SCF Domain
stringclasses
34 values
SCF Control
stringlengths
7
85
SCF #
stringlengths
6
9
Secure Controls Framework (SCF) Control Description
stringlengths
49
657
Methods To Comply With SCF Controls
stringlengths
6
863
Evidence Request List (ERL) #
stringclasses
181 values
SCF Control Question
stringlengths
51
659
Relative Control Weighting
int64
1
10
Function Grouping
stringclasses
5 values
SCRM Tier 1 Strategic
stringclasses
2 values
SCRM Tier 2 Operational
stringclasses
2 values
SCRM Tier 3 Tactical
stringclasses
2 values
SP-CMM 0 Not Performed
stringlengths
69
677
SP-CMM 1 Performed Informally
stringlengths
43
2.02k
SP-CMM 2 Planned & Tracked
stringlengths
43
3.33k
SP-CMM 3 Well Defined
stringlengths
43
5.16k
SP-CMM 4 Quantitatively Controlled
stringlengths
43
1.35k
SP-CMM 5 Continuously Improving
stringlengths
43
725
AICPA TSC 2017 (Controls)
stringclasses
116 values
AICPA TSC 2017 (Points of Focus)
stringclasses
171 values
BSI Standard 200-1
stringclasses
18 values
CIS CSC v8.0
stringclasses
158 values
CIS CSC v8.0 IG1
stringclasses
57 values
CIS CSC v8.0 IG2
stringclasses
136 values
CIS CSC v8.0 IG3
stringclasses
154 values
COBIT 2019
stringclasses
101 values
COSO v2017
stringclasses
45 values
CSA CCM v4
stringclasses
229 values
CSA IoT SCF v2
stringclasses
168 values
ENISA v2.0
stringclasses
33 values
GAPP
stringclasses
36 values
IEC 62443-4-2
stringclasses
104 values
ISO/SAE 21434 v2021
stringclasses
69 values
ISO 22301 v2019
stringclasses
25 values
ISO 27001 v2013
stringclasses
30 values
ISO 27001 v2022
stringclasses
35 values
ISO 27002 v2013
stringclasses
142 values
ISO 27002 v2022
stringclasses
166 values
ISO 27017 v2015
stringclasses
158 values
ISO 27018 v2014
stringclasses
16 values
ISO 27701 v2019
stringclasses
161 values
ISO 29100 v2011
stringclasses
15 values
ISO 31000 v2009
stringclasses
7 values
ISO 31010 v2009
stringclasses
16 values
MITRE ATT&CK 10
stringclasses
100 values
MPA Content Security Program v5.1
stringclasses
98 values
NIAC Insurance Data Security Model Law (MDL-668)
stringclasses
41 values
NIST AI RMF AI 100-1 v1.0
stringclasses
114 values
NIST Privacy Framework v1.0
stringclasses
114 values
NIST SSDF
stringclasses
29 values
NIST 800-37 rev 2
stringclasses
32 values
NIST 800-39
stringclasses
9 values
NIST 800-53 rev4
stringlengths
4
47
NIST 800-53 rev4 (low)
stringclasses
121 values
NIST 800-53 rev4 (moderate)
stringlengths
4
22
NIST 800-53 rev4 (high)
stringlengths
4
23
NIST 800-53 rev5
stringlengths
4
99
NIST 800-53B rev5 (privacy)
stringclasses
85 values
NIST 800-53B rev5 (low)
stringclasses
151 values
NIST 800-53B rev5 (moderate)
stringlengths
4
40
NIST 800-53B rev5 (high)
stringlengths
4
40
NIST 800-53 rev5 (NOC)
stringlengths
4
41
NIST 800-63B (partial mapping)
stringclasses
5 values
NIST 800-82 rev3 LOW OT Overlay
stringclasses
162 values
NIST 800-82 rev3 MODERATE OT Overlay
stringlengths
4
40
NIST 800-82 rev3 HIGH OT Overlay
stringlengths
4
40
NIST 800-160
stringclasses
23 values
NIST 800-161 rev 1
stringlengths
4
34
NIST 800-161 rev 1 C-SCRM Baseline
stringclasses
95 values
NIST 800-161 rev 1 Flow Down
stringclasses
71 values
NIST 800-161 rev 1 Level 1
stringclasses
69 values
NIST 800-161 rev 1 Level 2
stringclasses
218 values
NIST 800-161 rev 1 Level 3
stringclasses
234 values
NIST 800-171 rev 2
stringclasses
172 values
NIST 800-171 rev 3 FPD
stringlengths
5
141
NIST 800-171A
stringclasses
114 values
NIST 800-171A rev 3 IPD
stringclasses
167 values
NIST 800-172
stringclasses
46 values
NIST 800-218 v1.1
stringclasses
29 values
NIST CSF v1.1
stringclasses
97 values
NIST CSF v2.0 IPD
stringclasses
127 values
OWASP Top 10 v2021
stringclasses
20 values
PCIDSS v3.2
stringclasses
135 values
PCIDSS v4.0
stringlengths
3
156
PCIDSS v4.0 SAQ A
stringclasses
30 values
PCIDSS v4.0 SAQ A-EP
stringclasses
141 values
PCIDSS v4.0 SAQ B
stringclasses
26 values
PCIDSS v4.0 SAQ B-IP
stringclasses
55 values
PCIDSS v4.0 SAQ C
stringclasses
132 values
PCIDSS v4.0 SAQ C-VT
stringclasses
53 values
PCIDSS v4.0 SAQ D Merchant
stringclasses
213 values
PCIDSS v4.0 SAQ D Service Provider
stringclasses
231 values
PCIDSS v4.0 SAQ P2PE
stringclasses
24 values
Shared Assessments SIG 2023
stringlengths
3
43
SWIFT CSF v2023
stringclasses
55 values
TISAX ISA v5.1.0
stringclasses
88 values
UL 2900-1
stringclasses
36 values
UN R155
stringclasses
19 values
UN ECE WP.29
stringclasses
19 values
US C2M2 v2.1
stringclasses
152 values
US CERT RMM v1.2
stringclasses
212 values
US CISA CPG v2022
stringclasses
44 values
US CJIS Security Policy 5.9
stringclasses
99 values
US CMMC 2.0 Level 1
stringclasses
17 values
US CMMC 2.0 Level 2
stringclasses
110 values
US CMMC 2.0 Level 3
stringclasses
139 values
US CMMC 2.1 (draft) Level 1
stringclasses
18 values
US CMMC 2.1 (draft) Level 2
stringclasses
110 values
US CMMC 2.1 (draft) Level 3
stringclasses
141 values
US CMS MARS-E v2.0
stringlengths
4
28
US COPPA
float64
6.5k
6.5k
US DFARS Cybersecurity 252.204-70xx
stringclasses
19 values
US FACTA
stringclasses
2 values
US FAR 52.204-21
stringclasses
22 values
US FAR 52.204-27
stringclasses
2 values
US FAR Section 889
stringclasses
1 value
US FDA 21 CFR Part 11
stringclasses
27 values
US FedRAMP R4
stringlengths
4
24
US FedRAMP R4 (low)
stringclasses
130 values
US FedRAMP R4 (moderate)
stringlengths
4
23
US FedRAMP R4 (high)
stringlengths
4
24
US FedRAMP R4 (LI-SaaS)
stringclasses
131 values
US FedRAMP R5
stringlengths
4
24
US FedRAMP R5 (low)
stringclasses
151 values
US FedRAMP R5 (moderate)
stringlengths
4
23
US FedRAMP R5 (high)
stringlengths
4
24
US FedRAMP R5 (LI-SaaS)
stringclasses
151 values
US FERPA
stringclasses
3 values
US FFIEC
stringclasses
68 values
US FINRA
stringclasses
3 values
US FTC Act
stringclasses
1 value
US GLBA CFR 314
stringclasses
41 values
US HIPAA
stringclasses
54 values
HIPAA - HICP Small Practice
stringclasses
31 values
HIPAA - HICP Medium Practice
stringclasses
59 values
HIPAA - HICP Large Practice
stringclasses
112 values
US IRS 1075
stringlengths
3
165
US ITAR Part 120 (limited)
stringclasses
9 values
US NERC CIP
stringclasses
35 values
US NISPOM
stringclasses
72 values
US NNPI (unclass)
stringclasses
61 values
US NSTC NSPM-33
stringclasses
15 values
US Privacy Shield
stringclasses
7 values
US SEC Cybersecurity Rule
stringclasses
12 values
US SOX
stringclasses
1 value
US SSA EIESR v8.0
stringclasses
22 values
US StateRAMP Low Category 1
stringclasses
107 values
US StateRAMP Low+ Category 2
stringclasses
167 values
US StateRAMP Moderate Category 3
stringlengths
4
24
US TSA / DHS 1580/82-2022-01
stringclasses
43 values
US - AK PIPA
stringclasses
8 values
US - CA SB327
stringclasses
4 values
US-CA CPRA (Nov 2022)
stringclasses
36 values
US - CA SB1386
stringclasses
1 value
US - CO Colorado Privacy Act
stringclasses
36 values
US - IL BIPA
stringclasses
9 values
US - IL IPA
stringclasses
4 values
US - IL PIPA
stringclasses
6 values
US-MA 201 CMR 17.00
stringclasses
27 values
US - NV SB220
stringclasses
3 values
US - NY DFS 23 NYCRR500
float64
500
500
US - NY SHIELD Act S5575B
stringclasses
15 values
US - OR 646A
stringclasses
21 values
US - SC Insurance Data Security Act
stringclasses
41 values
US - TX BC521
stringclasses
3 values
US-TX Cybersecurity Act
stringclasses
13 values
US-TX DIR Control Standards 2.0
stringclasses
155 values
US-TX TX-RAMP Level 1
stringclasses
120 values
US-TX TX-RAMP Level 2
stringlengths
4
23
US-TX SB820
stringclasses
5 values
US-VA CDPA 2023
stringclasses
24 values
US-VT Act 171 of 2018
stringclasses
32 values
EMEA EU EBA GL/2019/04
stringclasses
93 values
EMEA EU DORA
stringclasses
60 values
EMEA EU ePrivacy (draft)
stringclasses
15 values
EMEA EU GDPR
stringclasses
57 values
EMEA EU NIS2
stringclasses
21 values
EMEA EU PSD2
stringclasses
10 values
EMEA EU EU-US Data Privacy Framework
stringclasses
23 values
EMEA Austria
stringclasses
10 values
EMEA Belgium
stringclasses
9 values
EMEA Czech Republic
stringclasses
14 values
EMEA Denmark
stringclasses
11 values
EMEA Finland
stringclasses
7 values
EMEA France
stringclasses
9 values
EMEA Germany
stringclasses
11 values
EMEA Germany Banking Supervisory Requirements for IT (BAIT)
stringclasses
57 values
EMEA Germany C5-2020
stringclasses
152 values
EMEA Greece
stringclasses
9 values
EMEA Hungary
stringclasses
12 values
EMEA Ireland
stringclasses
3 values
EMEA Israel CDMO v1.0
stringlengths
3
89
EMEA Israel
stringclasses
6 values
EMEA Italy
stringclasses
15 values
EMEA Kenya DPA 2019
stringclasses
38 values
EMEA Luxembourg
stringclasses
4 values
EMEA Netherlands
stringclasses
12 values
EMEA Nigeria DPR 2019
stringclasses
24 values
EMEA Norway
stringclasses
12 values
EMEA Poland
stringclasses
11 values
EMEA Portugal
stringclasses
11 values
EMEA Qatar PDPPL
stringclasses
37 values
EMEA Russia
stringclasses
13 values
EMEA Saudi Arabia Critical Security Controls
stringclasses
105 values
EMEA Saudi Arabia SACS-002
stringclasses
96 values
EMEA Saudi Arabia SAMA CSFv1.0
stringclasses
36 values
EMEA Saudi Arabia ECC-12018
stringclasses
148 values
EMEA Saudi Arabia OTCC-1 2022
stringclasses
133 values
EMEA Serbia 87/2018
stringclasses
46 values
EMEA Slovak Republic
stringclasses
2 values
EMEA South Africa
stringclasses
45 values
EMEA Spain
stringclasses
10 values
EMEA Spain CCN-STIC 825
stringclasses
71 values
EMEA Sweden
stringclasses
11 values
EMEA Switzerland
stringclasses
8 values
EMEA Turkey
stringclasses
8 values
EMEA UAE
stringclasses
9 values
EMEA UK CAF v3.1
stringclasses
75 values
EMEA UK CAP 1850
stringclasses
16 values
EMEA UK Cyber Essentials
float64
1
5
EMEA UK DPA
