R-EX-6 | R-EX-7 | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | R-GV-8 | R-IR-1 | R-IR-2 | R-IR-3 | R-IR-4 | R-SA-1 | R-SA-2 | NT-1
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-11
MT-12
MT-13
MT-14
MT-15
MT-16 | NT-1 | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | NT-9 | NT-10 | NT-11 | NT-12 | NT-13 | NT-14 | MT-1 | MT-2 | MT-3 | MT-4 | MT-5 | MT-6 | MT-7 | MT-8 | MT-9 | null | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | MT-16 | null |
Technology Development & Acquisition | Secure Migration Practices | TDA-08.1 | Mechanisms exist to ensure secure migration practices purge systems, applications and services of test/development/staging data and accounts before it is migrated into a production environment. | null | null | Does the organization ensure secure migration practices purge systems, applications and services of test/development/staging data and accounts before it is migrated into a production environment? | 8 | Protect | null | X | X | There is no evidence of a capability to ensure secure migration practices purge systems, applications and services of test/development/staging data and accounts before it is migrated into a production environment. | SP-CMM1 is N/A, since a structured process is required to ensure secure migration practices purge systems, applications and services of test/development/staging data and accounts before it is migrated into a production environment. | Technology Development & Acquisition (TDA) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Development and acquisition management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for technology development and acquisition management.
• IT/cybersecurity personnel implement secure practices to protect the confidentiality, integrity, availability and safety of the organization’s technology assets, data and network(s).
• Secure development practices mostly conform to industry-recognized standards for secure engineering (e.g., OWASP, NIST SP 800-218, NIST SP 800-160, etc.).
• Procurement practices require third-party developers of systems, system components or services to follow secure engineering practices.
• A Project Management Office (PMO), or project management function, enables the implementation of cybersecurity & data privacy-related resource planning controls across the System Development Lifecycle (SDLC) for all high-value projects. | Technology Development & Acquisition (TDA) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Secure development practices conform to industry-recognized standards for secure engineering (e.g., OWASP, NIST SP 800-218, NIST SP 800-160, etc.).
• A procurement team, or similar function, ensures that third party development and/ or acquisitions meet, or exceed, the organization's business, cybersecurity & data privacy requirements to have secure and resilient systems, applications, services and processes.
• A Software Assurance Maturity Model (SAMM) governs a secure development lifecycle for the development of systems, applications and services.
• Administrative processes exist and technologies are configured to implement secure configuration settings by default to reduce the likelihood of software being deployed with weak security settings, putting the asset at a greater risk of compromise.
• An IT Asset Management (ITAM) function, or similar function, categorizes devices according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data.
• A formal Change Management (CM) program help to ensure that no unauthorized changes are made, all changes are documented, services are not disrupted and resources are used efficiently.
• A Governance, Risk & Compliance (GRC) function, or similar function;
o Provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data for technology development and acquisition.
o Ensures the Information Assurance Program (IAP) evaluates applicable cybersecurity & data privacy controls as part of “business as usual” pre-production testing.
o Operates the Cybersecurity Supply Chain Risk Management (C-SCRM) program to identify and mitigate supply chain-related risks and threats.
• A Project Management Office (PMO), or project management function, enables IAP pre-production testing of cybersecurity & data privacy controls as part of the organization’s established project management processes. | See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to ensure secure migration practices purge systems, applications and services of test/development/staging data and accounts before it is migrated into a production environment. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to ensure secure migration practices purge systems, applications and services of test/development/staging data and accounts before it is migrated into a production environment. | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 6.5.6 | null | null | null | null | null | null | 6.5.6 | 6.5.6 | null | I.1.5.2
I.1.5.3 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 1-3-2-4 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1 | R-AC-1 | R-AC-2 | R-AC-3 | R-AC-4 | R-AM-1 | R-AM-2 | null | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | R-EX-6 | R-EX-7 | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | null | R-IR-1 | R-IR-2 | R-IR-3 | R-IR-4 | R-SA-1 | null | MT-8
MT-9
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | MT-8 | MT-9 | null | null | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Technology Development & Acquisition | Cybersecurity & Data Privacy Testing Throughout Development | TDA-09 | Mechanisms exist to require system developers/integrators consult with cybersecurity & data privacy personnel to:
▪ Create and implement a Security Test and Evaluation (ST&E) plan;
▪ Implement a verifiable flaw remediation process to correct weaknesses and deficiencies identified during the security testing and evaluation process; and
▪ Document the results of the security testing/evaluation and flaw remediation processes. | - Security Test & Evaluation (ST&E) | E-TDA-03
E-TDA-05 | Does the organization require system developers/integrators consult with cybersecurity & data privacy personnel to:
▪ Create and implement a Security Test and Evaluation (ST&E) plan;
▪ Implement a verifiable flaw remediation process to correct weaknesses and deficiencies identified during the security testing and evaluation process; and
▪ Document the results of the security testing/evaluation and flaw remediation processes? | 9 | Protect | X | X | X | There is no evidence of a capability to require system developers/integrators consult with cybersecurity & data privacy personnel to:
▪ Create and implement a Security Test and Evaluation (ST&E) plan;
▪ Implement a verifiable flaw remediation process to correct weaknesses and deficiencies identified during the security testing and evaluation process; and
▪ Document the results of the security testing/evaluation and flaw remediation processes. | Technology Development & Acquisition (TDA) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• IT personnel use an informal process to govern technology development and acquisition.
• Secure development practices loosely conform to industry-recognized standards for secure engineering (e.g., OWASP, NIST SP 800-218, NIST SP 800-160, etc.).
• IT personnel work with data/process owners to help ensure secure practices are implemented throughout the System Development Lifecycle (SDLC) for all high-value projects. | Technology Development & Acquisition (TDA) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Development and acquisition management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for technology development and acquisition management.
• IT/cybersecurity personnel implement secure practices to protect the confidentiality, integrity, availability and safety of the organization’s technology assets, data and network(s).
• Secure development practices mostly conform to industry-recognized standards for secure engineering (e.g., OWASP, NIST SP 800-218, NIST SP 800-160, etc.).
• Procurement practices require third-party developers of systems, system components or services to follow secure engineering practices.
• A Project Management Office (PMO), or project management function, enables the implementation of cybersecurity & data privacy-related resource planning controls across the System Development Lifecycle (SDLC) for all high-value projects. | Technology Development & Acquisition (TDA) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Secure development practices conform to industry-recognized standards for secure engineering (e.g., OWASP, NIST SP 800-218, NIST SP 800-160, etc.).
• A procurement team, or similar function, ensures that third party development and/ or acquisitions meet, or exceed, the organization's business, cybersecurity & data privacy requirements to have secure and resilient systems, applications, services and processes.
• A Software Assurance Maturity Model (SAMM) governs a secure development lifecycle for the development of systems, applications and services.
• Administrative processes exist and technologies are configured to implement secure configuration settings by default to reduce the likelihood of software being deployed with weak security settings, putting the asset at a greater risk of compromise.
• An IT Asset Management (ITAM) function, or similar function, categorizes devices according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data.
• A formal Change Management (CM) program help to ensure that no unauthorized changes are made, all changes are documented, services are not disrupted and resources are used efficiently.
• A Governance, Risk & Compliance (GRC) function, or similar function;
o Provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data for technology development and acquisition.
o Ensures the Information Assurance Program (IAP) evaluates applicable cybersecurity & data privacy controls as part of “business as usual” pre-production testing.
o Operates the Cybersecurity Supply Chain Risk Management (C-SCRM) program to identify and mitigate supply chain-related risks and threats.
• A Project Management Office (PMO), or project management function, enables IAP pre-production testing of cybersecurity & data privacy controls as part of the organization’s established project management processes. | Technology Development & Acquisition (TDA) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to require system developers/integrators consult with cybersecurity & data privacy personnel to:
▪ Create and implement a Security Test and Evaluation (ST&E) plan;
▪ Implement a verifiable flaw remediation process to correct weaknesses and deficiencies identified during the security testing and evaluation process; and
▪ Document the results of the security testing/evaluation and flaw remediation processes. | null | null | null | 16.2
16.3
16.12 | null | 16.2
16.3 | 16.2
16.3
16.12 | null | null | AIS-05
TVM-03 | SDV-07
SET-04
SET-05
SET-06 | null | null | null | RQ-10-10.a
RQ-10-10.b
RQ-10-10.c
RQ-10-10.d
RQ-10-11
RQ-10-12
RQ-10-13
RQ-11-01.a
RQ-11-01.b
RQ-11-01.c
RQ-11-01.d
RQ-11-02 | null | null | null | 14.2.7
14.2.8
14.2.9 | 8.25
8.29
8.30 | 14.2.7
14.2.8
14.2.9 | null | 6.11.2.7
6.11.2.8 | null | null | null | T1078, T1078.001, T1078.003, T1078.004, T1134.005, T1195.003, T1213.003, T1495, T1505, T1505.001, T1505.002, T1505.004, T1528, T1542, T1542.001, T1542.003, T1542.004, T1542.005, T1547.011, T1552, T1552.001, T1552.002, T1552.004, T1552.006, T1553, T1553.006, T1558.004, T1574.002, T1601, T1601.001, T1601.002, T1612 | TS-1.12 | Sec 4(D)(2)(e) | null | CT.DM-P9
CT.DM-P10 | PO.4
PO.4.1
PO.4.2
PW.3
PW.3.1
PW.3.2
PW.5.2
RV.1
RV.1.1
RV.1.2
RV.1.3 | null | null | SA-11 | null | SA-11 | SA-11 | SA-11
SA-11(5)
SA-11(6)
SA-11(7) | SA-11 | null | SA-11 | SA-11 | SA-11(5)
SA-11(6)
SA-11(7) | null | null | SA-11 | SA-11 | null | SA-11 | null | null | SA-11 | SA-11 | SA-11 | NFO - SA-11 | null | null | null | null | PO.4
PO.4.1
PO.4.2
PW.7
PW.7.1
PW.7.2
PW.8
PW.8.1
PW.8.2
RV.1
RV.1.1
RV.1.2
RV.1.3
RV.3
RV.3.1
RV.3.2
RV.3.3
RV.3.4 | null | null | A01:2021
A02:2021
A03:2021
A04:2021
A05:2021
A06:2021
A07:2021
A08:2021
A09:2021
A10:2021 | 6.4
6.4.4 | 6.2.3
6.2.3.1
6.2.4
6.5.6 | null | 6.2.4 | null | null | 6.2.3.1
6.2.4 | null | 6.2.3
6.2.3.1
6.2.4
6.5.6 | 6.2.3
6.2.3.1
6.2.4
6.5.6 | null | I.2.5.13
I.2.5.14 | null | 5.3.1 | 5.1
6.10
12.1
12.2
12.3
12.4
13.1
13.2
15.1
15.2
15.3
15.4
15.5
15.6
15.7
15.8
15.9
15.10
15.11 | null | null | RISK-2.J.MIL3
ARCHITECTURE-4.H.MIL3 | EXD:SG3.SP4
RTSE:SG1.SP4
RTSE:SG1.SP5
VAR:SG2.SP2
VAR:SG2.SP3
VAR:SG3.SP1
VAR:SG4.SP1 | null | null | null | null | null | null | null | null | SA-11 | null | null | null | null | null | null | null | SA-11 | null | SA-11 | SA-11 | null | SA-11 | null | SA-11 | SA-11 | null | null | null | null | null | null | null | null | null | null | SA-11
SA-11(5)
SA-11(6) | null | null | 8-302 | null | null | null | null | null | null | null | SA-11 | SA-11 | null | null | null | null | null | null | null | null | null | 17.03(2)(d)(B)(i) | null | null | null | null | 38-99-20(D)(2)(e) | null | null | SA-11 | null | SA-11 | null | null | null | 3.6.2(69)
3.6.2(70)
3.6.2(71) | null | null | null | null | null | null | null | null | null | null | null | null | null | 7.7
7.8
7.9
7.10
7.11
7.12
7.13
7.14 | DEV-02 | null | null | null | 11.9
17.3
17.4
17.12
17.15 | null | null | null | null | null | null | null | null | null | null | null | 1-3-1-1
1-3-2-1 | TPC-72 | null | 1-5-3-2
1-5-3-4
1-6-3-3 | 1-4-1-2 | null | null | null | null | 8.6.2 [MP.SW.2] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0402
1754 | null | null | null | null | null | null | null | null | null | null | 14.2.7
14.2.8
14.2.9 | null | null | null | null | null | null | null | 5.7.1
5.7.2
5.7.3
5.7.4
5.7.5
5.7.6
6.1.1
6.1.2
6.1.3
6.1.4
6.1.6
6.1.7 | null | null | null | null | null | null | null | 4.8
4.9 | 3.2.9 | null | null | null | null | null | null | null | null | null | null | x | NAIC
MA 201 CMR 17 | x | x | R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-IR-4
R-SA-1 | R-AC-1 | R-AC-2 | R-AC-3 | R-AC-4 | R-AM-1 | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | R-EX-6 | R-EX-7 | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | null | null | null | null | R-IR-4 | R-SA-1 | null | NT-7
MT-1
MT-2
MT-7
MT-8
MT-9
MT-11
MT-12
MT-13
MT-14
MT-15
MT-16 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | null | null | MT-7 | MT-8 | MT-9 | null | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | MT-16 | null |
Technology Development & Acquisition | Continuous Monitoring Plan | TDA-09.1 | Mechanisms exist to require the developers of systems, system components or services to produce a plan for the continuous monitoring of cybersecurity & data privacy control effectiveness. | null | E-TDA-03 | Does the organization require the developers of systems, system components or services to produce a plan for the continuous monitoring of cybersecurity & data privacy control effectiveness? | 9 | Detect | null | X | X | There is no evidence of a capability to require the developers of systems, system components or services to produce a plan for the continuous monitoring of cybersecurity & data privacy control effectiveness. | Technology Development & Acquisition (TDA) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• IT personnel use an informal process to govern technology development and acquisition.
• Secure development practices loosely conform to industry-recognized standards for secure engineering (e.g., OWASP, NIST SP 800-218, NIST SP 800-160, etc.).
• IT personnel work with data/process owners to help ensure secure practices are implemented throughout the System Development Lifecycle (SDLC) for all high-value projects. | Technology Development & Acquisition (TDA) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Development and acquisition management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for technology development and acquisition management.
• IT/cybersecurity personnel implement secure practices to protect the confidentiality, integrity, availability and safety of the organization’s technology assets, data and network(s).
• Secure development practices mostly conform to industry-recognized standards for secure engineering (e.g., OWASP, NIST SP 800-218, NIST SP 800-160, etc.).