stringclasses
7 values
EMEA UK GDPR
stringclasses
38 values
APAC Australia Essential 8 ML 1
stringclasses
21 values
APAC Australia Essential 8 ML 2
stringclasses
30 values
APAC Australia Essential 8 ML 3
stringclasses
40 values
APAC Australia Privacy Act
stringclasses
11 values
APAC Australian Privacy Principles
stringclasses
18 values
APAC Australia ISM 2022
stringlengths
4
214
APAC Australia IoT Code of Practice
stringclasses
11 values
APAC Australia Prudential Standard CPS230
stringclasses
32 values
APAC Australia Prudential Standard CPS234
stringclasses
34 values
APAC China Data Security Law (DSL)
stringclasses
6 values
APAC China DNSIP
stringclasses
3 values
APAC China Privacy Law
stringclasses
57 values
APAC Hong Kong
stringclasses
8 values
APAC India ITR
stringclasses
4 values
APAC Indonesia
stringclasses
7 values
APAC Japan APPI
stringclasses
31 values
APAC Japan ISMAP
stringclasses
188 values
APAC Malaysia
stringclasses
8 values
APAC New Zealand Health ISF
stringclasses
22 values
APAC New Zealand NZISM 3.6
stringlengths
10
1.15k
APAC New Zealand Privacy Act of 2020
stringclasses
12 values
APAC Philippines
stringclasses
12 values
APAC Singapore
stringclasses
15 values
APAC Singapore Cyber Hygiene Practice
stringclasses
12 values
APAC Singapore MAS TRM 2021
stringclasses
166 values
APAC South Korea
stringclasses
22 values
APAC Taiwan
stringclasses
7 values
Americas Argentina
stringclasses
14 values
Americas Argentina Reg 132-2018
stringclasses
24 values
Americas Bahamas
stringclasses
6 values
Americas Bermuda BMACCC
stringclasses
36 values
Americas Brazil LGPD
stringclasses
27 values
Americas Canada CSAG
stringclasses
75 values
Americas Canada OSFI B-13
stringclasses
60 values
Americas Canada PIPEDA
stringclasses
14 values
Americas Chile
stringclasses
9 values
Americas Colombia
stringclasses
10 values
Americas Costa Rica
stringclasses
8 values
Americas Mexico
stringclasses
14 values
Americas Peru
stringclasses
14 values
Americas Uruguay
stringclasses
17 values
Minimum Security Requirements MCR + DSR
float64
Identify Minimum Compliance Requirements (MCR)
float64
Identify Discretionary Security Requirements (DSR)
float64
SCF-B Business Mergers & Acquisitions
stringclasses
1 value
SCF-I Cyber Insurance Duty of Care
stringclasses
23 values
SCF-E Embedded Technology
stringclasses
1 value
SCF-R Ransomware Protection
stringclasses
1 value
Risk Threat Summary
stringlengths
13
230
Risk R-AC-1
stringclasses
1 value
Risk R-AC-2
stringclasses
1 value
Risk R-AC-3
stringclasses
1 value
Risk R-AC-4
stringclasses
1 value
Risk R-AM-1
stringclasses
1 value
Risk R-AM-2
stringclasses
2 values
Risk R-AM-3
stringclasses
1 value
Risk R-BC-1
stringclasses
2 values
Risk R-BC-2
stringclasses
2 values
Risk R-BC-3
stringclasses
2 values
Risk R-BC-4
stringclasses
2 values
Risk R-BC-5
stringclasses
2 values
Risk R-EX-1
stringclasses
2 values
Risk R-EX-2
stringclasses
2 values
Risk R-EX-3
stringclasses
2 values
Risk R-EX-4
stringclasses
2 values
Risk R-EX-5
stringclasses
2 values
Risk R-EX-6
stringclasses
2 values
Risk R-EX-7
stringclasses
2 values
Risk R-GV-1
stringclasses
2 values
Risk R-GV-2
stringclasses
2 values
Risk R-GV-3
stringclasses
2 values
Risk R-GV-4
stringclasses
2 values
Risk R-GV-5
stringclasses
2 values
Risk R-GV-6
stringclasses
2 values
Risk R-GV-7
stringclasses
2 values
Risk R-GV-8
stringclasses
2 values
Risk R-IR-1
stringclasses
2 values
Risk R-IR-2
stringclasses
2 values
Risk R-IR-3
stringclasses
2 values
Risk R-IR-4
stringclasses
1 value
Risk R-SA-1
stringclasses
2 values
Risk R-SA-2
stringclasses
2 values
Control Threat Summary
stringclasses
69 values
Threat NT-1
stringclasses
1 value
Threat NT-2
stringclasses
1 value
Threat NT-3
stringclasses
1 value
Threat NT-4
stringclasses
1 value
Threat NT-5
stringclasses
1 value
Threat NT-6
stringclasses
1 value
Threat NT-7
stringclasses
1 value
Threat NT-8
stringclasses
1 value
Threat NT-9
stringclasses
1 value
Threat NT-10
stringclasses
1 value
Threat NT-11
stringclasses
1 value
Threat NT-12
stringclasses
1 value
Threat NT-13
stringclasses
1 value
Threat NT-14
stringclasses
1 value
Threat MT-1
stringclasses
1 value
Threat MT-2
stringclasses
1 value
Threat MT-3
stringclasses
1 value
Threat MT-4
stringclasses
1 value
Threat MT-5
stringclasses
1 value
Threat MT-6
stringclasses
1 value
Threat MT-7
stringclasses
1 value
Threat MT-8
stringclasses
1 value
Threat MT-9
stringclasses
1 value
Threat MT-10
stringclasses
1 value
Threat MT-11
stringclasses
1 value
Threat MT-12
stringclasses
1 value
Threat MT-13
stringclasses
1 value
Threat MT-14
stringclasses
1 value
Threat MT-15
stringclasses
1 value
Threat MT-16
stringclasses
1 value
Errata 2023.4
stringclasses
30 values
Technology Development & Acquisition
Software Release Integrity Verification
TDA-20.1
Mechanisms exist to publish integrity verification information for software releases.
null
null
Does the organization publish integrity verification information for software releases?
6
Protect
null
X
X
There is no evidence of a capability to publish integrity verification information for software releases.
SP-CMM1 is N/A, since a structured process is required to publish integrity verification information for software releases.
SP-CMM2 is N/A, since a well-defined process is required to publish integrity verification information for software releases.
Technology Development & Acquisition (TDA) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Secure development practices conform to industry-recognized standards for secure engineering (e.g., OWASP, NIST SP 800-218, NIST SP 800-160, etc.). • A procurement team, or similar function, ensures that third party development and/ or acquisitions meet, or exceed, the organization's business, cybersecurity & data privacy requirements to have secure and resilient systems, applications, services and processes. • A Software Assurance Maturity Model (SAMM) governs a secure development lifecycle for the development of systems, applications and services. • Administrative processes exist and technologies are configured to implement secure configuration settings by default to reduce the likelihood of software being deployed with weak security settings, putting the asset at a greater risk of compromise. • An IT Asset Management (ITAM) function, or similar function, categorizes devices according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data. • A formal Change Management (CM) program help to ensure that no unauthorized changes are made, all changes are documented, services are not disrupted and resources are used efficiently. • A Governance, Risk & Compliance (GRC) function, or similar function; o Provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data for technology development and acquisition. o Ensures the Information Assurance Program (IAP) evaluates applicable cybersecurity & data privacy controls as part of “business as usual” pre-production testing. o Operates the Cybersecurity Supply Chain Risk Management (C-SCRM) program to identify and mitigate supply chain-related risks and threats. • A Project Management Office (PMO), or project management function, enables IAP pre-production testing of cybersecurity & data privacy controls as part of the organization’s established project management processes.
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to publish integrity verification information for software releases.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to publish integrity verification information for software releases.
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
PS.2 PS.2.1
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
PS.2 PS.2.1
null
null
null
null
null
null
null
null
null
null
null
null
null
null
I.2.5.7
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
R-AM-3 R-BC-2 R-BC-3 R-BC-4 R-GV-1 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-IR-1 R-IR-4
null
null
null
null
null
null
R-AM-3
null
R-BC-2
R-BC-3
R-BC-4
null
null
null
null
null
null
null
null
R-GV-1
null
null
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
R-IR-1
null
null
R-IR-4
null
null
NT-2 NT-3 NT-4 NT-5 NT-6 NT-7 NT-11 NT-12 NT-13 MT-1 MT-2 MT-5 MT-6 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15
null
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
null
null
null
NT-11
NT-12
NT-13
null
MT-1
MT-2
null
null
MT-5
MT-6
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Technology Development & Acquisition
Archiving Software Releases
TDA-20.2
Mechanisms exist to archive software releases and all of their components (e.g., code, package files, third-party libraries, documentation) to maintain integrity verification information.
null
null
Does the organization archive software releases and all of their components (e?g?, code, package files, third-party libraries, documentation) to maintain integrity verification information?
8
Protect
null
X
X
There is no evidence of a capability to archive software releases and all of their components (e.g., code, package files, third-party libraries, documentation) to maintain integrity verification information.
SP-CMM1 is N/A, since a structured process is required to archive software releases and all of their components (e.g., code, package files, third-party libraries, documentation) to maintain integrity verification information.
SP-CMM2 is N/A, since a well-defined process is required to archive software releases and all of their components (e.g., code, package files, third-party libraries, documentation) to maintain integrity verification information.