• Procurement practices require third-party developers of systems, system components or services to follow secure engineering practices.
• A Project Management Office (PMO), or project management function, enables the implementation of cybersecurity & data privacy-related resource planning controls across the System Development Lifecycle (SDLC) for all high-value projects. | Technology Development & Acquisition (TDA) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Secure development practices conform to industry-recognized standards for secure engineering (e.g., OWASP, NIST SP 800-218, NIST SP 800-160, etc.).
• A procurement team, or similar function, ensures that third party development and/ or acquisitions meet, or exceed, the organization's business, cybersecurity & data privacy requirements to have secure and resilient systems, applications, services and processes.
• A Software Assurance Maturity Model (SAMM) governs a secure development lifecycle for the development of systems, applications and services.
• Administrative processes exist and technologies are configured to implement secure configuration settings by default to reduce the likelihood of software being deployed with weak security settings, putting the asset at a greater risk of compromise.
• An IT Asset Management (ITAM) function, or similar function, categorizes devices according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data.
• A formal Change Management (CM) program help to ensure that no unauthorized changes are made, all changes are documented, services are not disrupted and resources are used efficiently.
• A Governance, Risk & Compliance (GRC) function, or similar function;
o Provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data for technology development and acquisition.
o Ensures the Information Assurance Program (IAP) evaluates applicable cybersecurity & data privacy controls as part of “business as usual” pre-production testing.
o Operates the Cybersecurity Supply Chain Risk Management (C-SCRM) program to identify and mitigate supply chain-related risks and threats.
• A Project Management Office (PMO), or project management function, enables IAP pre-production testing of cybersecurity & data privacy controls as part of the organization’s established project management processes. | Technology Development & Acquisition (TDA) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to require the developers of systems, system components or services to produce a plan for the continuous monitoring of cybersecurity & data privacy control effectiveness. | null | null | null | 16.2 | null | 16.2 | 16.2 | null | null | null | SDV-07
SET-05 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | SA-4(8) | null | null | null | SA-4(8) | null | null | null | null | SA-4(8) | null | null | null | null | null | SA-4(8) | null | null | null | SA-4(8) | SA-4(8) | null | null | null | null | null | PW.2
PW.2.1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | I.2.3.1 | null | null | 4.1
5.1
6.1
6.2
6.3
6.4
6.5
6.6
6.7
6.8
6.9 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | SA-4(8) | null | SA-4(8) | SA-4(8) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | SA-4(8) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | SA-4(8) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 17.3
17.4
17.12 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 6.1.4 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | null | x | x | R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-IR-4
R-SA-1 | R-AC-1 | R-AC-2 | R-AC-3 | R-AC-4 | R-AM-1 | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | R-EX-6 | R-EX-7 | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | null | null | null | null | R-IR-4 | R-SA-1 | null | NT-1
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-11
MT-12
MT-13
MT-14
MT-15 | NT-1 | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | NT-9 | NT-10 | NT-11 | NT-12 | NT-13 | NT-14 | MT-1 | MT-2 | MT-3 | MT-4 | MT-5 | MT-6 | MT-7 | MT-8 | MT-9 | null | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Technology Development & Acquisition | Static Code Analysis | TDA-09.2 | Mechanisms exist to require the developers of systems, system components or services to employ static code analysis tools to identify and remediate common flaws and document the results of the analysis. | null | E-TDA-03 | Does the organization require the developers of systems, system components or services to employ static code analysis tools to identify and remediate common flaws and document the results of the analysis? | 9 | Detect | null | X | null | There is no evidence of a capability to require the developers of systems, system components or services to employ static code analysis tools to identify and remediate common flaws and document the results of the analysis. | SP-CMM1 is N/A, since a structured process is required to require the developers of systems, system components or services to employ static code analysis tools to identify and remediate common flaws and document the results of the analysis. | Technology Development & Acquisition (TDA) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Development and acquisition management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for technology development and acquisition management.
• IT/cybersecurity personnel implement secure practices to protect the confidentiality, integrity, availability and safety of the organization’s technology assets, data and network(s).
• Secure development practices mostly conform to industry-recognized standards for secure engineering (e.g., OWASP, NIST SP 800-218, NIST SP 800-160, etc.).
• Procurement practices require third-party developers of systems, system components or services to follow secure engineering practices.
• A Project Management Office (PMO), or project management function, enables the implementation of cybersecurity & data privacy-related resource planning controls across the System Development Lifecycle (SDLC) for all high-value projects.
• Developers of systems, system components or services are required to employ static code analysis tools to identify and remediate common flaws, documenting the results of the analysis before the application is cleared for production usage. | Technology Development & Acquisition (TDA) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Secure development practices conform to industry-recognized standards for secure engineering (e.g., OWASP, NIST SP 800-218, NIST SP 800-160, etc.).
• A procurement team, or similar function, ensures that third party development and/ or acquisitions meet, or exceed, the organization's business, cybersecurity & data privacy requirements to have secure and resilient systems, applications, services and processes.
• A Software Assurance Maturity Model (SAMM) governs a secure development lifecycle for the development of systems, applications and services.
• Administrative processes exist and technologies are configured to implement secure configuration settings by default to reduce the likelihood of software being deployed with weak security settings, putting the asset at a greater risk of compromise.
• An IT Asset Management (ITAM) function, or similar function, categorizes devices according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data.
• A formal Change Management (CM) program help to ensure that no unauthorized changes are made, all changes are documented, services are not disrupted and resources are used efficiently.
• A Governance, Risk & Compliance (GRC) function, or similar function;
o Provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data for technology development and acquisition.
o Ensures the Information Assurance Program (IAP) evaluates applicable cybersecurity & data privacy controls as part of “business as usual” pre-production testing.
o Operates the Cybersecurity Supply Chain Risk Management (C-SCRM) program to identify and mitigate supply chain-related risks and threats.
• A Project Management Office (PMO), or project management function, enables IAP pre-production testing of cybersecurity & data privacy controls as part of the organization’s established project management processes.
• Developers of systems, system components or services are required to employ static code analysis tools to identify and remediate common flaws, documenting the results of the analysis before the application is cleared for production usage. | Technology Development & Acquisition (TDA) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to require the developers of systems, system components or services to employ static code analysis tools to identify and remediate common flaws and document the results of the analysis. | null | null | null | 16.12 | null | null | 16.12 | null | null | null | SDV-04
SDV-07
SET-04
SET-06 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | PW.5.2
PW.7
PW.7.1
PW.7.2
PW.8
PW.8.1
PW.8.2 | null | null | SA-11(1) | null | null | null | SA-11(1) | null | null | null | null | SA-11(1) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | PW.2
PW.2.1
PW.8
PW.8.1
PW.8.2 | null | null | A01:2021
A02:2021
A03:2021
A04:2021
A05:2021
A06:2021
A07:2021
A08:2021
A09:2021
A10:2021 | 6.3
6.3.1
6.3.2 | 6.2.4 | null | 6.2.4 | null | null | 6.2.4 | null | 6.2.4 | 6.2.4 | null | I.2.13.1 | null | null | 5.1
6.10
13.1
13.2
17.1
17.2
18.1
18.2
19.1
19.2 | null | null | ARCHITECTURE-4.H.MIL3 | null | null | null | null | null | null | null | null | null | SA-11(1) | null | null | null | null | null | null | null | SA-11(1) | null | SA-11(1) | SA-11(1) | null | SA-11(1) | null | SA-11(1) | SA-11(1) | null | null | null | null | null | null | null | null | null | null | SA-11(1) | null | null | null | null | null | null | null | null | null | null | null | SA-11(1) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | SA-11(1) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | PSS-02 | null | null | null | 17.3
17.14 | null | null | null | null | null | null | null | null | null | null | null | 1-3-2-1 | TPC-72 | null | 1-6-3-3 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0402 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 6.1.6 | null | null | null | null | null | null | null | null | 3.2.9 | null | null | null | null | null | null | null | null | null | null | x | null | x | x | R-AC-3
R-AC-4
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-4
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-IR-4
R-SA-1 | null | null | R-AC-3 | R-AC-4 | null | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | null | R-BC-4 | null | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | R-EX-6 | R-EX-7 | R-GV-1 | R-GV-2 | null | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | null | null | null | null | R-IR-4 | R-SA-1 | null | NT-7
MT-1
MT-2
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | null | null | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Technology Development & Acquisition | Dynamic Code Analysis | TDA-09.3 | Mechanisms exist to require the developers of systems, system components or services to employ dynamic code analysis tools to identify and remediate common flaws and document the results of the analysis. | null | E-TDA-03 | Does the organization require the developers of systems, system components or services to employ dynamic code analysis tools to identify and remediate common flaws and document the results of the analysis? | 9 | Detect | null | X | null | There is no evidence of a capability to require the developers of systems, system components or services to employ dynamic code analysis tools to identify and remediate common flaws and document the results of the analysis. | SP-CMM1 is N/A, since a structured process is required to require the developers of systems, system components or services to employ dynamic code analysis tools to identify and remediate common flaws and document the results of the analysis. | Technology Development & Acquisition (TDA) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Development and acquisition management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for technology development and acquisition management.
• IT/cybersecurity personnel implement secure practices to protect the confidentiality, integrity, availability and safety of the organization’s technology assets, data and network(s).
• Secure development practices mostly conform to industry-recognized standards for secure engineering (e.g., OWASP, NIST SP 800-218, NIST SP 800-160, etc.).
• Procurement practices require third-party developers of systems, system components or services to follow secure engineering practices.
• A Project Management Office (PMO), or project management function, enables the implementation of cybersecurity & data privacy-related resource planning controls across the System Development Lifecycle (SDLC) for all high-value projects.
• Developers of systems, system components or services are to employ dynamic code analysis tools to identify and remediate common flaws, documenting the results of the analysis before the application is cleared for production usage. | Technology Development & Acquisition (TDA) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Secure development practices conform to industry-recognized standards for secure engineering (e.g., OWASP, NIST SP 800-218, NIST SP 800-160, etc.).
• A procurement team, or similar function, ensures that third party development and/ or acquisitions meet, or exceed, the organization's business, cybersecurity & data privacy requirements to have secure and resilient systems, applications, services and processes.
• A Software Assurance Maturity Model (SAMM) governs a secure development lifecycle for the development of systems, applications and services.
• Administrative processes exist and technologies are configured to implement secure configuration settings by default to reduce the likelihood of software being deployed with weak security settings, putting the asset at a greater risk of compromise.
• An IT Asset Management (ITAM) function, or similar function, categorizes devices according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data.
• A formal Change Management (CM) program help to ensure that no unauthorized changes are made, all changes are documented, services are not disrupted and resources are used efficiently.
• A Governance, Risk & Compliance (GRC) function, or similar function;
o Provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data for technology development and acquisition.
o Ensures the Information Assurance Program (IAP) evaluates applicable cybersecurity & data privacy controls as part of “business as usual” pre-production testing.
o Operates the Cybersecurity Supply Chain Risk Management (C-SCRM) program to identify and mitigate supply chain-related risks and threats.
• A Project Management Office (PMO), or project management function, enables IAP pre-production testing of cybersecurity & data privacy controls as part of the organization’s established project management processes.
• Developers of systems, system components or services are to employ dynamic code analysis tools to identify and remediate common flaws, documenting the results of the analysis before the application is cleared for production usage. | Technology Development & Acquisition (TDA) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to require the developers of systems, system components or services to employ dynamic code analysis tools to identify and remediate common flaws and document the results of the analysis. | null | null | null | 16.12 | null | null | 16.12 | null | null | null | SDV-04
SDV-07
SET-04
SET-06 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | PW.5.2
PW.7
PW.7.1
PW.7.2
PW.8
PW.8.1
PW.8.2 | null | null | SA-11(8) | null | null | null | SA-11(8) | null | null | null | null | SA-11(8) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | PW.2
PW.2.1
PW.8
PW.8.1
PW.8.2 | null | null | A01:2021
A02:2021
A03:2021
A04:2021
A05:2021
A06:2021
A07:2021
A08:2021
A09:2021
A10:2021 | null | 6.2.4 | null | 6.2.4 | null | null | 6.2.4 | null | 6.2.4 | 6.2.4 | null | I.2.11.8 | null | null | 5.1
6.10
13.1
13.2
17.1
17.2 | null | null | ARCHITECTURE-4.H.MIL3 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | SA-11(8) | null | SA-11(8) | SA-11(8) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | SA-11(8) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | SA-11(8) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | PSS-02 | null | null | null | 17.3
17.19 | null | null | null | null | null | null | null | null | null | null | null | 1-3-2-1 | TPC-72 | null | 1-6-3-3 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0402 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 6.1.6 | null | null | null | null | null | null | null | null | 3.2.9 | null | null | null | null | null | null | null | null | null | null | x | null | x | x | R-AC-3
R-AC-4
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-4
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-IR-4
R-SA-1 | null | null | R-AC-3 | R-AC-4 | null | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | null | R-BC-4 | null | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | R-EX-6 | R-EX-7 | R-GV-1 | R-GV-2 | null | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | null | null | null | null | R-IR-4 | R-SA-1 | null | NT-7
MT-1
MT-2
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | null | null | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Technology Development & Acquisition | Malformed Input Testing | TDA-09.4 | Mechanisms exist to utilize testing methods to ensure systems, services and products continue to operate as intended when subject to invalid or unexpected inputs on its interfaces. | - CimTrak Integrity Suite (https://www.cimcor.com/cimtrak/)
- NNT Change Tracker (https://www.newnettechnologies.com) | E-TDA-03 | Does the organization utilize testing methods to ensure systems, services and products continue to operate as intended when subject to invalid or unexpected inputs on its interfaces? | 7 | Detect | null | X | null | There is no evidence of a capability to utilize testing methods to ensure systems, services and products continue to operate as intended when subject to invalid or unexpected inputs on its interfaces. | SP-CMM1 is N/A, since a structured process is required to utilize testing methods to ensure systems, services and products continue to operate as intended when subject to invalid or unexpected inputs on its interfaces. | Technology Development & Acquisition (TDA) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Development and acquisition management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for technology development and acquisition management.
• IT/cybersecurity personnel implement secure practices to protect the confidentiality, integrity, availability and safety of the organization’s technology assets, data and network(s).
• Secure development practices mostly conform to industry-recognized standards for secure engineering (e.g., OWASP, NIST SP 800-218, NIST SP 800-160, etc.).
• Procurement practices require third-party developers of systems, system components or services to follow secure engineering practices.
• A Project Management Office (PMO), or project management function, enables the implementation of cybersecurity & data privacy-related resource planning controls across the System Development Lifecycle (SDLC) for all high-value projects. | Technology Development & Acquisition (TDA) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Secure development practices conform to industry-recognized standards for secure engineering (e.g., OWASP, NIST SP 800-218, NIST SP 800-160, etc.).
• A procurement team, or similar function, ensures that third party development and/ or acquisitions meet, or exceed, the organization's business, cybersecurity & data privacy requirements to have secure and resilient systems, applications, services and processes.
• A Software Assurance Maturity Model (SAMM) governs a secure development lifecycle for the development of systems, applications and services.
• Administrative processes exist and technologies are configured to implement secure configuration settings by default to reduce the likelihood of software being deployed with weak security settings, putting the asset at a greater risk of compromise.
• An IT Asset Management (ITAM) function, or similar function, categorizes devices according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data.
• A formal Change Management (CM) program help to ensure that no unauthorized changes are made, all changes are documented, services are not disrupted and resources are used efficiently.
• A Governance, Risk & Compliance (GRC) function, or similar function;
o Provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data for technology development and acquisition.
o Ensures the Information Assurance Program (IAP) evaluates applicable cybersecurity & data privacy controls as part of “business as usual” pre-production testing.
o Operates the Cybersecurity Supply Chain Risk Management (C-SCRM) program to identify and mitigate supply chain-related risks and threats.
• A Project Management Office (PMO), or project management function, enables IAP pre-production testing of cybersecurity & data privacy controls as part of the organization’s established project management processes. | Technology Development & Acquisition (TDA) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to utilize testing methods to ensure systems, services and products continue to operate as intended when subject to invalid or unexpected inputs on its interfaces. | null | null | null | null | null | null | null | null | null | null | SDV-07 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | PW.5.2
PW.7
PW.7.1
PW.7.2
PW.8
PW.8.1
PW.8.2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | PW.2
PW.2.1
PW.8
PW.8.1
PW.8.2 | null | null | A03:2021 | null | 6.2.4 | null | 6.2.4 | null | null | 6.2.4 | null | 6.2.4 | 6.2.4 | null | 1.2.13.2 | null | null | 15.1
15.2
15.3
15.4
15.5
15.6
15.7
15.8
15.9
15.10
15.11 | null | null | ARCHITECTURE-4.H.MIL3 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | § 11.10
§ 11.10(h) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | PSS-02 | null | null | null | 17.3
17.24 | null | null | null | null | null | null | null | null | null | null | null | null | TPC-72 | null | 1-6-3-3 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0402 | null | null | null | null | null | null | null | null | null | null | null | null | null | 14.5.6.C.01 | null | null | null | null | 6.1.6 | null | null | null | null | null | null | null | null | 3.2.9 | null | null | null | null | null | null | null | null | null | null | x | null | x | x | R-AC-3
R-AC-4
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-4
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-IR-4
R-SA-1 | null | null | R-AC-3 | R-AC-4 | null | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | null | R-BC-4 | null | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | R-EX-6 | R-EX-7 | R-GV-1 | R-GV-2 | null | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | null | null | null | null | R-IR-4 | R-SA-1 | null | NT-7
MT-1
MT-2
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | null | null | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Technology Development & Acquisition | Application Penetration Testing | TDA-09.5 | Mechanisms exist to perform application-level penetration testing of custom-made applications and services. | - NNT Change Tracker (https://www.newnettechnologies.com) | E-TDA-03 | Does the organization perform application-level penetration testing of custom-made applications and services? | 9 | Detect | null | X | null | There is no evidence of a capability to perform application-level penetration testing of custom-made applications and services. | SP-CMM1 is N/A, since a structured process is required to perform application-level penetration testing of custom-made applications and services. | Technology Development & Acquisition (TDA) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Development and acquisition management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for technology development and acquisition management.
• IT/cybersecurity personnel implement secure practices to protect the confidentiality, integrity, availability and safety of the organization’s technology assets, data and network(s).
• Secure development practices mostly conform to industry-recognized standards for secure engineering (e.g., OWASP, NIST SP 800-218, NIST SP 800-160, etc.).
• Procurement practices require third-party developers of systems, system components or services to follow secure engineering practices.
• A Project Management Office (PMO), or project management function, enables the implementation of cybersecurity & data privacy-related resource planning controls across the System Development Lifecycle (SDLC) for all high-value projects.
• Security engineering, or a similar function, performs application-level penetration testing of custom-made applications and services. | Technology Development & Acquisition (TDA) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Secure development practices conform to industry-recognized standards for secure engineering (e.g., OWASP, NIST SP 800-218, NIST SP 800-160, etc.).
• A procurement team, or similar function, ensures that third party development and/ or acquisitions meet, or exceed, the organization's business, cybersecurity & data privacy requirements to have secure and resilient systems, applications, services and processes.
• A Software Assurance Maturity Model (SAMM) governs a secure development lifecycle for the development of systems, applications and services.
• Administrative processes exist and technologies are configured to implement secure configuration settings by default to reduce the likelihood of software being deployed with weak security settings, putting the asset at a greater risk of compromise.
• An IT Asset Management (ITAM) function, or similar function, categorizes devices according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data.
• A formal Change Management (CM) program help to ensure that no unauthorized changes are made, all changes are documented, services are not disrupted and resources are used efficiently.
• A Governance, Risk & Compliance (GRC) function, or similar function;
o Provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data for technology development and acquisition.
o Ensures the Information Assurance Program (IAP) evaluates applicable cybersecurity & data privacy controls as part of “business as usual” pre-production testing.
o Operates the Cybersecurity Supply Chain Risk Management (C-SCRM) program to identify and mitigate supply chain-related risks and threats.
• A Project Management Office (PMO), or project management function, enables IAP pre-production testing of cybersecurity & data privacy controls as part of the organization’s established project management processes.
• Security engineering, or a similar function, performs application-level penetration testing of custom-made applications and services. | Technology Development & Acquisition (TDA) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to perform application-level penetration testing of custom-made applications and services. | null | null | null | 16.13 | null | null | 16.13 | null | null | AIS-05
TVM-06 | SDV-07
SET-02
SET-04
SET-06 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | PW.5.2
PW.7
PW.7.1
PW.7.2
PW.8
PW.8.1
PW.8.2 | null | null | null | null | null | null | SA-11(5) | null | null | null | null | SA-11(5) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | PW.2
PW.2.1
PW.8
PW.8.1
PW.8.2 | null | null | A01:2021
A02:2021
A03:2021
A04:2021
A05:2021
A06:2021
A07:2021
A08:2021
A09:2021
A10:2021 | null | 6.2.4 | null | 6.2.4 | null | null | 6.2.4 | null | 6.2.4 | 6.2.4 | null | G.2.5 | 7.3A | null | null | null | null | ARCHITECTURE-4.H.MIL3 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 7.L.A | SA-11(5) | null | null | null | null | null | null | null | null | null | null | null | null | III.F.2.c | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | PSS-02 | null | null | null | 11.9
17.3
17.15
17.17 | null | null | null | null | null | null | null | null | null | null | null | null | TPC-72 | null | 1-6-3-3 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0402 | null | null | null | null | null | null | null | null | null | null | null | null | null | 14.5.6.C.01 | null | null | null | null | 6.1.6 | null | null | null | null | null | null | null | null | 3.2.9 | null | null | null | null | null | null | null | null | null | null | x | null | x | x | R-AC-3
R-AC-4
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-4
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-IR-4
R-SA-1 | null | null | R-AC-3 | R-AC-4 | null | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | null | R-BC-4 | null | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | R-EX-6 | R-EX-7 | R-GV-1 | R-GV-2 | null | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | null | null | null | null | R-IR-4 | R-SA-1 | null | NT-7
MT-1
MT-2
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | null | null | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Technology Development & Acquisition | Secure Settings By Default | TDA-09.6 | Mechanisms exist to implement secure configuration settings by default to reduce the likelihood of software being deployed with weak security settings that would put the asset at a greater risk of compromise. | null | E-TDA-03 | Does the organization implement secure configuration settings by default to reduce the likelihood of software being deployed with weak security settings that would put the asset at a greater risk of compromise? | 9 | Protect | X | X | X | There is no evidence of a capability to implement secure configuration settings by default to reduce the likelihood of software being deployed with weak security settings that would put the asset at a greater risk of compromise. | SP-CMM1 is N/A, since a structured process is required to implement secure configuration settings by default to reduce the likelihood of software being deployed with weak security settings that would put the asset at a greater risk of compromise. | SP-CMM2 is N/A, since a well-defined process is required to implement secure configuration settings by default to reduce the likelihood of software being deployed with weak security settings that would put the asset at a greater risk of compromise. | Technology Development & Acquisition (TDA) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Secure development practices conform to industry-recognized standards for secure engineering (e.g., OWASP, NIST SP 800-218, NIST SP 800-160, etc.).
• A procurement team, or similar function, ensures that third party development and/ or acquisitions meet, or exceed, the organization's business, cybersecurity & data privacy requirements to have secure and resilient systems, applications, services and processes.
• A Software Assurance Maturity Model (SAMM) governs a secure development lifecycle for the development of systems, applications and services.
• Administrative processes exist and technologies are configured to implement secure configuration settings by default to reduce the likelihood of software being deployed with weak security settings, putting the asset at a greater risk of compromise.
• An IT Asset Management (ITAM) function, or similar function, categorizes devices according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data.
• A formal Change Management (CM) program help to ensure that no unauthorized changes are made, all changes are documented, services are not disrupted and resources are used efficiently.
• A Governance, Risk & Compliance (GRC) function, or similar function;
o Provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data for technology development and acquisition.
o Ensures the Information Assurance Program (IAP) evaluates applicable cybersecurity & data privacy controls as part of “business as usual” pre-production testing.
o Operates the Cybersecurity Supply Chain Risk Management (C-SCRM) program to identify and mitigate supply chain-related risks and threats.
• A Project Management Office (PMO), or project management function, enables IAP pre-production testing of cybersecurity & data privacy controls as part of the organization’s established project management processes. | See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to implement secure configuration settings by default to reduce the likelihood of software being deployed with weak security settings that would put the asset at a greater risk of compromise. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to implement secure configuration settings by default to reduce the likelihood of software being deployed with weak security settings that would put the asset at a greater risk of compromise. | null | null | null | 16.1 | null | 16.1 | 16.1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | TS-1.13 | null | null | null | PW.9
PW.9.1
PW.9.2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | PW.1
PW.1.3
PW.9
PW.9.1
PW.9.2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | N.9 | null | null | null | null | null | ARCHITECTURE-4.C.MIL2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 1-4-1-3 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1 | R-AC-1 | R-AC-2 | R-AC-3 | R-AC-4 | R-AM-1 | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | R-EX-6 | R-EX-7 | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | R-GV-8 | R-IR-1 | R-IR-2 | R-IR-3 | R-IR-4 | R-SA-1 | null | NT-7
MT-1
MT-2
MT-8
MT-9
MT-11
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | null | null | null | MT-8 | MT-9 | null | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Technology Development & Acquisition | Manual Code Review | TDA-09.7 | Mechanisms exist to require the developers of systems, system components or services to employ a manual code review process to identify and remediate unique flaws that require knowledge of the application’s requirements and design. | null | null | Does the organization require the developers of systems, system components or services to employ a manual code review process to identify and remediate unique flaws that require knowledge of the application’s requirements and design? | 5 | Detect | null | X | X | There is no evidence of a capability to require the developers of systems, system components or services to employ a manual code review process to identify and remediate unique flaws that require knowledge of the application’s requirements and design. | SP-CMM1 is N/A, since a structured process is required to require the developers of systems, system components or services to employ a manual code review process to identify and remediate unique flaws that require knowledge of the application’s requirements and design. | SP-CMM2 is N/A, since a well-defined process is required to require the developers of systems, system components or services to employ a manual code review process to identify and remediate unique flaws that require knowledge of the application’s requirements and design. | Technology Development & Acquisition (TDA) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Secure development practices conform to industry-recognized standards for secure engineering (e.g., OWASP, NIST SP 800-218, NIST SP 800-160, etc.).
• A procurement team, or similar function, ensures that third party development and/ or acquisitions meet, or exceed, the organization's business, cybersecurity & data privacy requirements to have secure and resilient systems, applications, services and processes.
• A Software Assurance Maturity Model (SAMM) governs a secure development lifecycle for the development of systems, applications and services.
• Administrative processes exist and technologies are configured to implement secure configuration settings by default to reduce the likelihood of software being deployed with weak security settings, putting the asset at a greater risk of compromise.
• An IT Asset Management (ITAM) function, or similar function, categorizes devices according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data.
• A formal Change Management (CM) program help to ensure that no unauthorized changes are made, all changes are documented, services are not disrupted and resources are used efficiently.
• A Governance, Risk & Compliance (GRC) function, or similar function;
o Provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data for technology development and acquisition.
o Ensures the Information Assurance Program (IAP) evaluates applicable cybersecurity & data privacy controls as part of “business as usual” pre-production testing.
o Operates the Cybersecurity Supply Chain Risk Management (C-SCRM) program to identify and mitigate supply chain-related risks and threats.
• A Project Management Office (PMO), or project management function, enables IAP pre-production testing of cybersecurity & data privacy controls as part of the organization’s established project management processes. | See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to require the developers of systems, system components or services to employ a manual code review process to identify and remediate unique flaws that require knowledge of the application’s requirements and design. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to require the developers of systems, system components or services to employ a manual code review process to identify and remediate unique flaws that require knowledge of the application’s requirements and design. | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | SA-11(4) | null | null | null | SA-11(4) | null | null | null | null | SA-11(4) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | ARCHITECTURE-4.H.MIL3 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | SA-11(4) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | R-AC-3
R-AC-4
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-4
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-IR-4
R-SA-1 | null | null | R-AC-3 | R-AC-4 | null | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | null | R-BC-4 | null | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | R-EX-6 | R-EX-7 | R-GV-1 | R-GV-2 | null | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | null | null | null | null | R-IR-4 | R-SA-1 | null | NT-7
MT-1
MT-2
MT-7
MT-8
MT-9
MT-11
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | null | null | MT-7 | MT-8 | MT-9 | null | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Technology Development & Acquisition | Use of Live Data | TDA-10 | Mechanisms exist to approve, document and control the use of live data in development and test environments. | null | null | Does the organization approve, document and control the use of live data in development and test environments? | 9 | Protect | null | X | X | There is no evidence of a capability to approve, document and control the use of live data in development and test environments. | SP-CMM1 is N/A, since a structured process is required to approve, document and control the use of live data in development and test environments. | Technology Development & Acquisition (TDA) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Development and acquisition management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for technology development and acquisition management.