Technology Development & Acquisition (TDA) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Secure development practices conform to industry-recognized standards for secure engineering (e.g., OWASP, NIST SP 800-218, NIST SP 800-160, etc.). • A procurement team, or similar function, ensures that third party development and/ or acquisitions meet, or exceed, the organization's business, cybersecurity & data privacy requirements to have secure and resilient systems, applications, services and processes. • A Software Assurance Maturity Model (SAMM) governs a secure development lifecycle for the development of systems, applications and services. • Administrative processes exist and technologies are configured to implement secure configuration settings by default to reduce the likelihood of software being deployed with weak security settings, putting the asset at a greater risk of compromise. • An IT Asset Management (ITAM) function, or similar function, categorizes devices according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data. • A formal Change Management (CM) program help to ensure that no unauthorized changes are made, all changes are documented, services are not disrupted and resources are used efficiently. • A Governance, Risk & Compliance (GRC) function, or similar function; o Provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data for technology development and acquisition. o Ensures the Information Assurance Program (IAP) evaluates applicable cybersecurity & data privacy controls as part of “business as usual” pre-production testing. o Operates the Cybersecurity Supply Chain Risk Management (C-SCRM) program to identify and mitigate supply chain-related risks and threats. • A Project Management Office (PMO), or project management function, enables IAP pre-production testing of cybersecurity & data privacy controls as part of the organization’s established project management processes. • Administrative processes exist and technologies are configured to archive software releases and all of its components (e.g., code, package files, third-party libraries, documentation) and maintain integrity verification information.
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to archive software releases and all of their components (e.g., code, package files, third-party libraries, documentation) to maintain integrity verification information.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to archive software releases and all of their components (e.g., code, package files, third-party libraries, documentation) to maintain integrity verification information.
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
PS.3 PS.3.1
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
PS.3 PS.3.1 PS.3.2
null
null
null
null
null
null
null
null
null
null
null
null
null
null
1.2.5.9
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
R-AM-3 R-BC-2 R-BC-3 R-BC-4 R-GV-1 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-IR-1 R-IR-4
null
null
null
null
null
null
R-AM-3
null
R-BC-2
R-BC-3
R-BC-4
null
null
null
null
null
null
null
null
R-GV-1
null
null
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
R-IR-1
null
null
R-IR-4
null
null
NT-2 NT-3 NT-4 NT-5 NT-6 NT-7 NT-11 NT-12 NT-13 MT-1 MT-2 MT-5 MT-6 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15
null
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
null
null
null
NT-11
NT-12
NT-13
null
MT-1
MT-2
null
null
MT-5
MT-6
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Technology Development & Acquisition
Software Escrow
TDA-20.3
Mechanisms exist to escrow source code and supporting documentation to ensure software availability in the event the software provider goes out of business or is unable to provide support.
null
E-TDA-13
Does the organization escrow source code and supporting documentation to ensure software availability in the event the software provider goes out of business or is unable to provide support?
7
Protect
X
X
X
There is no evidence of a capability to escrow source code and supporting documentation to ensure software availability in the event the software provider goes out of business or is unable to provide support.
SP-CMM1 is N/A, since a structured process is required to escrow source code and supporting documentation to ensure software availability in the event the software provider goes out of business or is unable to provide support.
SP-CMM2 is N/A, since a well-defined process is required to escrow source code and supporting documentation to ensure software availability in the event the software provider goes out of business or is unable to provide support.
Technology Development & Acquisition (TDA) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Secure development practices conform to industry-recognized standards for secure engineering (e.g., OWASP, NIST SP 800-218, NIST SP 800-160, etc.). • A procurement team, or similar function, ensures that third party development and/ or acquisitions meet, or exceed, the organization's business, cybersecurity & data privacy requirements to have secure and resilient systems, applications, services and processes. • A Software Assurance Maturity Model (SAMM) governs a secure development lifecycle for the development of systems, applications and services. • Administrative processes exist and technologies are configured to implement secure configuration settings by default to reduce the likelihood of software being deployed with weak security settings, putting the asset at a greater risk of compromise. • An IT Asset Management (ITAM) function, or similar function, categorizes devices according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data. • A formal Change Management (CM) program help to ensure that no unauthorized changes are made, all changes are documented, services are not disrupted and resources are used efficiently. • A Governance, Risk & Compliance (GRC) function, or similar function; o Provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data for technology development and acquisition. o Ensures the Information Assurance Program (IAP) evaluates applicable cybersecurity & data privacy controls as part of “business as usual” pre-production testing. o Operates the Cybersecurity Supply Chain Risk Management (C-SCRM) program to identify and mitigate supply chain-related risks and threats. • A Project Management Office (PMO), or project management function, enables IAP pre-production testing of cybersecurity & data privacy controls as part of the organization’s established project management processes. • The process owner contracts a reputable third-party escrow agent to provide source code and supporting documentation to ensure software availability in the event the software provider goes out of business or is unable to provide support.
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to escrow source code and supporting documentation to ensure software availability in the event the software provider goes out of business or is unable to provide support.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to escrow source code and supporting documentation to ensure software availability in the event the software provider goes out of business or is unable to provide support.
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
TS-1.14
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
1-3-2-2
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
5.3.4
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
R-AM-3 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-GV-1 R-IR-1 R-IR-2 R-IR-3 R-IR-4
null
null
null
null
null
null
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
null
null
null
null
null
null
null
R-GV-1
null
null
null
null
null
null
null
R-IR-1
R-IR-2
R-IR-3
R-IR-4
null
null
MT-8 MT-9 MT-10 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Third-Party Management
Third-Party Management
TPM-01
Mechanisms exist to facilitate the implementation of third-party management controls.
- Procurement program - Contract reviews
E-TPM-03
Does the organization facilitate the implementation of third-party management controls?
10
Identify
X
X
X
There is no evidence of a capability to facilitate the implementation of third-party management controls.
Third-Party Management (TPM) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Third-party management is decentralized. • IT personnel use an informal process to govern third-party service providers. • IT personnel work with data/process owners to help ensure secure practices are implemented throughout the System Development Lifecycle (SDLC) for all high-value projects. • Project management is decentralized and generally lacks formal project management managers or broader oversight.
Third-Party Management (TPM) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Third-party management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for third-party management. • A procurement function maintains a list of all active Third-Party Service Providers (TSP), including pertinent contract information that will assist in a risk assessment. • A Shared Responsibility Matrix (SRM) is documented for every TSP that directly or indirectly affects sensitive/regulated data. • Procurement contracts: o Require TSP to follow secure engineering practices as part of a broader Cybersecurity Supply Chain Risk Management (C-SCRM) initiative. o Contain "break clauses" in all TSP contracts to enable penalty-free, early termination of a contract for cause, based on the TSP's cybersecurity and/ or data privacy practices deficiency(ies).
Third-Party Management (TPM) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • The Chief Information Security Officer (CISO), or similar function, analyzes the organization’s business strategy to determine prioritized and authoritative guidance for third-party management practices. • The CISO, or similar function, develops a security-focused Concept of Operations (CONOPS) that documents management, operational and technical measures to apply defense-in-depth techniques across the enterprise for third-party management. • A steering committee is formally established to provide executive oversight of the cybersecurity & data privacy program, including third-party management. • Procurement contracts and layered defenses provide safeguards to limit harm from potential adversaries who identify and target the organization's supply chain. • A Governance, Risk & Compliance (GRC) function, or similar function; o provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data with regards to third-party management. o Operates the Cybersecurity Supply Chain Risk Management (C-SCRM) program to identify and mitigate supply chain-related risks and threats. o Evaluates risks associated with weaknesses or deficiencies in supply chain elements identified during first and/ or third-party reviews. o Enables the implementation of third-party management controls. o Ensures the Information Assurance Program (IAP) evaluates applicable cybersecurity & data privacy controls as part of “business as usual” pre-production testing. • A procurement team, or similar function: o Maintains a list of all active Third-Party Service Providers (TSP), including pertinent contract information that will assist in a risk assessment. o Requires TSP to follow secure engineering practices as part of a broader Cybersecurity Supply Chain Risk Management (C-SCRM) initiative. o Includes "break clauses" in all TSP contracts to enable penalty-free, early termination of a contract for cause, based on the TSP's cybersecurity and/ or data privacy practices deficiency(ies). o Controls changes to services by suppliers, taking into account the criticality of business information, systems and processes that are in scope by the third-party. o Requires a risk assessment prior to the acquisition or outsourcing of technology-related services. o Monitors, regularly reviews and audits supplier service delivery for compliance with established contract agreements. o Uses tailored acquisition strategies, contract tools and procurement methods for the purchase of unique systems, system components or services. • A Shared Responsibility Matrix (SRM) is documented for every TSP that directly or indirectly affects sensitive/regulated data.
Third-Party Management (TPM) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to facilitate the implementation of third-party management controls.