• IT/cybersecurity personnel implement secure practices to protect the confidentiality, integrity, availability and safety of the organization’s technology assets, data and network(s).
• Secure development practices mostly conform to industry-recognized standards for secure engineering (e.g., OWASP, NIST SP 800-218, NIST SP 800-160, etc.).
• Procurement practices require third-party developers of systems, system components or services to follow secure engineering practices.
• A Project Management Office (PMO), or project management function, enables the implementation of cybersecurity & data privacy-related resource planning controls across the System Development Lifecycle (SDLC) for all high-value projects.
• Administrative processes exist to enable the approval, documentation and controlled use of live data in development and test environments. | Technology Development & Acquisition (TDA) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Secure development practices conform to industry-recognized standards for secure engineering (e.g., OWASP, NIST SP 800-218, NIST SP 800-160, etc.).
• A procurement team, or similar function, ensures that third party development and/ or acquisitions meet, or exceed, the organization's business, cybersecurity & data privacy requirements to have secure and resilient systems, applications, services and processes.
• A Software Assurance Maturity Model (SAMM) governs a secure development lifecycle for the development of systems, applications and services.
• Administrative processes exist and technologies are configured to implement secure configuration settings by default to reduce the likelihood of software being deployed with weak security settings, putting the asset at a greater risk of compromise.
• An IT Asset Management (ITAM) function, or similar function, categorizes devices according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data.
• A formal Change Management (CM) program help to ensure that no unauthorized changes are made, all changes are documented, services are not disrupted and resources are used efficiently.
• A Governance, Risk & Compliance (GRC) function, or similar function;
o Provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data for technology development and acquisition.
o Ensures the Information Assurance Program (IAP) evaluates applicable cybersecurity & data privacy controls as part of “business as usual” pre-production testing.
o Operates the Cybersecurity Supply Chain Risk Management (C-SCRM) program to identify and mitigate supply chain-related risks and threats.
• A Project Management Office (PMO), or project management function, enables IAP pre-production testing of cybersecurity & data privacy controls as part of the organization’s established project management processes.
• Administrative processes exist to enable the approval, documentation and controlled use of live data in development and test environments. | Technology Development & Acquisition (TDA) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to approve, document and control the use of live data in development and test environments. | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 14.3.1 | 8.33 | 14.3.1 | null | 6.11.3
6.11.3.1 | null | null | null | null | null | null | null | null | null | null | null | SA-15(9) | null | null | null | SA-3(2) | null | null | null | null | SA-3(2) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 6.4
6.4.3 | 6.5.5 | null | null | null | null | null | null | 6.5.5 | 6.5.5 | null | I.1.5
I.1.5.1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 2.E.6.4
SA-3(2) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 17.03(2)(d)(B)(i) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 10.3 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 1420 | null | null | null | null | null | null | null | null | null | null | 14.3.1 | null | null | null | null | null | null | null | 11.1.6 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | MA 201 CMR 17 | null | null | R-AC-4
R-AM-2
R-AM-3
R-BC-2
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-GV-1
R-GV-2
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-SA-1
R-SA-2 | null | null | null | R-AC-4 | null | R-AM-2 | R-AM-3 | null | R-BC-2 | null | null | null | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | null | R-GV-1 | R-GV-2 | null | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | null | null | null | null | null | R-SA-1 | R-SA-2 | NT-7
MT-1
MT-2
MT-7
MT-8
MT-9
MT-11
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | null | null | MT-7 | MT-8 | MT-9 | null | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Technology Development & Acquisition | Test Data Integrity | TDA-10.1 | Mechanisms exist to ensure the integrity of test data through existing cybersecurity & data privacy controls. | - CimTrak Integrity Suite (https://www.cimcor.com/cimtrak/) | null | Does the organization ensure the integrity of test data through existing cybersecurity & data privacy controls? | 8 | Protect | null | X | X | There is no evidence of a capability to ensure the integrity of test data through existing cybersecurity & data privacy controls. | Technology Development & Acquisition (TDA) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• IT personnel use an informal process to govern technology development and acquisition.
• Secure development practices loosely conform to industry-recognized standards for secure engineering (e.g., OWASP, NIST SP 800-218, NIST SP 800-160, etc.).
• IT personnel work with data/process owners to help ensure secure practices are implemented throughout the System Development Lifecycle (SDLC) for all high-value projects. | Technology Development & Acquisition (TDA) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Development and acquisition management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for technology development and acquisition management.
• IT/cybersecurity personnel implement secure practices to protect the confidentiality, integrity, availability and safety of the organization’s technology assets, data and network(s).
• Secure development practices mostly conform to industry-recognized standards for secure engineering (e.g., OWASP, NIST SP 800-218, NIST SP 800-160, etc.).
• Procurement practices require third-party developers of systems, system components or services to follow secure engineering practices.
• A Project Management Office (PMO), or project management function, enables the implementation of cybersecurity & data privacy-related resource planning controls across the System Development Lifecycle (SDLC) for all high-value projects. | Technology Development & Acquisition (TDA) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Secure development practices conform to industry-recognized standards for secure engineering (e.g., OWASP, NIST SP 800-218, NIST SP 800-160, etc.).
• A procurement team, or similar function, ensures that third party development and/ or acquisitions meet, or exceed, the organization's business, cybersecurity & data privacy requirements to have secure and resilient systems, applications, services and processes.
• A Software Assurance Maturity Model (SAMM) governs a secure development lifecycle for the development of systems, applications and services.
• Administrative processes exist and technologies are configured to implement secure configuration settings by default to reduce the likelihood of software being deployed with weak security settings, putting the asset at a greater risk of compromise.
• An IT Asset Management (ITAM) function, or similar function, categorizes devices according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data.
• A formal Change Management (CM) program help to ensure that no unauthorized changes are made, all changes are documented, services are not disrupted and resources are used efficiently.
• A Governance, Risk & Compliance (GRC) function, or similar function;
o Provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data for technology development and acquisition.
o Ensures the Information Assurance Program (IAP) evaluates applicable cybersecurity & data privacy controls as part of “business as usual” pre-production testing.
o Operates the Cybersecurity Supply Chain Risk Management (C-SCRM) program to identify and mitigate supply chain-related risks and threats.
• A Project Management Office (PMO), or project management function, enables IAP pre-production testing of cybersecurity & data privacy controls as part of the organization’s established project management processes. | Technology Development & Acquisition (TDA) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | Technology Development & Acquisition (TDA) efforts are “world-class” capabilities that leverage predictive analysis (e.g., machine learning, AI, etc.). In addition to CMM Level 4 criteria, CMM Level 5 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Stakeholders make time-sensitive decisions to support operational efficiency, which may include automated remediation actions.
▪ Based on predictive analysis, process improvements are implemented according to “continuous improvement” practices that affect process changes. | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | PR.DS-P6 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | I.1.5.3 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0402 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | R-AM-2
R-AM-3
R-BC-2
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-GV-1
R-GV-2
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-SA-1
R-SA-2 | null | null | null | null | null | R-AM-2 | R-AM-3 | null | R-BC-2 | null | null | null | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | null | R-GV-1 | R-GV-2 | null | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | null | null | null | null | null | R-SA-1 | R-SA-2 | NT-7
MT-1
MT-2
MT-7
MT-8
MT-9
MT-11
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | null | null | MT-7 | MT-8 | MT-9 | null | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Technology Development & Acquisition | Product Tampering and Counterfeiting (PTC) | TDA-11 | Mechanisms exist to maintain awareness of component authenticity by developing and implementing Product Tampering and Counterfeiting (PTC) practices that include the means to detect and prevent counterfeit components. | null | null | Does the organization maintain awareness of component authenticity by developing and implementing Product Tampering and Counterfeiting (PTC) practices that include the means to detect and prevent counterfeit components? | 9 | Protect | X | X | X | There is no evidence of a capability to maintain awareness of component authenticity by developing and implementing Product Tampering and Counterfeiting (PTC) practices that include the means to detect and prevent counterfeit components. | Technology Development & Acquisition (TDA) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• IT personnel use an informal process to govern technology development and acquisition.
• Secure development practices loosely conform to industry-recognized standards for secure engineering (e.g., OWASP, NIST SP 800-218, NIST SP 800-160, etc.).
• IT personnel work with data/process owners to help ensure secure practices are implemented throughout the System Development Lifecycle (SDLC) for all high-value projects. | Technology Development & Acquisition (TDA) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Development and acquisition management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for technology development and acquisition management.
• IT/cybersecurity personnel implement secure practices to protect the confidentiality, integrity, availability and safety of the organization’s technology assets, data and network(s).
• Secure development practices mostly conform to industry-recognized standards for secure engineering (e.g., OWASP, NIST SP 800-218, NIST SP 800-160, etc.).
• Procurement practices require third-party developers of systems, system components or services to follow secure engineering practices.
• A Project Management Office (PMO), or project management function, enables the implementation of cybersecurity & data privacy-related resource planning controls across the System Development Lifecycle (SDLC) for all high-value projects. | Technology Development & Acquisition (TDA) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Secure development practices conform to industry-recognized standards for secure engineering (e.g., OWASP, NIST SP 800-218, NIST SP 800-160, etc.).
• A procurement team, or similar function:
o Ensures that third party development and/ or acquisitions meet, or exceed, the organization's business, cybersecurity & data privacy requirements to have secure and resilient systems, applications, services and processes.
o Provides governance of component authenticity by developing and implementing anti-counterfeit procedures that include the means to detect and prevent counterfeit components.
o Enables the implementation of tailored development and acquisition strategies, contract tools and procurement methods to meet unique business needs.
o Trains personnel to detect counterfeit system components, including hardware, software and firmware.
• A Software Assurance Maturity Model (SAMM) governs a secure development lifecycle for the development of systems, applications and services.
• Administrative processes exist and technologies are configured to implement secure configuration settings by default to reduce the likelihood of software being deployed with weak security settings, putting the asset at a greater risk of compromise.
• An IT Asset Management (ITAM) function, or similar function, categorizes devices according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data.
• A formal Change Management (CM) program help to ensure that no unauthorized changes are made, all changes are documented, services are not disrupted and resources are used efficiently.
• A Governance, Risk & Compliance (GRC) function, or similar function;
o Provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data for technology development and acquisition.
o Ensures the Information Assurance Program (IAP) evaluates applicable cybersecurity & data privacy controls as part of “business as usual” pre-production testing.
o Operates the Cybersecurity Supply Chain Risk Management (C-SCRM) program to identify and mitigate supply chain-related risks and threats.
• A Project Management Office (PMO), or project management function, enables IAP pre-production testing of cybersecurity & data privacy controls as part of the organization’s established project management processes. | Technology Development & Acquisition (TDA) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to maintain awareness of component authenticity by developing and implementing Product Tampering and Counterfeiting (PTC) practices that include the means to detect and prevent counterfeit components. | null | null | null | 16.5 | null | 16.5 | 16.5 | null | null | null | SDV-02 | null | null | CR 3.4 (7.6.3(1)) | null | null | null | null | null | null | null | null | null | null | null | null | T1059.002, T1204.003, T1505, T1505.001, T1505.002, T1505.004, T1546.006, T1554, T1601, T1601.001, T1601.002 | null | null | null | null | null | null | null | SA-12(10)
SA-19 | null | null | null | SR-4(3)
SR-4(4)
SR-10
SR-11
SR-11(3) | null | SR-10
SR-11 | SR-10
SR-11 | SR-10
SR-11 | SR-4(3)
SR-4(4)
SR-11(3) | null | SR-10
SR-11 | SR-10
SR-11 | SR-10
SR-11 | null | SR-10
SR-11
SR-11(3) | SR-10
SR-11 | SR-10 | SR-11 | SR-10
SR-11
SR-11(3) | SR-10
SR-11
SR-11(3) | null | null | null | null | null | null | null | ID.RA-09 | null | null | null | null | null | null | null | null | null | null | null | null | T.6 | null | null | null | null | null | null | ADM:SG1.SP1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | SR-10
SR-11 | SR-10
SR-11 | SR-10
SR-11 | SR-10
SR-11 | SR-10
SR-11 | null | null | null | null | null | null | null | null | null | SR-10
SR-11 | null | null | 8-302 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 17.21 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 1790
1791
1792 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | null | R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1 | R-AC-1 | R-AC-2 | R-AC-3 | R-AC-4 | R-AM-1 | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | R-EX-6 | R-EX-7 | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | R-GV-8 | R-IR-1 | R-IR-2 | R-IR-3 | R-IR-4 | R-SA-1 | null | NT-7
MT-1
MT-2
MT-7
MT-8
MT-9
MT-11
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | null | null | MT-7 | MT-8 | MT-9 | null | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Technology Development & Acquisition | Anti-Counterfeit Training | TDA-11.1 | Mechanisms exist to train personnel to detect counterfeit system components, including hardware, software and firmware. | null | null | Does the organization train personnel to detect counterfeit system components, including hardware, software and firmware? | 6 | Protect | null | X | X | There is no evidence of a capability to train personnel to detect counterfeit system components, including hardware, software and firmware. | Technology Development & Acquisition (TDA) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• IT personnel use an informal process to govern technology development and acquisition.
• Secure development practices loosely conform to industry-recognized standards for secure engineering (e.g., OWASP, NIST SP 800-218, NIST SP 800-160, etc.).
• IT personnel work with data/process owners to help ensure secure practices are implemented throughout the System Development Lifecycle (SDLC) for all high-value projects. | Technology Development & Acquisition (TDA) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Development and acquisition management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for technology development and acquisition management.
• IT/cybersecurity personnel implement secure practices to protect the confidentiality, integrity, availability and safety of the organization’s technology assets, data and network(s).
• Secure development practices mostly conform to industry-recognized standards for secure engineering (e.g., OWASP, NIST SP 800-218, NIST SP 800-160, etc.).
• Procurement practices require third-party developers of systems, system components or services to follow secure engineering practices.
• A Project Management Office (PMO), or project management function, enables the implementation of cybersecurity & data privacy-related resource planning controls across the System Development Lifecycle (SDLC) for all high-value projects. | Technology Development & Acquisition (TDA) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Secure development practices conform to industry-recognized standards for secure engineering (e.g., OWASP, NIST SP 800-218, NIST SP 800-160, etc.).
• A procurement team, or similar function:
o Ensures that third party development and/ or acquisitions meet, or exceed, the organization's business, cybersecurity & data privacy requirements to have secure and resilient systems, applications, services and processes.
o Provides governance of component authenticity by developing and implementing anti-counterfeit procedures that include the means to detect and prevent counterfeit components.
o Enables the implementation of tailored development and acquisition strategies, contract tools and procurement methods to meet unique business needs.
o Trains personnel to detect counterfeit system components, including hardware, software and firmware.
• A Software Assurance Maturity Model (SAMM) governs a secure development lifecycle for the development of systems, applications and services.
• Administrative processes exist and technologies are configured to implement secure configuration settings by default to reduce the likelihood of software being deployed with weak security settings, putting the asset at a greater risk of compromise.
• An IT Asset Management (ITAM) function, or similar function, categorizes devices according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data.
• A formal Change Management (CM) program help to ensure that no unauthorized changes are made, all changes are documented, services are not disrupted and resources are used efficiently.
• A Governance, Risk & Compliance (GRC) function, or similar function;
o Provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data for technology development and acquisition.
o Ensures the Information Assurance Program (IAP) evaluates applicable cybersecurity & data privacy controls as part of “business as usual” pre-production testing.
o Operates the Cybersecurity Supply Chain Risk Management (C-SCRM) program to identify and mitigate supply chain-related risks and threats.
• A Project Management Office (PMO), or project management function, enables IAP pre-production testing of cybersecurity & data privacy controls as part of the organization’s established project management processes. | Technology Development & Acquisition (TDA) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to train personnel to detect counterfeit system components, including hardware, software and firmware. | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | SA-19(1) | null | null | null | SR-11(1) | null | SR-11(1) | SR-11(1) | SR-11(1) | null | null | SR-11(1) | SR-11(1) | SR-11(1) | null | SR-11(1) | SR-11(1) | null | null | SR-11(1) | SR-11(1) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | T.6 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | SR-11(1) | SR-11(1) | SR-11(1) | SR-11(1) | SR-11(1) | null | null | null | null | null | null | null | null | null | SR-11(1) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 17.21 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
R-SA-2 | R-AC-1 | R-AC-2 | R-AC-3 | R-AC-4 | R-AM-1 | R-AM-2 | null | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | R-EX-6 | R-EX-7 | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | R-GV-8 | R-IR-1 | R-IR-2 | R-IR-3 | R-IR-4 | R-SA-1 | R-SA-2 | NT-7
MT-1
MT-2
MT-7
MT-8
MT-9
MT-11
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | null | null | MT-7 | MT-8 | MT-9 | null | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Technology Development & Acquisition | Component Disposal | TDA-11.2 | [deprecated - incorporated into AST-09]
Mechanisms exist to dispose of system components using organization-defined techniques and methods to prevent such components from entering the gray market. | null | null | [deprecated - incorporated into AST-09]
Does the organization dispose of system components using organization-defined techniques and methods to prevent such components from entering the gray market? | 9 | Protect | null | X | X | There is no evidence of a capability to [deprecated - incorporated into AST-09]
dispose of system components using organization-defined techniques and methods to prevent such components from entering the gray market. | N/A - deprecated - incorporated into AST-09 | N/A - deprecated - incorporated into AST-09 | N/A - deprecated - incorporated into AST-09 | N/A - deprecated - incorporated into AST-09 | N/A - deprecated - incorporated into AST-09 | CC6.5 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | SA-19(3) | null | null | null | SR-12 | null | SR-12 | SR-12 | SR-12 | null | null | SR-12 | SR-12 | SR-12 | 3.4.14 | SR-12 | SR-12 | null | null | SR-12 | SR-12 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | MP.L1-b.1.vii | null | null | null | null | null | null | 52.204-21(b)(1)(vii) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 9.L.C | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 45.48.500
45.48.510 | null | null | null | null | null | null | null | null | null | null | null | null | null | Sec. 521.052(b) | null | SR-12 | null | null | null | null | null | null | null | null | null | null | Art 24 | null | null | null | null | null | null | null | null | null | PI-03 | null | null | null | 15.4
17.21 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 1550
0311
1217
0315
1218
0312
0317
1219
1220
1221
0318
1534
1076
1222
1223
1225
1226 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Technology Development & Acquisition | Customized Development of Critical Components | TDA-12 | Mechanisms exist to custom-develop critical system components, when Commercial Off The Shelf (COTS) solutions are unavailable. | - OWASP | null | Does the organization custom-develop critical system components, when Commercial Off The Shelf (COTS) solutions are unavailable? | 8 | Protect | null | X | X | There is no evidence of a capability to custom-develop critical system components, when COTS solutions are unavailable. | SP-CMM1 is N/A, since a structured process is required to custom-develop critical system components, when COTS solutions are unavailable. | Technology Development & Acquisition (TDA) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Development and acquisition management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for technology development and acquisition management.
• IT/cybersecurity personnel implement secure practices to protect the confidentiality, integrity, availability and safety of the organization’s technology assets, data and network(s).
• Secure development practices mostly conform to industry-recognized standards for secure engineering (e.g., OWASP, NIST SP 800-218, NIST SP 800-160, etc.).
• Procurement practices require third-party developers of systems, system components or services to follow secure engineering practices.
• A Project Management Office (PMO), or project management function, enables the implementation of cybersecurity & data privacy-related resource planning controls across the System Development Lifecycle (SDLC) for all high-value projects.
• An application development team, or similar function, custom-develops business-critical system components, when Commercial Off The Shelf (COTS) solutions are unavailable.
• Procurement contracts require system developers and integrators to provide training on the correct use and operation of the system, system component or service. | Technology Development & Acquisition (TDA) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Secure development practices conform to industry-recognized standards for secure engineering (e.g., OWASP, NIST SP 800-218, NIST SP 800-160, etc.).
• A procurement team, or similar function, ensures that third party development and/ or acquisitions meet, or exceed, the organization's business, cybersecurity & data privacy requirements to have secure and resilient systems, applications, services and processes.
• A Software Assurance Maturity Model (SAMM) governs a secure development lifecycle for the development of systems, applications and services.
• Administrative processes exist and technologies are configured to implement secure configuration settings by default to reduce the likelihood of software being deployed with weak security settings, putting the asset at a greater risk of compromise.
• An IT Asset Management (ITAM) function, or similar function, categorizes devices according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data.
• A formal Change Management (CM) program help to ensure that no unauthorized changes are made, all changes are documented, services are not disrupted and resources are used efficiently.
• A Governance, Risk & Compliance (GRC) function, or similar function;
o Provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data for technology development and acquisition.
o Ensures the Information Assurance Program (IAP) evaluates applicable cybersecurity & data privacy controls as part of “business as usual” pre-production testing.
o Operates the Cybersecurity Supply Chain Risk Management (C-SCRM) program to identify and mitigate supply chain-related risks and threats.
• A Project Management Office (PMO), or project management function, enables IAP pre-production testing of cybersecurity & data privacy controls as part of the organization’s established project management processes.
• An application development team, or similar function, custom-develops business-critical system components, when Commercial Off The Shelf (COTS) solutions are unavailable.
• Procurement contracts require system developers and integrators to provide training on the correct use and operation of the system, system component or service. | Technology Development & Acquisition (TDA) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to custom-develop critical system components, when COTS solutions are unavailable. | null | null | null | 16.7
16.11 | null | 16.7
16.11 | 16.7
16.11 | null | null | null | SDV-03
SDV-05 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | SA-20 | null | null | null | PM-30(1)
SA-20
SA-23 | null | null | null | null | PM-30(1)
SA-20
SA-23 | null | null | null | null | null | SA-20 | null | null | null | SA-20 | SA-20 | null | null | null | null | null | PW.4
PW.4.1
PW.4.2
PW.4.4 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | I.1.6 | null | null | null | null | null | null | RISK:SG3.SP1
TM:SG1.SP1
TM:SG3.SP2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1 | R-AC-1 | R-AC-2 | R-AC-3 | R-AC-4 | R-AM-1 | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | R-EX-6 | R-EX-7 | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | null | R-IR-1 | R-IR-2 | R-IR-3 | R-IR-4 | R-SA-1 | null | NT-7
MT-1
MT-2
MT-7
MT-8
MT-9
MT-11
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | null | null | MT-7 | MT-8 | MT-9 | null | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Technology Development & Acquisition | Developer Screening | TDA-13 | Mechanisms exist to ensure that the developers of systems, applications and/or services have the requisite skillset and appropriate access authorizations. | null | null | Does the organization ensure that the developers of systems, applications and/or services have the requisite skillset and appropriate access authorizations? | 9 | Protect | null | X | X | There is no evidence of a capability to ensure that the developers of systems, applications and/ or services have the requisite skillset and appropriate access authorizations. | SP-CMM1 is N/A, since a structured process is required to ensure that the developers of systems, applications and/ or services have the requisite skillset and appropriate access authorizations. | Technology Development & Acquisition (TDA) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Development and acquisition management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for technology development and acquisition management.
• IT/cybersecurity personnel implement secure practices to protect the confidentiality, integrity, availability and safety of the organization’s technology assets, data and network(s).
• Secure development practices mostly conform to industry-recognized standards for secure engineering (e.g., OWASP, NIST SP 800-218, NIST SP 800-160, etc.).
• Procurement practices require third-party developers of systems, system components or services to follow secure engineering practices.
• A Project Management Office (PMO), or project management function, enables the implementation of cybersecurity & data privacy-related resource planning controls across the System Development Lifecycle (SDLC) for all high-value projects. | Technology Development & Acquisition (TDA) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Secure development practices conform to industry-recognized standards for secure engineering (e.g., OWASP, NIST SP 800-218, NIST SP 800-160, etc.).
• A procurement team, or similar function, ensures that third party development and/ or acquisitions meet, or exceed, the organization's business, cybersecurity & data privacy requirements to have secure and resilient systems, applications, services and processes.
• A Software Assurance Maturity Model (SAMM) governs a secure development lifecycle for the development of systems, applications and services.
• Administrative processes exist and technologies are configured to implement secure configuration settings by default to reduce the likelihood of software being deployed with weak security settings, putting the asset at a greater risk of compromise.
• An IT Asset Management (ITAM) function, or similar function, categorizes devices according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data.
• A formal Change Management (CM) program help to ensure that no unauthorized changes are made, all changes are documented, services are not disrupted and resources are used efficiently.
• A Governance, Risk & Compliance (GRC) function, or similar function;
o Provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data for technology development and acquisition.
o Ensures the Information Assurance Program (IAP) evaluates applicable cybersecurity & data privacy controls as part of “business as usual” pre-production testing.
o Operates the Cybersecurity Supply Chain Risk Management (C-SCRM) program to identify and mitigate supply chain-related risks and threats.
• A Project Management Office (PMO), or project management function, enables IAP pre-production testing of cybersecurity & data privacy controls as part of the organization’s established project management processes. | Technology Development & Acquisition (TDA) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to ensure that the developers of systems, applications and/ or services have the requisite skillset and appropriate access authorizations. | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | SA-21 | null | null | null | SA-21
SA-21(1) | null | null | null | SA-21 | null | null | null | null | SA-21 | null | SA-21
SA-21(1) | null | SA-21 | null | SA-21
SA-21(1) | SA-21
SA-21(1) | null | null | null | null | 3.9.1e
3.9.2e | null | null | null | null | null | 6.2.2 | null | 6.2.2 | null | null | 6.2.2 | null | 6.2.2 | 6.2.2 | null | E.1.3.2
E.1.3.3
E.1.3.5
| null | null | null | null | null | null | AM:SG1.SP1 | null | null | null | null | TBD - 3.9.1e
TBD - 3.9.2e | null | null | PS.L3-3.9.2e | null | null | null | null | null | null | null | null | null | null | null | null | null | SA-21 | null | null | SA-21 | null | null | null | null | null | null | null | null | null | null | null | null | CIP-004-6
R3 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | DEV-02 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1 | R-AC-1 | R-AC-2 | R-AC-3 | R-AC-4 | R-AM-1 | R-AM-2 | null | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | R-EX-6 | R-EX-7 | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | R-GV-8 | R-IR-1 | R-IR-2 | R-IR-3 | R-IR-4 | R-SA-1 | null | NT-7
MT-1
MT-2
MT-7
MT-8
MT-9
MT-11
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | null | null | MT-7 | MT-8 | MT-9 | null | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Technology Development & Acquisition | Developer Configuration Management | TDA-14 | Mechanisms exist to require system developers and integrators to perform configuration management during system design, development, implementation and operation. | null | null | Does the organization require system developers and integrators to perform configuration management during system design, development, implementation and operation? | 9 | Protect | null | X | X | There is no evidence of a capability to require system developers and integrators to perform configuration management during system design, development, implementation and operation. | SP-CMM1 is N/A, since a structured process is required to require system developers and integrators to perform configuration management during system design, development, implementation and operation. | Technology Development & Acquisition (TDA) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Development and acquisition management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for technology development and acquisition management.
• IT/cybersecurity personnel implement secure practices to protect the confidentiality, integrity, availability and safety of the organization’s technology assets, data and network(s).
• Secure development practices mostly conform to industry-recognized standards for secure engineering (e.g., OWASP, NIST SP 800-218, NIST SP 800-160, etc.).
• Procurement practices require third-party developers of systems, system components or services to follow secure engineering practices.
• A Project Management Office (PMO), or project management function, enables the implementation of cybersecurity & data privacy-related resource planning controls across the System Development Lifecycle (SDLC) for all high-value projects. | Technology Development & Acquisition (TDA) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Secure development practices conform to industry-recognized standards for secure engineering (e.g., OWASP, NIST SP 800-218, NIST SP 800-160, etc.).
• A procurement team, or similar function, ensures that third party development and/ or acquisitions meet, or exceed, the organization's business, cybersecurity & data privacy requirements to have secure and resilient systems, applications, services and processes.
• A Software Assurance Maturity Model (SAMM) governs a secure development lifecycle for the development of systems, applications and services.
• Administrative processes exist and technologies are configured to implement secure configuration settings by default to reduce the likelihood of software being deployed with weak security settings, putting the asset at a greater risk of compromise.
• An IT Asset Management (ITAM) function, or similar function, categorizes devices according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data.
• A formal Change Management (CM) program help to ensure that no unauthorized changes are made, all changes are documented, services are not disrupted and resources are used efficiently.
• A Governance, Risk & Compliance (GRC) function, or similar function;
o Provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data for technology development and acquisition.
o Ensures the Information Assurance Program (IAP) evaluates applicable cybersecurity & data privacy controls as part of “business as usual” pre-production testing.
o Operates the Cybersecurity Supply Chain Risk Management (C-SCRM) program to identify and mitigate supply chain-related risks and threats.