CC3.3 CC9.1
CC1.1-POF5 CC1.4-POF2 CC1.4-POF3 CC2.3-POF9 CC2.3-POF10 CC9.2-POF1 CC9.2-POF2 CC9.2-POF3 CC9.2-POF4 CC9.2-POF5 CC9.2-POF6 CC9.2-POF7 CC9.2-POF8 CC9.2-POF9 CC9.2-POF10 CC9.2-POF11 CC9.2-POF12
null
15.0 15.2
null
15.2
15.2
APO10.01 APO10.02 APO10.03 APO10.04 APO10.05 DSS01.02
Principle 8
IAM-11 SEF-02 STA-01 STA-02 STA-03 STA-07 STA-12 STA-13 UEM-14
POL-01 POL-02
SO4
null
CR 3.12 (7.14)
RQ-06-10 RQ-07-01
null
null
null
15.1.1
5.19 5.20 8.30
15.1.1
null
6.12 6.12.1 6.12.1.1
null
null
null
null
OR-3.4
Sec 4(F)(1)
MANAGE 3.0
GV.PO-P4
PW.3 PW.3.1
null
null
SA-4
SA-4
SA-4
SA-4
SA-4 SR-1
SA-4
SA-4 SR-1
SA-4 SR-1
SA-4 SR-1
null
null
SA-4 SR-1
SA-4 SR-1
SA-4 SR-1
null
SA-4 SR-1
SA-4 SR-1
null
SA-4 SR-1
SA-4 SR-1
SA-4 SR-1
NFO - SA-4
3.1.20.a 3.1.20.b 3.1.20.c.1 3.1.20.c.2 3.1.20.d 3.16.1 3.16.3.a 3.16.3.b 3.16.3.c
null
A.03.17.03.ODP[01]
null
null
ID.BE-1 ID.SC-1 ID.SC-3
GV.SC GV.SC-01 GV.SC-03 GV.SC-09 ID.RA
A02:2021 A05:2021
12.8
8.2.3 12.8 12.8.1 12.9 12.9.1 12.9.2 A2.1.3
12.8.1
12.8.1
12.8.1
12.8.1
12.8.1
12.8.1
12.8.1
8.2.3 12.8.1 12.9.1 12.9.2 A2.1.3
12.8.1
B.1.1.1
2.8A
1.2.4 1.3.3 6.1.1
12.1
7.2.2.5
7.2.2.5
RISK-2.J.MIL3 THIRD-PARTIES-2.A.MIL1 THIRD-PARTIES-2.B.MIL1 THIRD-PARTIES-2.C.MIL2 THIRD-PARTIES-2.D.MIL2 THIRD-PARTIES-2.E.MIL2 THIRD-PARTIES-2.F.MIL2 THIRD-PARTIES-2.G.MIL2 THIRD-PARTIES-2.H.MIL3 THIRD-PARTIES-2.I.MIL3 THIRD-PARTIES-2.J.MIL3 THIRD-PARTIES-2.K.MIL3 THIRD-PARTIES-2.L.MIL3 THIRD-PARTIES-2.M.MIL3
EXD:SG3.SP4 OPD:SG1.SP6 RTSE:SG1.SP1 RTSE:SG1.SP2 RTSE:SG1.SP3 RTSE:SG1.SP4 RTSE:SG1.SP5
5.6 6.1 6.2
null
null
null
null
null
null
null
SA-4
null
252.204-7012(m)(1) 252.204-7012(m)(2)(i) 252.204-7012(m)(2)(ii) 252.204-7019(b) 252.204-7019(c)(1) 252.204-7019(c)(2) 252.204-7020(c) 252.204-7021(b) 252.204-7021(c)(1) 252.204-7021(c)(2)
null
52.204-21(c)
52.204-27(b)
null
null
SA-4
SA-4
SA-4
SA-4
SA-4
SA-4 SR-1
SA-4 SR-1
SA-4 SR-1
SA-4 SR-1
SA-4 SR-1
null
null
null
null
314.4(a) 314.4(a)(1) 314.4(a)(2) 314.4(a)(3) 314.4(e)(2) 314.4(f)(1) 314.4(f)(2) 314.4(f)(3)
164.308(b) 164.308(b)(1) 164.308(b)(2)
null
null
9.L.C
2.C.8 2.C.8.1 2.C.8.2 SA-4 SR-1
null
null
null
15.1 15.2 15.3 15.4 16.2
null
null
null
null
null
null
null
null
null
null
null
null
null
6-1-1305(6) 6-1-1305(7)
null
null
null
null
null
500.11
Sec 4(2)(b)(ii)(A)(5)
null
38-99-20(F)(1)
null
null
SA-4 SR-1
SA-4
SA-4
null
null
§ 2447(b)(6) § 2447(b)(6)(A) § 2447(b)(6)(B)
3.2.3(7) 3.6.2(74)
null
null
Art 28.1 Art 28.2 Art 28.3 Art 28.4 Art 28.5 Art 28.6 Art 28.9 Art 28.10 Art 32.1 Art 32.2
Article 21.2(d) Article 21.2(e) Article 21.3
null
null
Sec 14 Sec 15
Art 16
null
Art 42
null
null
null
9.1
SSO-01 SSO-03
null
null
null
11.3 11.10 16.1 17.3
null
null
null
null
null
null
null
null
null
null
null
4-1
null
3.4.1 3.4.2
1-5-3-3 4-1-1 4-1-2 4-1-3 4-1-4
4-1 4-1-1 4-1-1-1 4-1-1-2 4-1-1-3 4-1-1-4 4-1-2
null
null
Sec 20 Sec 21
null
7.4.1 [OP.EXT.1]
null
null
null
null
A4.a
A4
null
null
null
null
null
null
null
null
1073 1785
null
15 47 48(a) 48(b) 48(c) 57
16 20 22 28
null
null
Article 20 Article 21 Article 38(3) Article 42 Article 51 Article 51(1) Article 51(2) Article 51(3) Article 51(4) Article 51(5) Article 51(6)
null
null
null
Article 22 Article 23(1)(i) Article 23(1)(ii) Article 23(1)(iii) Article 23(1)(iv) Article 23(2) Article 23(2)(i) Article 23(2)(ii) Article 23(2)(iii) Article 23(2)(iv) Article 23(2)(v) Article 23(2)(vi) Article 23(2)(vii) Article 23(2)(viii) Article 23(3) Article 23(4) Article 23(5)(i) Article 23(5)(ii) Article 23(5)(iii) Article 23(6) Article 23(1) Article 24(3)
15.1.1 15.1.1.14.B 15.1.1.16.B 15.1.2.18.PB
null
16.1
2.2.6.C.01 2.2.6.C.02 23.2.19.C.01
null
null
null
null
3.4.1 3.4.2 3.4.3 9.1.8
null
null
null
null
null
5.10
null
2.3 4.25
null
null
null
null
null
null
null
null
null
null
null
x
FAR 52.204-21 NAIC
x
x
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-1 R-AM-2 R-AM-3 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-GV-8 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1 R-SA-2
R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
R-SA-2
NT-1 NT-2 NT-3 NT-4 NT-5 NT-6 NT-7 NT-8 NT-9 NT-10 NT-11 NT-12 NT-13 NT-14 MT-1 MT-2 MT-3 MT-4 MT-5 MT-6 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15 MT-16
NT-1
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
MT-16
- updated DFARS mapping
Third-Party Management
Third-Party Inventories
TPM-01.1
Mechanisms exist to maintain a current, accurate and complete list of External Service Providers (ESPs) that can potentially impact the Confidentiality, Integrity, Availability and/or Safety (CIAS) of the organization's systems, applications, services and data.
null
E-AST-06 E-DCH-06
Does the organization maintain a current, accurate and complete list of External Service Providers (ESPs) that can potentially impact the Confidentiality, Integrity, Availability and/or Safety (CIAS) of the organization's systems, applications, services and data?
8
Identify
null
X
X
There is no evidence of a capability to maintain a current, accurate and complete list of Third-Party Service Providers (TSP) that can potentially impact the Confidentiality, Integrity, Availability and/ or Safety (CIAS) of the organization's systems, applications, services and data.
SP-CMM1 is N/A, since a structured process is required to maintain a current, accurate and complete list of Third-Party Service Providers (TSP) that can potentially impact the Confidentiality, Integrity, Availability and/ or Safety (CIAS) of the organization's systems, applications, services and data.
Third-Party Management (TPM) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Third-party management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for third-party management. • A procurement function maintains a list of all active Third-Party Service Providers (TSP), including pertinent contract information that will assist in a risk assessment. • A Shared Responsibility Matrix (SRM) is documented for every TSP that directly or indirectly affects sensitive/regulated data. • Procurement contracts: o Require TSP to follow secure engineering practices as part of a broader Cybersecurity Supply Chain Risk Management (C-SCRM) initiative. o Contain "break clauses" in all TSP contracts to enable penalty-free, early termination of a contract for cause, based on the TSP's cybersecurity and/ or data privacy practices deficiency(ies).
Third-Party Management (TPM) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Procurement contracts and layered defenses provide safeguards to limit harm from potential adversaries who identify and target the organization's supply chain. • A Governance, Risk & Compliance (GRC) function, or similar function; o provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data with regards to third-party management. o Operates the Cybersecurity Supply Chain Risk Management (C-SCRM) program to identify and mitigate supply chain-related risks and threats. o Evaluates risks associated with weaknesses or deficiencies in supply chain elements identified during first and/ or third-party reviews. o Enables the implementation of third-party management controls. o Ensures the Information Assurance Program (IAP) evaluates applicable cybersecurity & data privacy controls as part of “business as usual” pre-production testing. • A procurement team, or similar function: o Maintains a list of all active Third-Party Service Providers (TSP), including pertinent contract information that will assist in a risk assessment. o Requires TSP to follow secure engineering practices as part of a broader Cybersecurity Supply Chain Risk Management (C-SCRM) initiative. o Includes "break clauses" in all TSP contracts to enable penalty-free, early termination of a contract for cause, based on the TSP's cybersecurity and/ or data privacy practices deficiency(ies). o Controls changes to services by suppliers, taking into account the criticality of business information, systems and processes that are in scope by the third-party. o Requires a risk assessment prior to the acquisition or outsourcing of technology-related services. o Monitors, regularly reviews and audits supplier service delivery for compliance with established contract agreements. o Uses tailored acquisition strategies, contract tools and procurement methods for the purchase of unique systems, system components or services. • A Shared Responsibility Matrix (SRM) is documented for every TSP that directly or indirectly affects sensitive/regulated data.
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to maintain a current, accurate and complete list of Third-Party Service Providers (TSP) that can potentially impact the Confidentiality, Integrity, Availability and/ or Safety (CIAS) of the organization's systems, applications, services and data.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to maintain a current, accurate and complete list of Third-Party Service Providers (TSP) that can potentially impact the Confidentiality, Integrity, Availability and/ or Safety (CIAS) of the organization's systems, applications, services and data.
null
null
null
15.1
15.1
15.1
15.1
null
null
null
null
null
null
null
null
null
null
null
null
5.19
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
SR-13
null
null
null
SR-13
SR-13
null
3.7.6.b
null
null
null
null
null
GV.SC-04 ID.AM-04
null
null
12.8 12.8.1
12.8.1
12.8.1
12.8.1
12.8.1
12.8.1
12.8.1
12.8.1
12.8.1
12.8.1
K.3.1 K.3.2 K.3.7
null
null
null
7.2.2.5
7.2.2.5
THIRD-PARTIES-1.B.MIL1
null
null
null
null
null
null
null
null
null
null
null
252.204-7018(c)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Art 28.1 Art 28.1(a) Art 28.1(b) Art 28.1(b)(i) Art 28.1(b)(ii) Art 28.2 Art 28.3 Art 28.4(a) Art 28.4(b) Art 28.4(c) Art 28.4(d) Art 28.4(e) Art 28.5 Art 28.6 Art 28.7(a) Art 28.7(b) Art 28.7(c) Art 28.7(d) Art 28.8 Art 28.8(a) Art 28.8(b) Art 28.8(c)
null
null
Article 21.3
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
A4.a
null
null
null
null
null
null
null
null
null
1631 1786 1736 1737 1637 1638
null
49
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
x
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-1 R-AM-2 R-AM-3 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1
R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
null
MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
null
- updated DFARS mapping
Third-Party Management
Third-Party Criticality Assessments
TPM-02
Mechanisms exist to identify, prioritize and assess suppliers and partners of critical systems, components and services using a supply chain risk assessment process relative to their importance in supporting the delivery of high-value services.
- Data Protection Impact Assessment (DPIA)
E-TPM-02
Does the organization identify, prioritize and assess suppliers and partners of critical systems, components and services using a supply chain risk assessment process relative to their importance in supporting the delivery of high-value services?
9
Identify
X
X
X
There is no evidence of a capability to identify, prioritize and assess suppliers and partners of critical systems, components and services using a supply chain risk assessment process relative to their importance in supporting the delivery of high-value services.
SP-CMM1 is N/A, since a structured process is required to identify, prioritize and assess suppliers and partners of critical systems, components and services using a supply chain risk assessment process relative to their importance in supporting the delivery of high-value services.
Third-Party Management (TPM) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Third-party management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for third-party management. • A procurement function maintains a list of all active Third-Party Service Providers (TSP), including pertinent contract information that will assist in a risk assessment. • A Shared Responsibility Matrix (SRM) is documented for every TSP that directly or indirectly affects sensitive/regulated data. • Procurement contracts: o Require TSP to follow secure engineering practices as part of a broader Cybersecurity Supply Chain Risk Management (C-SCRM) initiative. o Contain "break clauses" in all TSP contracts to enable penalty-free, early termination of a contract for cause, based on the TSP's cybersecurity and/ or data privacy practices deficiency(ies).
Third-Party Management (TPM) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Procurement contracts and layered defenses provide safeguards to limit harm from potential adversaries who identify and target the organization's supply chain. • A Governance, Risk & Compliance (GRC) function, or similar function; o provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data with regards to third-party management. o Operates the Cybersecurity Supply Chain Risk Management (C-SCRM) program to identify and mitigate supply chain-related risks and threats. o Evaluates risks associated with weaknesses or deficiencies in supply chain elements identified during first and/ or third-party reviews. o Enables the implementation of third-party management controls. o Ensures the Information Assurance Program (IAP) evaluates applicable cybersecurity & data privacy controls as part of “business as usual” pre-production testing. • A procurement team, or similar function: o Maintains a list of all active Third-Party Service Providers (TSP), including pertinent contract information that will assist in a risk assessment. o Requires TSP to follow secure engineering practices as part of a broader Cybersecurity Supply Chain Risk Management (C-SCRM) initiative. o Includes "break clauses" in all TSP contracts to enable penalty-free, early termination of a contract for cause, based on the TSP's cybersecurity and/ or data privacy practices deficiency(ies). o Controls changes to services by suppliers, taking into account the criticality of business information, systems and processes that are in scope by the third-party. o Requires a risk assessment prior to the acquisition or outsourcing of technology-related services. o Monitors, regularly reviews and audits supplier service delivery for compliance with established contract agreements. o Uses tailored acquisition strategies, contract tools and procurement methods for the purchase of unique systems, system components or services. • A Shared Responsibility Matrix (SRM) is documented for every TSP that directly or indirectly affects sensitive/regulated data.