• A Project Management Office (PMO), or project management function, enables IAP pre-production testing of cybersecurity & data privacy controls as part of the organization’s established project management processes. | Technology Development & Acquisition (TDA) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to require system developers and integrators to perform configuration management during system design, development, implementation and operation. | null | null | null | 16.11 | null | 16.11 | 16.11 | null | null | null | null | null | null | null | null | null | null | null | 14.2.4 | 8.30
8.32 | 14.2.4 | null | 6.11.2.4 | null | null | null | T1078, T1078.001, T1078.003, T1078.004, T1195.003, T1213.003, T1495, T1505, T1505.001, T1505.002, T1505.004, T1542, T1542.001, T1542.003, T1542.004, T1542.005, T1547.011, T1553, T1553.006, T1564.009, T1574.002, T1601, T1601.001, T1601.002 | null | null | null | null | PW.3
PW.3.1 | null | null | SA-10 | null | SA-10 | SA-10 | SA-10 | null | null | SA-10 | SA-10 | null | null | null | SA-10 | SA-10 | null | SA-10 | null | null | null | SA-10 | SA-10 | NFO - SA-10 | null | null | null | null | PW.1
PW.1.2 | PR.DS-8 | null | null | null | null | null | null | null | null | null | null | null | null | null | I.2.1
I.2.2 | null | null | null | null | null | null | TM:SG4.SP2
TM:SG4.SP3
VAR:SG2.SP2
VAR:SG2.SP3
VAR:SG3.SP1 | null | null | null | null | null | null | null | null | SA-10 | null | null | null | null | null | null | null | SA-10 | null | SA-10 | SA-10 | null | SA-10 | null | SA-10 | SA-10 | null | null | null | null | null | null | null | null | null | null | SA-10 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 17.03(2)(d)(B)(i) | null | null | null | null | null | null | null | SA-10 | null | SA-10 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | DEV-02 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 14.2.4 | null | null | null | null | null | null | null | 6.1.5 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | MA 201 CMR 17 | null | x | R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1 | R-AC-1 | R-AC-2 | R-AC-3 | R-AC-4 | R-AM-1 | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | R-EX-6 | R-EX-7 | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | null | R-IR-1 | R-IR-2 | R-IR-3 | R-IR-4 | R-SA-1 | null | NT-7
MT-1
MT-2
MT-7
MT-8
MT-9
MT-11
MT-12
MT-13
MT-14
MT-15
MT-16 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | null | null | MT-7 | MT-8 | MT-9 | null | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | MT-16 | null |
Technology Development & Acquisition | Software / Firmware Integrity Verification | TDA-14.1 | Mechanisms exist to require developer of systems, system components or services to enable integrity verification of software and firmware components. | - CimTrak Integrity Suite (https://www.cimcor.com/cimtrak/) | null | Does the organization require developer of systems, system components or services to enable integrity verification of software and firmware components? | 8 | Protect | null | X | X | There is no evidence of a capability to require developer of systems, system components or services to enable integrity verification of software and firmware components. | SP-CMM1 is N/A, since a structured process is required to require developer of systems, system components or services to enable integrity verification of software and firmware components. | Technology Development & Acquisition (TDA) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Development and acquisition management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for technology development and acquisition management.
• IT/cybersecurity personnel implement secure practices to protect the confidentiality, integrity, availability and safety of the organization’s technology assets, data and network(s).
• Secure development practices mostly conform to industry-recognized standards for secure engineering (e.g., OWASP, NIST SP 800-218, NIST SP 800-160, etc.).
• Procurement practices require third-party developers of systems, system components or services to follow secure engineering practices.
• A Project Management Office (PMO), or project management function, enables the implementation of cybersecurity & data privacy-related resource planning controls across the System Development Lifecycle (SDLC) for all high-value projects. | Technology Development & Acquisition (TDA) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Secure development practices conform to industry-recognized standards for secure engineering (e.g., OWASP, NIST SP 800-218, NIST SP 800-160, etc.).
• A procurement team, or similar function, ensures that third party development and/ or acquisitions meet, or exceed, the organization's business, cybersecurity & data privacy requirements to have secure and resilient systems, applications, services and processes.
• A Software Assurance Maturity Model (SAMM) governs a secure development lifecycle for the development of systems, applications and services.
• Administrative processes exist and technologies are configured to implement secure configuration settings by default to reduce the likelihood of software being deployed with weak security settings, putting the asset at a greater risk of compromise.
• An IT Asset Management (ITAM) function, or similar function, categorizes devices according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data.
• A formal Change Management (CM) program help to ensure that no unauthorized changes are made, all changes are documented, services are not disrupted and resources are used efficiently.
• A Governance, Risk & Compliance (GRC) function, or similar function;
o Provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data for technology development and acquisition.
o Ensures the Information Assurance Program (IAP) evaluates applicable cybersecurity & data privacy controls as part of “business as usual” pre-production testing.
o Operates the Cybersecurity Supply Chain Risk Management (C-SCRM) program to identify and mitigate supply chain-related risks and threats.
• A Project Management Office (PMO), or project management function, enables IAP pre-production testing of cybersecurity & data privacy controls as part of the organization’s established project management processes. | Technology Development & Acquisition (TDA) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | Technology Development & Acquisition (TDA) efforts are “world-class” capabilities that leverage predictive analysis (e.g., machine learning, AI, etc.). In addition to CMM Level 4 criteria, CMM Level 5 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Stakeholders make time-sensitive decisions to support operational efficiency, which may include automated remediation actions.
▪ Based on predictive analysis, process improvements are implemented according to “continuous improvement” practices that affect process changes. | null | null | null | 16.5
16.11 | null | 16.5
16.11 | 16.5
16.11 | null | null | null | CCM-06
IAM-22
IOT-03
IOT-09 | SO12 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | PR.DS-P6 | null | null | null | SA-10(1) | null | null | null | SA-10(1) | null | null | null | null | SA-10(1) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | PW.4
PW.4.1
PW.4.2
PW.4.4 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | I.1.7.4 | null | null | 11.5
11.6
11.7 | null | null | ARCHITECTURE-4.G.MIL3 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | SA-10(1) | null | SA-10(1) | SA-10(1) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | SA-10(1) | null | null | null | null | null | null | null | null | null | null | null | SA-10(1) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | SA-10(1) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 17.20 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | null | null | x | R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1 | R-AC-1 | R-AC-2 | R-AC-3 | R-AC-4 | R-AM-1 | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | R-EX-6 | R-EX-7 | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | null | R-IR-1 | R-IR-2 | R-IR-3 | R-IR-4 | R-SA-1 | null | NT-7
MT-1
MT-2
MT-7
MT-8
MT-9
MT-11
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | null | null | MT-7 | MT-8 | MT-9 | null | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Technology Development & Acquisition | Hardware Integrity Verification | TDA-14.2 | Mechanisms exist to require developer of systems, system components or services to enable integrity verification of hardware components. | null | null | Does the organization require developer of systems, system components or services to enable integrity verification of hardware components? | 5 | Protect | null | null | X | There is no evidence of a capability to require developer of systems, system components or services to enable integrity verification of hardware components. | SP-CMM1 is N/A, since a structured process is required to require developer of systems, system components or services to enable integrity verification of hardware components. | SP-CMM2 is N/A, since a well-defined process is required to require developer of systems, system components or services to enable integrity verification of hardware components. | Technology Development & Acquisition (TDA) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Secure development practices conform to industry-recognized standards for secure engineering (e.g., OWASP, NIST SP 800-218, NIST SP 800-160, etc.).
• A procurement team, or similar function, ensures that third party development and/ or acquisitions meet, or exceed, the organization's business, cybersecurity & data privacy requirements to have secure and resilient systems, applications, services and processes.
• A Software Assurance Maturity Model (SAMM) governs a secure development lifecycle for the development of systems, applications and services.
• Administrative processes exist and technologies are configured to implement secure configuration settings by default to reduce the likelihood of software being deployed with weak security settings, putting the asset at a greater risk of compromise.
• An IT Asset Management (ITAM) function, or similar function, categorizes devices according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data.
• A formal Change Management (CM) program help to ensure that no unauthorized changes are made, all changes are documented, services are not disrupted and resources are used efficiently.
• A Governance, Risk & Compliance (GRC) function, or similar function;
o Provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data for technology development and acquisition.
o Ensures the Information Assurance Program (IAP) evaluates applicable cybersecurity & data privacy controls as part of “business as usual” pre-production testing.
o Operates the Cybersecurity Supply Chain Risk Management (C-SCRM) program to identify and mitigate supply chain-related risks and threats.
• A Project Management Office (PMO), or project management function, enables IAP pre-production testing of cybersecurity & data privacy controls as part of the organization’s established project management processes. | See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to require developer of systems, system components or services to enable integrity verification of hardware components. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to require developer of systems, system components or services to enable integrity verification of hardware components. | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | SA-10(3) | null | null | null | SA-10(3) | null | null | null | null | SA-10(3) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | SA-10(3) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1 | R-AC-1 | R-AC-2 | R-AC-3 | R-AC-4 | R-AM-1 | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | R-EX-6 | R-EX-7 | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | null | R-IR-1 | R-IR-2 | R-IR-3 | R-IR-4 | R-SA-1 | null | NT-7
MT-1
MT-2
MT-7
MT-8
MT-9
MT-11
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | null | null | MT-7 | MT-8 | MT-9 | null | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Technology Development & Acquisition | Developer Threat Analysis & Flaw Remediation | TDA-15 | Mechanisms exist to require system developers and integrators to create a Security Test and Evaluation (ST&E) plan and implement the plan under the witness of an independent party. | - Security Test and Evaluation (ST&E) plan | null | Does the organization require system developers and integrators to create a Security Test and Evaluation (ST&E) plan and implement the plan under the witness of an independent party? | 9 | Protect | null | X | X | There is no evidence of a capability to require system developers and integrators to create a Security Test and Evaluation (ST&E) plan and implement the plan under the witness of an independent party. | SP-CMM1 is N/A, since a structured process is required to require system developers and integrators to create a Security Test and Evaluation (ST&E) plan and implement the plan under the witness of an independent party. | Technology Development & Acquisition (TDA) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Development and acquisition management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for technology development and acquisition management.
• IT/cybersecurity personnel implement secure practices to protect the confidentiality, integrity, availability and safety of the organization’s technology assets, data and network(s).
• Secure development practices mostly conform to industry-recognized standards for secure engineering (e.g., OWASP, NIST SP 800-218, NIST SP 800-160, etc.).
• Procurement practices require third-party developers of systems, system components or services to follow secure engineering practices.
• A Project Management Office (PMO), or project management function, enables the implementation of cybersecurity & data privacy-related resource planning controls across the System Development Lifecycle (SDLC) for all high-value projects. | Technology Development & Acquisition (TDA) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Secure development practices conform to industry-recognized standards for secure engineering (e.g., OWASP, NIST SP 800-218, NIST SP 800-160, etc.).
• A procurement team, or similar function, ensures that third party development and/ or acquisitions meet, or exceed, the organization's business, cybersecurity & data privacy requirements to have secure and resilient systems, applications, services and processes.
• A Software Assurance Maturity Model (SAMM) governs a secure development lifecycle for the development of systems, applications and services.
• Administrative processes exist and technologies are configured to implement secure configuration settings by default to reduce the likelihood of software being deployed with weak security settings, putting the asset at a greater risk of compromise.
• An IT Asset Management (ITAM) function, or similar function, categorizes devices according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data.
• A formal Change Management (CM) program help to ensure that no unauthorized changes are made, all changes are documented, services are not disrupted and resources are used efficiently.
• A Governance, Risk & Compliance (GRC) function, or similar function;
o Provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data for technology development and acquisition.
o Ensures the Information Assurance Program (IAP) evaluates applicable cybersecurity & data privacy controls as part of “business as usual” pre-production testing.
o Operates the Cybersecurity Supply Chain Risk Management (C-SCRM) program to identify and mitigate supply chain-related risks and threats.
• A Project Management Office (PMO), or project management function, enables IAP pre-production testing of cybersecurity & data privacy controls as part of the organization’s established project management processes. | Technology Development & Acquisition (TDA) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to require system developers and integrators to create a Security Test and Evaluation (ST&E) plan and implement the plan under the witness of an independent party. | CC4.2 | null | null | 16.2 | null | 16.2 | 16.2 | DSS06.04
MEA01.05 | Principle 17 | null | SET-04
SET-05
SET-06 | null | null | null | PM-06-08
RQ-15-17.a
RQ-15-17.b
RQ-15-17.c
RQ-15-17.d | null | 10.1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | A-5 | null | SA-11(2) | null | null | null | SA-11(2) | null | null | null | null | SA-11(2) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | PW.2
PW.2.1
RV.1
RV.1.1
RV.1.2
RV.1.3
RV.2
RV.2.1
RV.3
RV.3.1
RV.3.2
RV.3.3
RV.3.4 | null | ID.RA-01
ID.RA-06 | null | 6.6 | 6.2.1
6.2.2
6.2.3
6.2.3.1
6.2.4
6.3.1
6.4.1
6.4.2
11.4.1
11.4.4
12.4.2.1
A1.2.3 | 6.3.1 | 6.2.1
6.2.2
6.2.4
6.3.1
6.4.1
6.4.2
11.4.1
11.4.4 | null | 6.3.1 | 6.2.1
6.2.2
6.2.3.1
6.2.4
6.3.1 | 6.3.1 | 6.2.1
6.2.2
6.2.3
6.2.3.1
6.2.4
6.3.1
6.4.1
6.4.2
11.4.1
11.4.4 | 6.2.1
6.2.2
6.2.3
6.2.3.1
6.2.4
6.3.1
6.4.1
6.4.2
11.4.1
11.4.4
12.4.2.1 | null | I.1.7.7 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | SA-11(2) | null | SA-11(2) | SA-11(2) | null | SA-11(2) | null | SA-11(2) | SA-11(2) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 6.11 | null | null | null | null | null | null | SA-11(2) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | SA-11(2) | null | null | null | 3.6.2(68)
3.6.2(69)
3.6.2(70) | null | null | null | Article 21.4 | null | null | null | null | null | null | null | null | null | null | DEV-02 | null | null | null | 17.13 | null | null | null | null | null | null | null | null | null | null | null | 1-3-2-1 | null | null | 1-5-3-2
1-5-3-4 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 4.7.1 | null | null | null | null | null | null | null | 6.1.6 | null | null | null | null | null | null | null | 2.7 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1 | R-AC-1 | R-AC-2 | R-AC-3 | R-AC-4 | R-AM-1 | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | R-EX-6 | R-EX-7 | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | null | R-IR-1 | R-IR-2 | R-IR-3 | R-IR-4 | R-SA-1 | null | NT-7
MT-1
MT-2
MT-7
MT-8
MT-9
MT-11
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | null | null | MT-7 | MT-8 | MT-9 | null | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Technology Development & Acquisition | Developer-Provided Training | TDA-16 | Mechanisms exist to require the developers of systems, system components or services to provide training on the correct use and operation of the system, system component or service. | null | null | Does the organization require the developers of systems, system components or services to provide training on the correct use and operation of the system, system component or service? | 9 | Protect | null | X | X | There is no evidence of a capability to require the developers of systems, system components or services to provide training on the correct use and operation of the system, system component or service. | Technology Development & Acquisition (TDA) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• IT personnel use an informal process to govern technology development and acquisition.
• Secure development practices loosely conform to industry-recognized standards for secure engineering (e.g., OWASP, NIST SP 800-218, NIST SP 800-160, etc.).
• IT personnel work with data/process owners to help ensure secure practices are implemented throughout the System Development Lifecycle (SDLC) for all high-value projects. | Technology Development & Acquisition (TDA) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Development and acquisition management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for technology development and acquisition management.
• IT/cybersecurity personnel implement secure practices to protect the confidentiality, integrity, availability and safety of the organization’s technology assets, data and network(s).
• Secure development practices mostly conform to industry-recognized standards for secure engineering (e.g., OWASP, NIST SP 800-218, NIST SP 800-160, etc.).
• Procurement practices require third-party developers of systems, system components or services to follow secure engineering practices.
• A Project Management Office (PMO), or project management function, enables the implementation of cybersecurity & data privacy-related resource planning controls across the System Development Lifecycle (SDLC) for all high-value projects.
• Procurement contracts require system developers and integrators to provide training on the correct use and operation of the system, system component or service. | Technology Development & Acquisition (TDA) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Secure development practices conform to industry-recognized standards for secure engineering (e.g., OWASP, NIST SP 800-218, NIST SP 800-160, etc.).
• A procurement team, or similar function, ensures that third party development and/ or acquisitions meet, or exceed, the organization's business, cybersecurity & data privacy requirements to have secure and resilient systems, applications, services and processes.
• A Software Assurance Maturity Model (SAMM) governs a secure development lifecycle for the development of systems, applications and services.
• Administrative processes exist and technologies are configured to implement secure configuration settings by default to reduce the likelihood of software being deployed with weak security settings, putting the asset at a greater risk of compromise.
• An IT Asset Management (ITAM) function, or similar function, categorizes devices according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data.
• A formal Change Management (CM) program help to ensure that no unauthorized changes are made, all changes are documented, services are not disrupted and resources are used efficiently.
• A Governance, Risk & Compliance (GRC) function, or similar function;
o Provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data for technology development and acquisition.
o Ensures the Information Assurance Program (IAP) evaluates applicable cybersecurity & data privacy controls as part of “business as usual” pre-production testing.
o Operates the Cybersecurity Supply Chain Risk Management (C-SCRM) program to identify and mitigate supply chain-related risks and threats.
• A Project Management Office (PMO), or project management function, enables IAP pre-production testing of cybersecurity & data privacy controls as part of the organization’s established project management processes.
• Procurement contracts require system developers and integrators to provide training on the correct use and operation of the system, system component or service. | Technology Development & Acquisition (TDA) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to require the developers of systems, system components or services to provide training on the correct use and operation of the system, system component or service. | null | null | null | 16.1 | null | 16.1 | 16.1 | null | null | null | TRN-01
TRN-02 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | T1078, T1078.001, T1078.003, T1078.004, T1574.002 | null | null | null | null | null | null | null | SA-16 | null | null | SA-16 | SA-16 | null | null | null | SA-16 | null | null | null | null | SA-16 | null | SA-16 | null | null | null | SA-16 | SA-16 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | OTA:SG3.SP1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | SA-16 | null | null | SA-16 | null | SA-16 | null | null | SA-16 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 6.1.5 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1 | R-AC-1 | R-AC-2 | R-AC-3 | R-AC-4 | R-AM-1 | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | R-EX-6 | R-EX-7 | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | null | R-IR-1 | R-IR-2 | R-IR-3 | R-IR-4 | R-SA-1 | null | NT-7
MT-1
MT-2
MT-7
MT-8
MT-9
MT-11
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | null | null | MT-7 | MT-8 | MT-9 | null | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Technology Development & Acquisition | Unsupported Systems | TDA-17 | Mechanisms exist to prevent unsupported systems by:
▪ Replacing systems when support for the components is no longer available from the developer, vendor or manufacturer; and
▪ Requiring justification and documented approval for the continued use of unsupported system components required to satisfy mission/business needs. | null | E-AST-09 | Does the organization prevent unsupported systems by:
▪ Replacing systems when support for the components is no longer available from the developer, vendor or manufacturer; and
▪ Requiring justification and documented approval for the continued use of unsupported system components required to satisfy mission/business needs? | 10 | Protect | null | X | X | There is no evidence of a capability to prevent unsupported systems by:
▪ Replacing systems when support for the components is no longer available from the developer, vendor or manufacturer; and
▪ Requiring justification and documented approval for the continued use of unsupported system components required to satisfy mission/business needs. | SP-CMM1 is N/A, since a structured process is required to prevent unsupported systems by:
▪ Replacing systems when support for the components is no longer available from the developer, vendor or manufacturer; and
▪ Requiring justification and documented approval for the continued use of unsupported system components required to satisfy mission/business needs. | Technology Development & Acquisition (TDA) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Development and acquisition management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for technology development and acquisition management.
• IT/cybersecurity personnel implement secure practices to protect the confidentiality, integrity, availability and safety of the organization’s technology assets, data and network(s).
• Secure development practices mostly conform to industry-recognized standards for secure engineering (e.g., OWASP, NIST SP 800-218, NIST SP 800-160, etc.).
• Procurement practices require third-party developers of systems, system components or services to follow secure engineering practices.
• A Project Management Office (PMO), or project management function, enables the implementation of cybersecurity & data privacy-related resource planning controls across the System Development Lifecycle (SDLC) for all high-value projects.
• An application development team, or similar function, provides in-house support or contract external providers for support with unsupported system components. | Technology Development & Acquisition (TDA) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Secure development practices conform to industry-recognized standards for secure engineering (e.g., OWASP, NIST SP 800-218, NIST SP 800-160, etc.).
• A procurement team, or similar function, ensures that third party development and/ or acquisitions meet, or exceed, the organization's business, cybersecurity & data privacy requirements to have secure and resilient systems, applications, services and processes.
• A Software Assurance Maturity Model (SAMM) governs a secure development lifecycle for the development of systems, applications and services.
• Administrative processes exist and technologies are configured to implement secure configuration settings by default to reduce the likelihood of software being deployed with weak security settings, putting the asset at a greater risk of compromise.
• An IT Asset Management (ITAM) function, or similar function, categorizes devices according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data.
• A formal Change Management (CM) program help to ensure that no unauthorized changes are made, all changes are documented, services are not disrupted and resources are used efficiently.
• A Governance, Risk & Compliance (GRC) function, or similar function;
o Provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data for technology development and acquisition.
o Ensures the Information Assurance Program (IAP) evaluates applicable cybersecurity & data privacy controls as part of “business as usual” pre-production testing.
o Operates the Cybersecurity Supply Chain Risk Management (C-SCRM) program to identify and mitigate supply chain-related risks and threats.
• A Project Management Office (PMO), or project management function, enables IAP pre-production testing of cybersecurity & data privacy controls as part of the organization’s established project management processes.
• An application development team, or similar function, provides in-house support or contract external providers for support with unsupported system components. | Technology Development & Acquisition (TDA) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to prevent unsupported systems by:
▪ Replacing systems when support for the components is no longer available from the developer, vendor or manufacturer; and
▪ Requiring justification and documented approval for the continued use of unsupported system components required to satisfy mission/business needs. | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | T1189, T1195, T1195.001, T1195.002, T1543, T1543.002 | TS-4.2 | null | GOVERN 1.7 | null | null | null | null | SA-22 | null | null | null | SA-22 | null | SA-22 | SA-22 | SA-22 | null | null | SA-22 | SA-22 | SA-22 | null | SA-22 | SA-22 | null | null | SA-22 | SA-22 | null | 3.16.2.a | null | A.03.16.02.a
A.03.16.02.b | null | PW.4
PW.4.1
PW.4.2
PW.4.4 | null | ID.AM-08 | A06:2021 | null | null | null | null | null | null | null | null | null | null | null | D.25
D.26 | 2.2 | null | null | null | null | null | EC:SG3.SP2
TM:SG5.SP1 | null | null | null | null | null | null | null | null | SA-22 | null | null | null | null | null | null | null | null | null | null | null | null | SA-22 | SA-22 | SA-22 | SA-22 | SA-22 | null | null | null | null | null | null | null | null | null | SA-22 | null | null | 8-302 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | SA-22 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 12.23 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Principle 2.7
Principle 6.7 | Principle 2.9
Principle 6.7 | Principle 2.9
Principle 6.8 | null | null | 0304
1501
1704
0304
1501
1753 | null | null | null | null | null | null | null | null | null | null | null | null | null | 12.4.7.C.01 | null | null | null | null | 7.3.1
7.3.2
7.3.3 | null | null | null | null | null | null | null | 4.6
4.9 | null | null | null | null | null | null | null | null | null | null | null | x | Lockton | x | null | R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1 | R-AC-1 | R-AC-2 | R-AC-3 | R-AC-4 | R-AM-1 | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | R-EX-6 | R-EX-7 | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | null | R-IR-1 | R-IR-2 | R-IR-3 | R-IR-4 | R-SA-1 | null | NT-7
MT-1
MT-2
MT-7
MT-8
MT-9
MT-11
MT-12
MT-13
MT-14
MT-15
MT-16 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | null | null | MT-7 | MT-8 | MT-9 | null | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | MT-16 | null |
Technology Development & Acquisition | Alternate Sources for Continued Support | TDA-17.1 | Mechanisms exist to provide in-house support or contract external providers for support with unsupported system components. | null | null | Does the organization provide in-house support or contract external providers for support with unsupported system components? | 8 | Protect | null | X | X | There is no evidence of a capability to provide in-house support or contract external providers for support with unsupported system components. | Technology Development & Acquisition (TDA) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• IT personnel use an informal process to govern technology development and acquisition.
• Secure development practices loosely conform to industry-recognized standards for secure engineering (e.g., OWASP, NIST SP 800-218, NIST SP 800-160, etc.).
• IT personnel work with data/process owners to help ensure secure practices are implemented throughout the System Development Lifecycle (SDLC) for all high-value projects. | Technology Development & Acquisition (TDA) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Development and acquisition management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for technology development and acquisition management.
• IT/cybersecurity personnel implement secure practices to protect the confidentiality, integrity, availability and safety of the organization’s technology assets, data and network(s).
• Secure development practices mostly conform to industry-recognized standards for secure engineering (e.g., OWASP, NIST SP 800-218, NIST SP 800-160, etc.).
• Procurement practices require third-party developers of systems, system components or services to follow secure engineering practices.
• A Project Management Office (PMO), or project management function, enables the implementation of cybersecurity & data privacy-related resource planning controls across the System Development Lifecycle (SDLC) for all high-value projects. | Technology Development & Acquisition (TDA) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Secure development practices conform to industry-recognized standards for secure engineering (e.g., OWASP, NIST SP 800-218, NIST SP 800-160, etc.).
• A procurement team, or similar function, ensures that third party development and/ or acquisitions meet, or exceed, the organization's business, cybersecurity & data privacy requirements to have secure and resilient systems, applications, services and processes.
• A Software Assurance Maturity Model (SAMM) governs a secure development lifecycle for the development of systems, applications and services.
• Administrative processes exist and technologies are configured to implement secure configuration settings by default to reduce the likelihood of software being deployed with weak security settings, putting the asset at a greater risk of compromise.
• An IT Asset Management (ITAM) function, or similar function, categorizes devices according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data.
• A formal Change Management (CM) program help to ensure that no unauthorized changes are made, all changes are documented, services are not disrupted and resources are used efficiently.
• A Governance, Risk & Compliance (GRC) function, or similar function;
o Provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data for technology development and acquisition.
o Ensures the Information Assurance Program (IAP) evaluates applicable cybersecurity & data privacy controls as part of “business as usual” pre-production testing.
o Operates the Cybersecurity Supply Chain Risk Management (C-SCRM) program to identify and mitigate supply chain-related risks and threats.
• A Project Management Office (PMO), or project management function, enables IAP pre-production testing of cybersecurity & data privacy controls as part of the organization’s established project management processes. | Technology Development & Acquisition (TDA) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to provide in-house support or contract external providers for support with unsupported system components. | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | SA-22(1) | null | null | null | SA-22 | null | SA-22 | SA-22 | SA-22 | null | null | SA-22 | SA-22 | SA-22 | null | SA-22 | SA-22 | null | null | SA-22 | SA-22 | null | 3.16.2.b | null | A.03.16.02.a
A.03.16.02.b | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | SA-22 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | SA-22 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 7.4.3 [OP.EXT.3] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | null | R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1 | R-AC-1 | R-AC-2 | R-AC-3 | R-AC-4 | R-AM-1 | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | R-EX-6 | R-EX-7 | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | null | R-IR-1 | R-IR-2 | R-IR-3 | R-IR-4 | R-SA-1 | null | NT-7
MT-1
MT-2
MT-7
MT-8
MT-9
MT-11
MT-12
MT-13
MT-14
MT-15
MT-16 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | null | null | MT-7 | MT-8 | MT-9 | null | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | MT-16 | null |
Technology Development & Acquisition | Input Data Validation | TDA-18 | Mechanisms exist to check the validity of information inputs. | null | null | Does the organization check the validity of information inputs? | 9 | Protect | X | X | X | There is no evidence of a capability to check the validity of information inputs. | SP-CMM1 is N/A, since a structured process is required to check the validity of information inputs. | Technology Development & Acquisition (TDA) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Development and acquisition management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for technology development and acquisition management.
• IT/cybersecurity personnel implement secure practices to protect the confidentiality, integrity, availability and safety of the organization’s technology assets, data and network(s).
• Secure development practices mostly conform to industry-recognized standards for secure engineering (e.g., OWASP, NIST SP 800-218, NIST SP 800-160, etc.).
• Procurement practices require third-party developers of systems, system components or services to follow secure engineering practices.