Third-Party Management (TPM) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to identify, prioritize and assess suppliers and partners of critical systems, components and services using a supply chain risk assessment process relative to their importance in supporting the delivery of high-value services.
CC9.1
null
null
15.3
null
15.3
15.3
APO10.04
null
STA-07
null
null
null
null
null
null
null
null
null
5.19
null
null
null
null
null
null
T1195.003, T1495, T1542, T1542.001, T1542.003, T1542.004, T1542.005, T1553, T1553.006, T1601, T1601.001, T1601.002
null
null
null
ID.BE-P3
null
null
null
SA-14
null
null
null
PM-30(1) RA-9
null
null
RA-9
RA-9
PM-30(1)
null
null
RA-9
RA-9
null
RA-9
null
RA-9
RA-9
RA-9
RA-9
null
3.17.3.a
null
null
null
null
ID.BE-1 ID.SC-2
GV.OC-04 GV.SC-04 GV.SC-07
null
null
null
null
null
null
null
null
null
null
null
null
B.1.1.1
2.8A
1.3.3
12.1
7.2.2.5 7.3.2 7.3.3
7.2.2.5 7.3.2 7.3.3
THIRD-PARTIES-1.C.MIL2 THIRD-PARTIES-1.D.MIL2 THIRD-PARTIES-1.E.MIL2 THIRD-PARTIES-1.F.MIL3 THIRD-PARTIES-2.A.MIL1 THIRD-PARTIES-2.B.MIL1 THIRD-PARTIES-2.C.MIL2 THIRD-PARTIES-2.D.MIL2 THIRD-PARTIES-2.E.MIL2 THIRD-PARTIES-2.F.MIL2 THIRD-PARTIES-2.G.MIL2 THIRD-PARTIES-2.H.MIL3 THIRD-PARTIES-2.I.MIL3 THIRD-PARTIES-2.J.MIL3 THIRD-PARTIES-2.K.MIL3 THIRD-PARTIES-2.L.MIL3 THIRD-PARTIES-2.M.MIL3
EXD:SG1.SP2 RTSE:SG2.SP1 RTSE:SG2.SP2 RTSE:SG3.SP1 RTSE:SG3.SP2 TM:SG1.SP1
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
RA-9
null
RA-9
RA-9
null
null
D1.G.SP.A.3
null
null
314.4(f)(1)
null
null
null
9.L.C
null
null
null
8-302 8-311
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Art 8.4
null
null
Article 21.3
null
null
null
null
null
null
null
null
null
null
SSO-02 SSO-03
null
null
null
16.1 16.6
null
null
null
null
null
null
null
null
null
null
null
4-1-1-1
null
null
null
4-1-1-2
null
null
null
null
null
null
null
null
null
A4.a
A4
null
null
null
null
null
null
null
null
1452
null
50(a) 50(b) 50(c) 50(d) 52
21(b)
null
null
null
null
null
null
null
15.1.1.16.B 15.1.2.18.PB
null
null
12.7.17.C.01
null
null
null
null
null
null
null
null
null
null
null
null
2.3 4.27
null
null
null
null
null
null
null
null
null
null
null
x
null
null
x
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-1 R-AM-2 R-AM-3 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1
R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
null
NT-1 NT-2 NT-3 NT-4 NT-5 NT-6 NT-7 NT-8 NT-9 NT-10 NT-11 NT-12 NT-13 NT-14 MT-1 MT-2 MT-3 MT-4 MT-5 MT-6 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15 MT-16
NT-1
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
MT-16
null
Third-Party Management
Supply Chain Protection
TPM-03
Mechanisms exist to evaluate security risks associated with the services and product supply chain.
- Data Protection Impact Assessment (DPIA)
E-RSK-02
Does the organization evaluate security risks associated with the services and product supply chain?
9
Identify
X
X
X
There is no evidence of a capability to evaluate security risks associated with the services and product supply chain.
SP-CMM1 is N/A, since a structured process is required to evaluate security risks associated with the services and product supply chain.
Third-Party Management (TPM) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Third-party management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for third-party management. • A procurement function maintains a list of all active Third-Party Service Providers (TSP), including pertinent contract information that will assist in a risk assessment. • A Shared Responsibility Matrix (SRM) is documented for every TSP that directly or indirectly affects sensitive/regulated data. • Procurement contracts: o Require TSP to follow secure engineering practices as part of a broader Cybersecurity Supply Chain Risk Management (C-SCRM) initiative. o Contain "break clauses" in all TSP contracts to enable penalty-free, early termination of a contract for cause, based on the TSP's cybersecurity and/ or data privacy practices deficiency(ies).
Third-Party Management (TPM) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Procurement contracts and layered defenses provide safeguards to limit harm from potential adversaries who identify and target the organization's supply chain. • A Governance, Risk & Compliance (GRC) function, or similar function; o provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data with regards to third-party management. o Operates the Cybersecurity Supply Chain Risk Management (C-SCRM) program to identify and mitigate supply chain-related risks and threats. o Evaluates risks associated with weaknesses or deficiencies in supply chain elements identified during first and/ or third-party reviews. o Enables the implementation of third-party management controls. o Ensures the Information Assurance Program (IAP) evaluates applicable cybersecurity & data privacy controls as part of “business as usual” pre-production testing. • A procurement team, or similar function: o Maintains a list of all active Third-Party Service Providers (TSP), including pertinent contract information that will assist in a risk assessment. o Requires TSP to follow secure engineering practices as part of a broader Cybersecurity Supply Chain Risk Management (C-SCRM) initiative. o Includes "break clauses" in all TSP contracts to enable penalty-free, early termination of a contract for cause, based on the TSP's cybersecurity and/ or data privacy practices deficiency(ies). o Controls changes to services by suppliers, taking into account the criticality of business information, systems and processes that are in scope by the third-party. o Requires a risk assessment prior to the acquisition or outsourcing of technology-related services. o Monitors, regularly reviews and audits supplier service delivery for compliance with established contract agreements. o Uses tailored acquisition strategies, contract tools and procurement methods for the purchase of unique systems, system components or services. • A Shared Responsibility Matrix (SRM) is documented for every TSP that directly or indirectly affects sensitive/regulated data.
Third-Party Management (TPM) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to evaluate security risks associated with the services and product supply chain.
CC9.1
CC1.1-POF5 CC3.2-POF7 CC9.2-POF1 CC9.2-POF2 CC9.2-POF3 CC9.2-POF4 CC9.2-POF5 CC9.2-POF6 CC9.2-POF7 CC9.2-POF8 CC9.2-POF9 CC9.2-POF10 CC9.2-POF11 CC9.2-POF12
null
null
null
null
null
APO10.04
null
IAM-11 STA-02 STA-03 STA-13
POL-02
SO10
null
CR 3.12 (7.14)
RQ-07-01
null
null
null
15.1.3
5.19 5.21 5.22 8.30
15.1.3
null
6.12.1.3
null
null
null
null
OR-3.4
Sec 4(F)(1)
null
null
PW.3 PW.3.1
null
null
SA-12
null
null
SA-12
SR-2 SR-2(1)
null
SR-2 SR-2(1)
SR-2 SR-2(1)
SR-2 SR-2(1)
null
null
SR-2 SR-2(1)
SR-2 SR-2(1)
SR-2 SR-2(1)
null
SR-2
SR-2
null
null
null
SR-2
null
3.17.1.a 3.17.3.a 3.17.3.b
null
null
null
null
ID.SC-3 ID.SC-4
GV.SC-01 GV.SC-07
A02:2021 A05:2021
null
null
null
null
null
null
null
null
null
null
null
B.1.1.17
2.8A
1.2.4 1.3.3
12.1 12.2 12.3 12.4 12.5 12.6 12.7 12.8
7.2.2.5
7.2.2.5
THIRD-PARTIES-1.E.MIL2 THIRD-PARTIES-2.A.MIL1 THIRD-PARTIES-2.B.MIL1 THIRD-PARTIES-2.C.MIL2 THIRD-PARTIES-2.D.MIL2 THIRD-PARTIES-2.E.MIL2 THIRD-PARTIES-2.F.MIL2 THIRD-PARTIES-2.G.MIL2 THIRD-PARTIES-2.H.MIL3 THIRD-PARTIES-2.I.MIL3 THIRD-PARTIES-2.J.MIL3 THIRD-PARTIES-2.K.MIL3 THIRD-PARTIES-2.L.MIL3 THIRD-PARTIES-2.M.MIL3
EXD:SG3.SP1 EXD:SG3.SP2 EXD:SG3.SP3 EXD:SG3.SP4 EXD:SG4.SP1 EXD:SG4.SP2 RTSE:SG2.SP1 RTSE:SG2.SP2 RTSE:SG3.SP1 RTSE:SG3.SP2
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
SA-12
null
null
SA-12
null
SR-2(1)
SR-2(1)
SR-2(1)
SR-2(1)
SR-2(1)
null
null
null
null
314.4(f)(1)
null
5.S.B
5.M.B
5.M.B 9.L.C
SR-2 SR-2(1)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
38-99-20(F)(1)
null
null
SR-2
null
null
null
null
§ 2447(b)(6) § 2447(b)(6)(A) § 2447(b)(6)(B)
3.6.2(74)
null
null
Art 28.1 Art 28.2 Art 28.3 Art 28.4 Art 28.5 Art 28.6 Art 28.9 Art 28.10
Article 21.2(d) Article 21.3
null
null
null
null
null
Art 42
null
null
null
null
SSO-02 SSO-02 SSO-03
null
null
null
11.3 16.1 16.3 16.5 17.3 17.11
null
null
null
null
null
null
null
Art 31
Art 18
null
null
4-1-1-1 4-1-1-2
null
3.4.2
null
null
null
null
Sec 20
Art 20 Art 21
7.4.1 [OP.EXT.1] 7.4.3 [OP.EXT.3]
null
null
null
null
A4.a
null
null
null
null
null
null
null
null
null
0731 1452 1632 1789
null
null
22 28
null
null
null
null
null
Art 6
null
15.1.1.16.B 15.1.2.18.PB 15.1.3
null
null
12.7.14.C.01 12.7.14.C.02 12.7.14.C.03 12.7.15.C.01 12.7.15.C.02 12.7.16.C.01 12.7.16.C.02 12.7.16.C.03 12.7.17.C.01 12.7.18.C.01 12.7.18.C.02 12.7.19.C.01 12.7.19.C.02 12.7.20.C.01 12.7.20.C.02 12.7.20.C.03 12.7.20.C.04 12.7.20.C.05 12.7.21.C.01
null
Sec 25 Sec 43
null
null
3.4.1 3.4.2
null
null
null
null
null
null
null
2.3 4.25
null
null
null
null
null
Art 21
null
null
null
null
null
x
NAIC
x
x
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-1 R-AM-2 R-AM-3 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-GV-8 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1
R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
null
NT-1 NT-2 NT-3 NT-4 NT-5 NT-6 NT-7 NT-8 NT-9 NT-10 NT-11 NT-12 NT-13 NT-14 MT-1 MT-2 MT-3 MT-4 MT-5 MT-6 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15 MT-16
NT-1
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
MT-16
null
Third-Party Management
Acquisition Strategies, Tools & Methods
TPM-03.1
Mechanisms exist to utilize tailored acquisition strategies, contract tools and procurement methods for the purchase of unique systems, system components or services.
- Data Protection Impact Assessment (DPIA)
null
Does the organization utilize tailored acquisition strategies, contract tools and procurement methods for the purchase of unique systems, system components or services?
9
Identify
X
X
X
There is no evidence of a capability to utilize tailored acquisition strategies, contract tools and procurement methods for the purchase of unique systems, system components or services.
SP-CMM1 is N/A, since a structured process is required to utilize tailored acquisition strategies, contract tools and procurement methods for the purchase of unique systems, system components or services.
Third-Party Management (TPM) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Third-party management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for third-party management. • A procurement function maintains a list of all active Third-Party Service Providers (TSP), including pertinent contract information that will assist in a risk assessment. • A Shared Responsibility Matrix (SRM) is documented for every TSP that directly or indirectly affects sensitive/regulated data. • Procurement contracts: o Require TSP to follow secure engineering practices as part of a broader Cybersecurity Supply Chain Risk Management (C-SCRM) initiative. o Contain "break clauses" in all TSP contracts to enable penalty-free, early termination of a contract for cause, based on the TSP's cybersecurity and/ or data privacy practices deficiency(ies).
Third-Party Management (TPM) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Procurement contracts and layered defenses provide safeguards to limit harm from potential adversaries who identify and target the organization's supply chain. • A Governance, Risk & Compliance (GRC) function, or similar function; o provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data with regards to third-party management. o Operates the Cybersecurity Supply Chain Risk Management (C-SCRM) program to identify and mitigate supply chain-related risks and threats. o Evaluates risks associated with weaknesses or deficiencies in supply chain elements identified during first and/ or third-party reviews. o Enables the implementation of third-party management controls. o Ensures the Information Assurance Program (IAP) evaluates applicable cybersecurity & data privacy controls as part of “business as usual” pre-production testing. • A procurement team, or similar function: o Maintains a list of all active Third-Party Service Providers (TSP), including pertinent contract information that will assist in a risk assessment. o Requires TSP to follow secure engineering practices as part of a broader Cybersecurity Supply Chain Risk Management (C-SCRM) initiative. o Includes "break clauses" in all TSP contracts to enable penalty-free, early termination of a contract for cause, based on the TSP's cybersecurity and/ or data privacy practices deficiency(ies). o Controls changes to services by suppliers, taking into account the criticality of business information, systems and processes that are in scope by the third-party. o Requires a risk assessment prior to the acquisition or outsourcing of technology-related services. o Monitors, regularly reviews and audits supplier service delivery for compliance with established contract agreements. o Uses tailored acquisition strategies, contract tools and procurement methods for the purchase of unique systems, system components or services. • A Shared Responsibility Matrix (SRM) is documented for every TSP that directly or indirectly affects sensitive/regulated data.
Third-Party Management (TPM) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to utilize tailored acquisition strategies, contract tools and procurement methods for the purchase of unique systems, system components or services.
CC3.3 CC9.1
null
null
null
null
null
null
null
Principle 8
STA-05
null
null
null
null
null
null
null
null
null
5.21 5.22
null
null
null
null
null
null
T1059.002, T1204.003, T1505, T1505.001, T1505.002, T1505.004, T1546.006, T1554, T1601, T1601.001, T1601.002
null
Sec 4(F)(1)
null
null
null
null
null
SA-12(1)
null
null
null
SR-5 SR-3(1)
null
SR-5
SR-5
SR-5
SR-3(1)
null
SR-5
SR-5
SR-5
null
SR-5 SR-3(1)
SR-5
null
SR-5
SR-5 SR-3(1)
SR-5 SR-3(1)
null
3.17.1.a 3.17.2 3.17.3.a 3.17.3.b
null
null
null
null
null
GV.SC-05 GV.SC-06
null
null
null
null
null
null
null
null
null
null
null
null
B.1.1.24
null
null
null
7.2.2.5
7.2.2.5
THIRD-PARTIES-1.E.MIL2 THIRD-PARTIES-2.A.MIL1 THIRD-PARTIES-2.B.MIL1 THIRD-PARTIES-2.C.MIL2 THIRD-PARTIES-2.D.MIL2 THIRD-PARTIES-2.E.MIL2 THIRD-PARTIES-2.F.MIL2 THIRD-PARTIES-2.G.MIL2 THIRD-PARTIES-2.H.MIL3 THIRD-PARTIES-2.I.MIL3 THIRD-PARTIES-2.J.MIL3 THIRD-PARTIES-2.K.MIL3 THIRD-PARTIES-2.L.MIL3 THIRD-PARTIES-2.M.MIL3
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
SR-5
SR-5
SR-5
SR-5
SR-5
null
null
null
null
null
null
null
null
9.L.C
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
38-99-20(F)(1)
null
null
SR-5
null
null
null
null
null
3.6.2(74)
null
null
null
Article 21.3
null
null
null
null
null
null
null
null
null
9.3
SSO-05
null
null
null
16.1
null
null
null
null
null
null
null
null
null
null
null
4-1-1-1 4-1-1-2
null
null
null
null
null
null
null
null
null
null
null
null
null
A4.a
null
null
null
null
null
null
null
null
null
1567 1568 1632 1788 1789 1743
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
NAIC
null
null
R-AM-3 R-BC-1 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-GV-1 R-GV-4 R-GV-5
null
null
null
null
null
null
R-AM-3
R-BC-1
null
null
null
null
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
null
null
R-GV-1
null
null
R-GV-4
R-GV-5
null
null
null
null
null
null
null
null
null
NT-1 NT-2 NT-3 NT-4 NT-5 NT-6 NT-7 NT-8 NT-9 NT-10 NT-11 NT-12 NT-13 NT-14 MT-1 MT-2 MT-3 MT-4 MT-5 MT-6 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15 MT-16
NT-1
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
MT-16
null
Third-Party Management
Limit Potential Harm
TPM-03.2
Mechanisms exist to utilize security safeguards to limit harm from potential adversaries who identify and target the organization's supply chain.
- Data Protection Impact Assessment (DPIA) - Liability clause in contracts
null
Does the organization utilize security safeguards to limit harm from potential adversaries who identify and target the organization's supply chain?
9
Identify
null
X
X
There is no evidence of a capability to utilize security safeguards to limit harm from potential adversaries who identify and target the organization's supply chain.
SP-CMM1 is N/A, since a structured process is required to utilize security safeguards to limit harm from potential adversaries who identify and target the organization's supply chain.
Third-Party Management (TPM) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Third-party management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for third-party management. • A procurement function maintains a list of all active Third-Party Service Providers (TSP), including pertinent contract information that will assist in a risk assessment. • A Shared Responsibility Matrix (SRM) is documented for every TSP that directly or indirectly affects sensitive/regulated data. • Procurement contracts: o Require TSP to follow secure engineering practices as part of a broader Cybersecurity Supply Chain Risk Management (C-SCRM) initiative. o Contain "break clauses" in all TSP contracts to enable penalty-free, early termination of a contract for cause, based on the TSP's cybersecurity and/ or data privacy practices deficiency(ies).
Third-Party Management (TPM) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Procurement contracts and layered defenses provide safeguards to limit harm from potential adversaries who identify and target the organization's supply chain. • A Governance, Risk & Compliance (GRC) function, or similar function; o provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data with regards to third-party management. o Operates the Cybersecurity Supply Chain Risk Management (C-SCRM) program to identify and mitigate supply chain-related risks and threats. o Evaluates risks associated with weaknesses or deficiencies in supply chain elements identified during first and/ or third-party reviews. o Enables the implementation of third-party management controls. o Ensures the Information Assurance Program (IAP) evaluates applicable cybersecurity & data privacy controls as part of “business as usual” pre-production testing. • A procurement team, or similar function: o Maintains a list of all active Third-Party Service Providers (TSP), including pertinent contract information that will assist in a risk assessment. o Requires TSP to follow secure engineering practices as part of a broader Cybersecurity Supply Chain Risk Management (C-SCRM) initiative. o Includes "break clauses" in all TSP contracts to enable penalty-free, early termination of a contract for cause, based on the TSP's cybersecurity and/ or data privacy practices deficiency(ies). o Controls changes to services by suppliers, taking into account the criticality of business information, systems and processes that are in scope by the third-party. o Requires a risk assessment prior to the acquisition or outsourcing of technology-related services. o Monitors, regularly reviews and audits supplier service delivery for compliance with established contract agreements. o Uses tailored acquisition strategies, contract tools and procurement methods for the purchase of unique systems, system components or services. • A Shared Responsibility Matrix (SRM) is documented for every TSP that directly or indirectly affects sensitive/regulated data.
Third-Party Management (TPM) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to utilize security safeguards to limit harm from potential adversaries who identify and target the organization's supply chain.
CC9.1
P6.4-POF2 P6.5-POF1 P6.5-POF2 P6.6-POF1
null
15.4
null
15.4
15.4
null
null
STA-13
RSM-03
null
null
null
RQ-07-01
null
null
null
null
5.19 5.20
null
null
null
null
null
null
null
OR-3.4
null
null
null
null
null
null
SA-12(5)
null
null
null
SR-3(2)
null
null
null
null
SR-3(2)
null
null
null
null
null
null
null
null
null
null
null
null
3.17.3.a 3.17.3.b
null
null
null
null
null
GV.SC-05 GV.SC-06
null
null
null
null
null
null
null
null
null
null
null
null
T.2 T.2.1
null
null
null
7.2.2.5
7.2.2.5
THIRD-PARTIES-1.E.MIL2
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
314.4(f)(1)
null
null
null
9.L.C
SR-3(2)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Article 21.3
null
null
null
null
null
null
null
null
null
null
SSO-02
null
null
null
11.3 16.2
null
null
null
null
null
null
null
null
null
null
null
4-1-1-1 4-1-1-2
null
null
null
null
null
null
null
null
null
null
null
null
null
A4.a
null
null
null
null
null
null
null
null
null
1567
null
56(a) 56(b) 56(c) 56(d)
22
null
null
Article 20
null
null
null
null
null
null
null
null
null
null
null
null
3.4.1 3.4.2
null
null
null
null
null
null
null
2.3 4.25
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-1 R-AM-2 R-AM-3 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-GV-8 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1
R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
null
NT-1 NT-2 NT-3 NT-4 NT-5 NT-6 NT-7 NT-8 NT-9 NT-10 NT-11 NT-12 NT-13 NT-14 MT-1 MT-2 MT-3 MT-4 MT-5 MT-6 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15 MT-16
NT-1
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
MT-16
null
Third-Party Management
Processes To Address Weaknesses or Deficiencies
TPM-03.3
Mechanisms exist to address identified weaknesses or deficiencies in the security of the supply chain
- Data Protection Impact Assessment (DPIA)
null
Does the organization address identified weaknesses or deficiencies in the security of the supply chain
9
Identify
X
X
X
There is no evidence of a capability to address identified weaknesses or deficiencies in the security of the supply chain
SP-CMM1 is N/A, since a structured process is required to address identified weaknesses or deficiencies in the security of the supply chain
Third-Party Management (TPM) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Third-party management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for third-party management. • A procurement function maintains a list of all active Third-Party Service Providers (TSP), including pertinent contract information that will assist in a risk assessment. • A Shared Responsibility Matrix (SRM) is documented for every TSP that directly or indirectly affects sensitive/regulated data. • Procurement contracts: o Require TSP to follow secure engineering practices as part of a broader Cybersecurity Supply Chain Risk Management (C-SCRM) initiative. o Contain "break clauses" in all TSP contracts to enable penalty-free, early termination of a contract for cause, based on the TSP's cybersecurity and/ or data privacy practices deficiency(ies).
Third-Party Management (TPM) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Procurement contracts and layered defenses provide safeguards to limit harm from potential adversaries who identify and target the organization's supply chain. • A Governance, Risk & Compliance (GRC) function, or similar function; o provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data with regards to third-party management. o Operates the Cybersecurity Supply Chain Risk Management (C-SCRM) program to identify and mitigate supply chain-related risks and threats. o Evaluates risks associated with weaknesses or deficiencies in supply chain elements identified during first and/ or third-party reviews. o Enables the implementation of third-party management controls. o Ensures the Information Assurance Program (IAP) evaluates applicable cybersecurity & data privacy controls as part of “business as usual” pre-production testing. • A procurement team, or similar function: o Maintains a list of all active Third-Party Service Providers (TSP), including pertinent contract information that will assist in a risk assessment. o Requires TSP to follow secure engineering practices as part of a broader Cybersecurity Supply Chain Risk Management (C-SCRM) initiative. o Includes "break clauses" in all TSP contracts to enable penalty-free, early termination of a contract for cause, based on the TSP's cybersecurity and/ or data privacy practices deficiency(ies). o Controls changes to services by suppliers, taking into account the criticality of business information, systems and processes that are in scope by the third-party. o Requires a risk assessment prior to the acquisition or outsourcing of technology-related services. o Monitors, regularly reviews and audits supplier service delivery for compliance with established contract agreements. o Uses tailored acquisition strategies, contract tools and procurement methods for the purchase of unique systems, system components or services. • A Shared Responsibility Matrix (SRM) is documented for every TSP that directly or indirectly affects sensitive/regulated data.
Third-Party Management (TPM) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to address identified weaknesses or deficiencies in the security of the supply chain
CC9.1
null
null
null
null
null
null
APO10.04
null
null
null
null
null
null
RQ-07-06
null
null
null
null
5.19 5.22
null
null
null
null
null
null
null
null
null
null
null
null
null
null
SA-12(15)
null
null
null
SR-3
null
SR-3
SR-3
SR-3
null
null
SR-3
SR-3
SR-3
null
SR-3
SR-3
null
SR-3
SR-3
SR-3
null
3.17.3.a 3.17.3.b
null
null
null
null
null
GV.SC-05 GV.SC-06 GV.SC-07
null
null
null
null
null
null
null
null
null
null
null
null
T.2.2
null
null
12.1 12.2 12.3 12.4 12.5 12.6 12.7 12.8
7.2.2.5
7.2.2.5
null
EXD:SG2.SP2
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
SR-3
SR-3
SR-3
SR-3
SR-3
null
null
null
null
null
null
null
null
null
SR-3
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
SR-3
null
null
null
null
null
null
null
null
null
Article 21.3
null
null
null
null
null
null
null
null
null
null
SSO-02
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
A4.a
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
x
null
null
x
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-1 R-AM-2 R-AM-3 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-GV-8 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1
R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
null
NT-1 NT-2 NT-3 NT-4 NT-5 NT-6 NT-7 NT-8 NT-9 NT-10 NT-11 NT-12 NT-13 NT-14 MT-1 MT-2 MT-3 MT-4 MT-5 MT-6 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15 MT-16
NT-1
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
MT-16
null
Third-Party Management
Adequate Supply
TPM-03.4
Mechanisms exist to develop and implement a spare parts strategy to ensure that an adequate supply of critical components is available to meet operational needs.
null
null
Does the organization develop and implement a spare parts strategy to ensure that an adequate supply of critical components is available to meet operational needs?
9
Protect
x
x
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
SR-5(1)
null
null
null
null
SR-5(1)
null
null
SR-5(1)
SR-5(1)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7
null
null
null
null
null
null
null
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
null
null
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
null
null
null
null
null
null
NT-1 NT-2 NT-3 NT-4 NT-5 NT-6 NT-7 NT-8 NT-9 NT-10 NT-11 NT-12 NT-13 NT-14 MT-1 MT-2 MT-3 MT-4 MT-5 MT-6 MT-7 MT-8 MT-9 MT-10 MT-11 MT-12 MT-13 MT-14 MT-15 MT-16
NT-1
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15
MT-16
- new control for NIST 800-53 R5 SR-5(1)
Third-Party Management
Third-Party Services
TPM-04
Mechanisms exist to mitigate the risks associated with third-party access to the organization’s systems and data.
- Conduct an organizational assessment of risk prior to the acquisition or outsourcing of services. - Maintain and implement policies and procedures to manage service providers (e.g., Software-as-a-Service (SaaS), web hosting companies, collocation providers, or email providers), through observation, review of policies and procedures and review of supporting documentation. - Maintain a program to monitor service providers’ control compliance status at least annually. - Require providers of external system services to comply with organizational security requirements and employ appropriate security controls in accordance with applicable statutory, regulatory and contractual obligations. - Define and document oversight and user roles and responsibilities with regard to external system services. - CimTrak Integrity Suite (https://www.cimcor.com/cimtrak/)
E-CPL-06
Does the organization mitigate the risks associated with third-party access to the organization’s systems and data?
10
Identify
X
X
null
There is no evidence of a capability to mitigate the risks associated with third-party access to the organization’s systems and data.
SP-CMM1 is N/A, since a structured process is required to mitigate the risks associated with third-party access to the organization’s systems and data.
Third-Party Management (TPM) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Third-party management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for third-party management. • A procurement function maintains a list of all active Third-Party Service Providers (TSP), including pertinent contract information that will assist in a risk assessment. • A Shared Responsibility Matrix (SRM) is documented for every TSP that directly or indirectly affects sensitive/regulated data. • Procurement contracts: o Require TSP to follow secure engineering practices as part of a broader Cybersecurity Supply Chain Risk Management (C-SCRM) initiative. o Contain "break clauses" in all TSP contracts to enable penalty-free, early termination of a contract for cause, based on the TSP's cybersecurity and/ or data privacy practices deficiency(ies).
Third-Party Management (TPM) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Procurement contracts and layered defenses provide safeguards to limit harm from potential adversaries who identify and target the organization's supply chain. • A Governance, Risk & Compliance (GRC) function, or similar function; o provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data with regards to third-party management. o Operates the Cybersecurity Supply Chain Risk Management (C-SCRM) program to identify and mitigate supply chain-related risks and threats. o Evaluates risks associated with weaknesses or deficiencies in supply chain elements identified during first and/ or third-party reviews. o Enables the implementation of third-party management controls. o Ensures the Information Assurance Program (IAP) evaluates applicable cybersecurity & data privacy controls as part of “business as usual” pre-production testing. • A procurement team, or similar function: o Maintains a list of all active Third-Party Service Providers (TSP), including pertinent contract information that will assist in a risk assessment. o Requires TSP to follow secure engineering practices as part of a broader Cybersecurity Supply Chain Risk Management (C-SCRM) initiative. o Includes "break clauses" in all TSP contracts to enable penalty-free, early termination of a contract for cause, based on the TSP's cybersecurity and/ or data privacy practices deficiency(ies). o Controls changes to services by suppliers, taking into account the criticality of business information, systems and processes that are in scope by the third-party. o Requires a risk assessment prior to the acquisition or outsourcing of technology-related services. o Monitors, regularly reviews and audits supplier service delivery for compliance with established contract agreements. o Uses tailored acquisition strategies, contract tools and procurement methods for the purchase of unique systems, system components or services. • A Shared Responsibility Matrix (SRM) is documented for every TSP that directly or indirectly affects sensitive/regulated data.
Third-Party Management (TPM) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to mitigate the risks associated with third-party access to the organization’s systems and data.
CC3.3
null
null
15.4 15.5
null
15.4
15.4 15.5
null
Principle 8
IAM-11 STA-02 UEM-14
POL-01 POL-02
null
null
null
RQ-07-01
null
null
null
14.2.7 15.1.1
5.19 8.30
14.2.7 15.1.1
null
6.11.2.7 6.12 6.12.1 6.12.1.1
null
null
null
T1041, T1048, T1048.002, T1048.003, T1567
OR-3.4
null
null
null
null
null
null
SA-9
SA-9
SA-9
SA-9
SA-9
SA-9
SA-9
SA-9
SA-9
null
null
SA-9
SA-9
SA-9
null
null
null
null
null
null
null
NFO -SA-9
3.16.3.a 3.16.3.b 3.16.3.c 3.17.2 3.17.3.a 3.17.3.b
null
null
null
null
ID.SC-2
GV.SC-05
A02:2021 A05:2021
12.8.2 12.8.4
8.2.3 12.8.2 12.9 12.9.1 12.9.2
12.8.3
12.8.3
12.8.3
12.8.3
12.8.3
12.8.3
12.8.3
8.2.3 12.8.3 12.9.1 12.9.2
12.8.2
T.2.3 T.3 T.3.1 T.4 T.5
null
1.2.4 1.3.3 8.2.2
12.1 12.2 12.3 12.4 12.5 12.6 12.7 12.8
7.2.2.5
7.2.2.5
THIRD-PARTIES-1.B.MIL1 THIRD-PARTIES-1.E.MIL2
EXD:SG3.SP4 EXD:SG4.SP1
null
null
null
null
null
null
null
null
SA-9
null
null
null
null
null
null
null
SA-9
SA-9
SA-9
SA-9
SA-9
SA-9
SA-9
SA-9
SA-9
SA-9
null
null
null
null
314.4(f)(1) 314.4(f)(2) 314.4(f)(3)
null
null
null
9.L.C
2.C.8 2.C.10 SA-9
null
null
8-700
null
null
null
null
null
null
SA-9
SA-9
SA-9
null
null
null
null
null
null
null
null
null
17.03(2)(f)(1)
null
null
null
622(2)(d)(A)(v)
null
null
null
SA-9
SA-9
SA-9
null
null
null
null
null
null
null
Article 21.3
null
null
null
null
null
null
null
null
null
9.2
SSO-05
null
null
null
11.3 16.1 22.4
null
null
null
null
null
null
null
null
null
null
null
4-1-1-1 4-1-1-2
null
null
null
4-1-1-3
null
null
Sec 19
null
null
null
null
null
null
A4.a
A4
null
null
null
null
null
null
null
null
1569
null
null
16 22 28
null
null
Article 20 Article 21 Article 38(3)
null
null
null
Article 22 Article 23(1)(i) Article 23(1)(ii) Article 23(1)(iii) Article 23(1)(iv) Article 23(2) Article 23(2)(i) Article 23(2)(ii) Article 23(2)(iii) Article 23(2)(iv) Article 23(2)(v) Article 23(2)(vi) Article 23(2)(vii) Article 23(2)(viii) Article 23(3) Article 23(4) Article 23(5)(i) Article 23(5)(ii) Article 23(5)(iii) Article 23(6) Article 23(1)
14.2.7 15.1.1 15.1.1.14.B
null
null
null
null
null
null
null
null
null
null
null
Art 25.1
null
null
null
2.3 4.25
null
null
null
null
null
null
null
null
null
null
null
x
MA 201 CMR 17 OR 6464A
x
x
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-1 R-AM-2 R-AM-3 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1
R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
null
NT-1 NT-2 NT-3 NT-4 NT-5 NT-6 NT-7 NT-8 NT-9 NT-10 NT-11 NT-12 NT-13 NT-14 MT-1 MT-2 MT-3 MT-4 MT-5 MT-6 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15 MT-16
NT-1
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
MT-16
null
Third-Party Management
Third-Party Risk Assessments & Approvals
TPM-04.1
Mechanisms exist to conduct a risk assessment prior to the acquisition or outsourcing of technology-related services.
- Conduct an organizational assessment of risk prior to the acquisition or outsourcing of services. - Maintain a list of service providers. - Maintain and implement controls to manage security providers (e.g., backup tape storage facilities or security service providers), through observation, review of policies and procedures and review of supporting documentation. - Maintain a written agreement that includes an acknowledgment that service providers are responsible for the security of data the service providers possess. - Maintain a program to monitor service providers’ control compliance status, at least annually. - Require that providers of external services comply with organizational digital security requirements and utilize appropriate security controls in accordance with all applicable laws and regulatory requirements.
null
Does the organization conduct a risk assessment prior to the acquisition or outsourcing of technology-related services?
9
Identify
null
X
X
There is no evidence of a capability to conduct a risk assessment prior to the acquisition or outsourcing of technology-related services.
SP-CMM1 is N/A, since a structured process is required to conduct a risk assessment prior to the acquisition or outsourcing of technology-related services.
Third-Party Management (TPM) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Third-party management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for third-party management. • A procurement function maintains a list of all active Third-Party Service Providers (TSP), including pertinent contract information that will assist in a risk assessment. • A Shared Responsibility Matrix (SRM) is documented for every TSP that directly or indirectly affects sensitive/regulated data. • Procurement contracts: o Require TSP to follow secure engineering practices as part of a broader Cybersecurity Supply Chain Risk Management (C-SCRM) initiative. o Contain "break clauses" in all TSP contracts to enable penalty-free, early termination of a contract for cause, based on the TSP's cybersecurity and/ or data privacy practices deficiency(ies).
Third-Party Management (TPM) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Procurement contracts and layered defenses provide safeguards to limit harm from potential adversaries who identify and target the organization's supply chain. • A Governance, Risk & Compliance (GRC) function, or similar function; o provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data with regards to third-party management. o Operates the Cybersecurity Supply Chain Risk Management (C-SCRM) program to identify and mitigate supply chain-related risks and threats. o Evaluates risks associated with weaknesses or deficiencies in supply chain elements identified during first and/ or third-party reviews. o Enables the implementation of third-party management controls. o Ensures the Information Assurance Program (IAP) evaluates applicable cybersecurity & data privacy controls as part of “business as usual” pre-production testing. • A procurement team, or similar function: o Maintains a list of all active Third-Party Service Providers (TSP), including pertinent contract information that will assist in a risk assessment. o Requires TSP to follow secure engineering practices as part of a broader Cybersecurity Supply Chain Risk Management (C-SCRM) initiative. o Includes "break clauses" in all TSP contracts to enable penalty-free, early termination of a contract for cause, based on the TSP's cybersecurity and/ or data privacy practices deficiency(ies). o Controls changes to services by suppliers, taking into account the criticality of business information, systems and processes that are in scope by the third-party. o Requires a risk assessment prior to the acquisition or outsourcing of technology-related services. o Monitors, regularly reviews and audits supplier service delivery for compliance with established contract agreements. o Uses tailored acquisition strategies, contract tools and procurement methods for the purchase of unique systems, system components or services. • A Shared Responsibility Matrix (SRM) is documented for every TSP that directly or indirectly affects sensitive/regulated data.
Third-Party Management (TPM) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to conduct a risk assessment prior to the acquisition or outsourcing of technology-related services.
CC3.4 CC9.2
CC9.2-POF2
null
15.5
null
null
15.5
APO10.04
Principle 9
STA-05 STA-13
null
null
null
null
RQ-07-01 RQ-07-02
null
null
null
null
5.19
null
null
null
null
null
null
null
null
null
MANAGE 3.1
ID.DE-P5
null
null
null
SA-9(1)
null
null
null
SA-9(1)
null
null
null
null
SA-9(1)
null
null
null
null
null
SA-9(1)
null
null
null
SA-9(1)
SA-9(1)
null
3.17.2 3.17.3.a 3.17.3.b
null
A.03.17.03.a
null
null
ID.SC-2
GV.SC-05 GV.SC-06
A02:2021 A05:2021
2.4 12.8 12.8.1 12.8.2 12.8.3 12.8.4
12.8.3
12.8.3
12.8.3
12.8.3
12.8.3
12.8.3
12.8.3
12.8.3
12.8.3
12.8.2
B.1.1.1
null
1.3.3 8.2.2
12.1 12.2 12.3 12.4 12.5 12.6 12.7 12.8
7.2.2.5 7.3.2
7.2.2.5 7.3.2
RISK-2.J.MIL3 THIRD-PARTIES-1.C.MIL2 THIRD-PARTIES-2.A.MIL1 THIRD-PARTIES-2.B.MIL1 THIRD-PARTIES-2.C.MIL2 THIRD-PARTIES-2.D.MIL2 THIRD-PARTIES-2.E.MIL2 THIRD-PARTIES-2.F.MIL2 THIRD-PARTIES-2.G.MIL2 THIRD-PARTIES-2.H.MIL3 THIRD-PARTIES-2.I.MIL3 THIRD-PARTIES-2.J.MIL3 THIRD-PARTIES-2.K.MIL3 THIRD-PARTIES-2.L.MIL3 THIRD-PARTIES-2.M.MIL3
EXD:SG2.SP1
5.6
null
null
null
null
null
null
null
SA-9(1)
null
null
null
null
null
null
null
SA-9(1)
null
SA-9(1)
SA-9(1)
null
SA-9(1)
null
SA-9(1)
SA-9(1)
null
null
null
null
null
314.4(f)(1) 314.4(f)(3)
null
null
null
9.L.C
SA-9(1)
null
null
null
null
null
null
null
null
null
null
SA-9(1)
SA-9(1)
null
null
null
null
null
null
null
null
null
17.03(2)(f)(2)
null
null
null
622(2)(d)(A)(v)
null
null
null
null
null
SA-9(1)
null
null
§ 2447(b)(6) § 2447(b)(6)(A) § 2447(b)(6)(B)
3.6.2(74)
Art 28.4(a) Art 28.4(b) Art 28.4(c) Art 28.4(d) Art 28.4(e) Art 29.1(a) Art 29.1(b)
null
null
Article 21.3
null
null
null
null
null
null
null
null
null
9.2 9.5
SSO-02 SSO-04
null
null
null
16.3 16.5 17.3
null
null
null
null
null
null
null
null
null
null
null
4-1-1-1 4-1-1-2
null
3.4.1 3.4.2
1-5-3-4 4-1-3-1
4-1-1-2 4-1-1-4
null
null
Sec 19
null
null
null
null
null
null
A4.a
A4
null
null
null
null
null
null
null
null
1568 1573 1787
null
15 53(a) 53(b)
22 28
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
2.3 4.25 4.27
null
null
null
null
null
null
null
null
null
null
null
x
MA 201 CMR 17 OR 6464A
x
x
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-1 R-AM-2 R-AM-3 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-GV-8 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1
R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
null
NT-1 NT-2 NT-3 NT-4 NT-5 NT-6 NT-7 NT-8 NT-9 NT-10 NT-11 NT-12 NT-13 NT-14 MT-1 MT-2 MT-3 MT-4 MT-5 MT-6 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15 MT-16
NT-1
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
MT-16
null
Third-Party Management
External Connectivity Requirements - Identification of Ports, Protocols & Services
TPM-04.2
Mechanisms exist to require External Service Providers (ESPs) to identify and document the business need for ports, protocols and other services it requires to operate its processes and technologies.
null
E-CPL-06 E-TDA-07
Does the organization require External Service Providers (ESPs) to identify and document the business need for ports, protocols and other services it requires to operate its processes and technologies?
7
Identify
null
X
X
There is no evidence of a capability to require Third-Party Service Providers (TSP) to identify and document the business need for ports, protocols and other services it requires to operate its processes and technologies.
SP-CMM1 is N/A, since a structured process is required to require Third-Party Service Providers (TSP) to identify and document the business need for ports, protocols and other services it requires to operate its processes and technologies.
Third-Party Management (TPM) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Third-party management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for third-party management. • A procurement function maintains a list of all active Third-Party Service Providers (TSP), including pertinent contract information that will assist in a risk assessment. • A Shared Responsibility Matrix (SRM) is documented for every TSP that directly or indirectly affects sensitive/regulated data. • Procurement contracts: o Require TSP to follow secure engineering practices as part of a broader Cybersecurity Supply Chain Risk Management (C-SCRM) initiative. o Contain "break clauses" in all TSP contracts to enable penalty-free, early termination of a contract for cause, based on the TSP's cybersecurity and/ or data privacy practices deficiency(ies).
Third-Party Management (TPM) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Procurement contracts and layered defenses provide safeguards to limit harm from potential adversaries who identify and target the organization's supply chain. • A Governance, Risk & Compliance (GRC) function, or similar function; o provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data with regards to third-party management. o Operates the Cybersecurity Supply Chain Risk Management (C-SCRM) program to identify and mitigate supply chain-related risks and threats. o Evaluates risks associated with weaknesses or deficiencies in supply chain elements identified during first and/ or third-party reviews. o Enables the implementation of third-party management controls. o Ensures the Information Assurance Program (IAP) evaluates applicable cybersecurity & data privacy controls as part of “business as usual” pre-production testing. • A procurement team, or similar function: o Maintains a list of all active Third-Party Service Providers (TSP), including pertinent contract information that will assist in a risk assessment. o Requires TSP to follow secure engineering practices as part of a broader Cybersecurity Supply Chain Risk Management (C-SCRM) initiative. o Includes "break clauses" in all TSP contracts to enable penalty-free, early termination of a contract for cause, based on the TSP's cybersecurity and/ or data privacy practices deficiency(ies). o Controls changes to services by suppliers, taking into account the criticality of business information, systems and processes that are in scope by the third-party. o Requires a risk assessment prior to the acquisition or outsourcing of technology-related services. o Monitors, regularly reviews and audits supplier service delivery for compliance with established contract agreements. o Uses tailored acquisition strategies, contract tools and procurement methods for the purchase of unique systems, system components or services. • A Shared Responsibility Matrix (SRM) is documented for every TSP that directly or indirectly affects sensitive/regulated data.
Third-Party Management (TPM) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to require Third-Party Service Providers (TSP) to identify and document the business need for ports, protocols and other services it requires to operate its processes and technologies.
null
null