• A Project Management Office (PMO), or project management function, enables the implementation of cybersecurity & data privacy-related resource planning controls across the System Development Lifecycle (SDLC) for all high-value projects.
• An application development team, or similar function, implements a process to check the validity of information inputs. | Technology Development & Acquisition (TDA) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Secure development practices conform to industry-recognized standards for secure engineering (e.g., OWASP, NIST SP 800-218, NIST SP 800-160, etc.).
• A procurement team, or similar function, ensures that third party development and/ or acquisitions meet, or exceed, the organization's business, cybersecurity & data privacy requirements to have secure and resilient systems, applications, services and processes.
• A Software Assurance Maturity Model (SAMM) governs a secure development lifecycle for the development of systems, applications and services.
• Administrative processes exist and technologies are configured to implement secure configuration settings by default to reduce the likelihood of software being deployed with weak security settings, putting the asset at a greater risk of compromise.
• An IT Asset Management (ITAM) function, or similar function, categorizes devices according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data.
• A formal Change Management (CM) program help to ensure that no unauthorized changes are made, all changes are documented, services are not disrupted and resources are used efficiently.
• A Governance, Risk & Compliance (GRC) function, or similar function;
o Provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data for technology development and acquisition.
o Ensures the Information Assurance Program (IAP) evaluates applicable cybersecurity & data privacy controls as part of “business as usual” pre-production testing.
o Operates the Cybersecurity Supply Chain Risk Management (C-SCRM) program to identify and mitigate supply chain-related risks and threats.
• A Project Management Office (PMO), or project management function, enables IAP pre-production testing of cybersecurity & data privacy controls as part of the organization’s established project management processes.
• An application development team, or similar function, implements a process to check the validity of information inputs. | Technology Development & Acquisition (TDA) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | Technology Development & Acquisition (TDA) efforts are “world-class” capabilities that leverage predictive analysis (e.g., machine learning, AI, etc.). In addition to CMM Level 4 criteria, CMM Level 5 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Stakeholders make time-sensitive decisions to support operational efficiency, which may include automated remediation actions.
▪ Based on predictive analysis, process improvements are implemented according to “continuous improvement” practices that affect process changes. | PI1.2 | PI1.2-POF1
PI1.2-POF2
PI1.2-POF3 | null | null | null | null | null | null | null | null | null | null | null | CR 3.5 (7.7.1) | null | null | null | null | null | null | null | null | null | null | null | null | T1021.002, T1021.005, T1036, T1036.005, T1048, T1048.001, T1048.002, T1048.003, T1059, T1059.001, T1059.002, T1059.003, T1059.004, T1059.005, T1059.006, T1059.007, T1059.008, T1071.004, T1080, T1090, T1090.003, T1095, T1127, T1129, T1176, T1187, T1190, T1197, T1204, T1204.002, T1216, T1216.001, T1218, T1218.001, T1218.002, T1218.003, T1218.004, T1218.005, T1218.008, T1218.009, T1218.010, T1218.011, T1218.012, T1218.013, T1218.014, T1219, T1220, T1221, T1498, T1498.001, T1498.002, T1499, T1499.001, T1499.002, T1499.003, T1499.004, T1530, T1537, T1546.002, T1546.006, T1546.008, T1546.009, T1546.010, T1547.004, T1547.006, T1552, T1552.005, T1553, T1553.001, T1553.003, T1553.005, T1557, T1557.001, T1557.002, T1564.003, T1564.006, T1564.009, T1570, T1572, T1574, T1574.001, T1574.006, T1574.007, T1574.008, T1574.009, T1574.012, T1599, T1599.001, T1602, T1602.001, T1602.002, T1609 | null | null | null | null | null | null | null | SI-10 | null | SI-10 | SI-10 | AC-2
AC-3
AC-5
SI-3
SI-4
SI-5
SI-7
SI-10 | null | AC-2
AC-3
SI-3
SI-4
SI-5 | AC-2
AC-3
AC-5
SI-3
SI-4
SI-5
SI-7
SI-10 | AC-2
AC-3
AC-5
SI-3
SI-4
SI-5
SI-7
SI-10 | null | null | AC-2
AC-3
SI-3
SI-4
SI-5 | AC-2
AC-3
AC-5
SI-3
SI-4
SI-5
SI-7
SI-10 | AC-2
AC-3
AC-5
SI-3
SI-4
SI-5
SI-7
SI-10 | null | AC-2
AC-3
AC-5
SI-3
SI-4
SI-5
SI-7 | AC-2
AC-3
AC-5
SI-3
SI-4
SI-5
SI-7 | AC-2
AC-3
AC-5
SI-3
SI-4
SI-5
SI-7 | SI-4
SI-5
SI-7 | AC-2
AC-3
AC-5
SI-3
SI-4
SI-5
SI-7 | AC-2
AC-3
AC-5
SI-3
SI-4
SI-5
SI-7 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | I.1.16 | null | null | null | null | null | null | null | null | 5.10.4.5 | null | null | null | null | null | null | SI-10 | null | null | null | null | null | null | null | SI-10 | null | SI-10 | SI-10 | null | SI-10 | null | SI-10 | SI-10 | null | null | null | null | null | null | null | null | null | null | AC-2
AC-3
AC-5
SI-3
SI-4
SI-5
SI-7
SI-10 | null | null | null | null | null | null | null | null | null | null | SI-10 | SI-10 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | AC-2
AC-3
AC-5
SI-3
SI-4
SI-5 | null | SI-10 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 17.22 | null | null | null | null | null | null | null | null | null | null | null | null | TPC-60 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 1284 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | null | x | x | R-AC-3
R-AC-4
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-4
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-IR-4
R-SA-1 | null | null | R-AC-3 | R-AC-4 | null | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | null | R-BC-4 | null | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | R-EX-6 | R-EX-7 | R-GV-1 | R-GV-2 | null | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | null | null | null | null | R-IR-4 | R-SA-1 | null | NT-7
MT-1
MT-2
MT-7
MT-8
MT-9
MT-11
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | null | null | MT-7 | MT-8 | MT-9 | null | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Technology Development & Acquisition | Error Handling | TDA-19 | Mechanisms exist to handle error conditions by:
▪ Identifying potentially security-relevant error conditions;
▪ Generating error messages that provide information necessary for corrective actions without revealing sensitive or potentially harmful information in error logs and administrative messages that could be exploited; and
▪ Revealing error messages only to authorized personnel. | null | null | Does the organization handle error conditions by:
▪ Identifying potentially security-relevant error conditions;
▪ Generating error messages that provide information necessary for corrective actions without revealing sensitive or potentially harmful information in error logs and administrative messages that could be exploited; and
▪ Revealing error messages only to authorized personnel? | 9 | Protect | null | X | X | There is no evidence of a capability to handle err or conditions by:
▪ Identifying potentially security-relevant err or conditions;
▪ Generating err or messages that provide information necessary for corrective actions without revealing sensitive or potentially harmful information in err or logs and administrative messages that could be exploited; and
▪ Revealing err or messages only to authorized personnel. | Technology Development & Acquisition (TDA) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• IT personnel use an informal process to govern technology development and acquisition.
• Secure development practices loosely conform to industry-recognized standards for secure engineering (e.g., OWASP, NIST SP 800-218, NIST SP 800-160, etc.).
• IT personnel work with data/process owners to help ensure secure practices are implemented throughout the System Development Lifecycle (SDLC) for all high-value projects. | Technology Development & Acquisition (TDA) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Development and acquisition management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for technology development and acquisition management.
• IT/cybersecurity personnel implement secure practices to protect the confidentiality, integrity, availability and safety of the organization’s technology assets, data and network(s).
• Secure development practices mostly conform to industry-recognized standards for secure engineering (e.g., OWASP, NIST SP 800-218, NIST SP 800-160, etc.).
• Procurement practices require third-party developers of systems, system components or services to follow secure engineering practices.
• A Project Management Office (PMO), or project management function, enables the implementation of cybersecurity & data privacy-related resource planning controls across the System Development Lifecycle (SDLC) for all high-value projects. | Technology Development & Acquisition (TDA) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Secure development practices conform to industry-recognized standards for secure engineering (e.g., OWASP, NIST SP 800-218, NIST SP 800-160, etc.).
• A procurement team, or similar function, ensures that third party development and/ or acquisitions meet, or exceed, the organization's business, cybersecurity & data privacy requirements to have secure and resilient systems, applications, services and processes.
• A Software Assurance Maturity Model (SAMM) governs a secure development lifecycle for the development of systems, applications and services.
• Administrative processes exist and technologies are configured to implement secure configuration settings by default to reduce the likelihood of software being deployed with weak security settings, putting the asset at a greater risk of compromise.
• An IT Asset Management (ITAM) function, or similar function, categorizes devices according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data.
• A formal Change Management (CM) program help to ensure that no unauthorized changes are made, all changes are documented, services are not disrupted and resources are used efficiently.
• A Governance, Risk & Compliance (GRC) function, or similar function;
o Provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data for technology development and acquisition.
o Ensures the Information Assurance Program (IAP) evaluates applicable cybersecurity & data privacy controls as part of “business as usual” pre-production testing.
o Operates the Cybersecurity Supply Chain Risk Management (C-SCRM) program to identify and mitigate supply chain-related risks and threats.
• A Project Management Office (PMO), or project management function, enables IAP pre-production testing of cybersecurity & data privacy controls as part of the organization’s established project management processes. | Technology Development & Acquisition (TDA) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to handle err or conditions by:
▪ Identifying potentially security-relevant err or conditions;
▪ Generating err or messages that provide information necessary for corrective actions without revealing sensitive or potentially harmful information in err or logs and administrative messages that could be exploited; and
▪ Revealing err or messages only to authorized personnel. | null | null | null | null | null | null | null | null | null | null | null | null | null | CR 3.7 (7.9.1) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | SI-11 | null | SI-11 | SI-11 | SI-11 | null | null | SI-11 | SI-11 | null | null | null | SI-11 | SI-11 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 1.1.17 | null | null | null | null | null | null | AM:SG1.SP1
KIM:SG4.SP2 | null | null | null | null | null | null | null | null | SI-11 | null | null | null | null | null | null | null | SI-11 | null | SI-11 | SI-11 | null | SI-11 | null | SI-11 | SI-11 | null | null | null | null | null | null | null | null | null | null | SI-11 | null | null | null | null | null | null | null | null | null | null | SI-11 | SI-11 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | SI-11 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | PSS-04 | null | null | null | 17.23 | null | null | null | null | null | null | null | null | null | null | null | null | TPC-61 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | null | R-AC-3
R-AC-4
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-4
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-IR-4
R-SA-1 | null | null | R-AC-3 | R-AC-4 | null | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | null | R-BC-4 | null | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | R-EX-6 | R-EX-7 | R-GV-1 | R-GV-2 | null | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | null | null | null | null | R-IR-4 | R-SA-1 | null | NT-7
MT-1
MT-2
MT-7
MT-8
MT-9
MT-11
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | null | null | MT-7 | MT-8 | MT-9 | null | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Technology Development & Acquisition | Access to Program Source Code | TDA-20 | Mechanisms exist to limit privileges to change software resident within software libraries. | - Source code escrow | null | Does the organization limit privileges to change software resident within software libraries? | 9 | Protect | null | X | X | There is no evidence of a capability to limit privileges to change software resident within software libraries. | SP-CMM1 is N/A, since a structured process is required to limit privileges to change software resident within software libraries. | Technology Development & Acquisition (TDA) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Development and acquisition management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for technology development and acquisition management.
• IT/cybersecurity personnel implement secure practices to protect the confidentiality, integrity, availability and safety of the organization’s technology assets, data and network(s).
• Secure development practices mostly conform to industry-recognized standards for secure engineering (e.g., OWASP, NIST SP 800-218, NIST SP 800-160, etc.).
• Procurement practices require third-party developers of systems, system components or services to follow secure engineering practices.
• A Project Management Office (PMO), or project management function, enables the implementation of cybersecurity & data privacy-related resource planning controls across the System Development Lifecycle (SDLC) for all high-value projects. | Technology Development & Acquisition (TDA) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Secure development practices conform to industry-recognized standards for secure engineering (e.g., OWASP, NIST SP 800-218, NIST SP 800-160, etc.).
• A procurement team, or similar function, ensures that third party development and/ or acquisitions meet, or exceed, the organization's business, cybersecurity & data privacy requirements to have secure and resilient systems, applications, services and processes.
• A Software Assurance Maturity Model (SAMM) governs a secure development lifecycle for the development of systems, applications and services.
• Administrative processes exist and technologies are configured to implement secure configuration settings by default to reduce the likelihood of software being deployed with weak security settings, putting the asset at a greater risk of compromise.
• An IT Asset Management (ITAM) function, or similar function, categorizes devices according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data.
• A formal Change Management (CM) program help to ensure that no unauthorized changes are made, all changes are documented, services are not disrupted and resources are used efficiently.
• A Governance, Risk & Compliance (GRC) function, or similar function;
o Provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data for technology development and acquisition.
o Ensures the Information Assurance Program (IAP) evaluates applicable cybersecurity & data privacy controls as part of “business as usual” pre-production testing.
o Operates the Cybersecurity Supply Chain Risk Management (C-SCRM) program to identify and mitigate supply chain-related risks and threats.
• A Project Management Office (PMO), or project management function, enables IAP pre-production testing of cybersecurity & data privacy controls as part of the organization’s established project management processes. | Technology Development & Acquisition (TDA) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to limit privileges to change software resident within software libraries. | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 9.4.5
14.2.4 | 8.4
8.30 | 9.4.5
14.2.4 | null | 6.6.4.5 | null | null | null | null | TS-1.14 | null | null | null | PS.1
PS.1.1 | null | null | null | null | null | null | SA-4(2) | null | null | SA-4(2) | SA-4(2) | null | null | null | SA-4(2) | SA-4(2) | null | null | null | null | null | null | null | null | null | null | null | null | PS.1
PS.1.1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | I.2.5 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 3.6.2(73) | null | null | null | null | null | null | null | null | null | null | null | null | null | 7.9 | DEV-07 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 1422
1816 | null | null | null | null | null | null | null | null | null | null | 9.4.5
14.2.4 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | null | null | x | R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1 | R-AC-1 | R-AC-2 | R-AC-3 | R-AC-4 | R-AM-1 | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | R-EX-6 | R-EX-7 | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | null | R-IR-1 | R-IR-2 | R-IR-3 | R-IR-4 | R-SA-1 | null | NT-7
MT-1
MT-2
MT-7
MT-8
MT-9
MT-11
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | null | null | MT-7 | MT-8 | MT-9 | null | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |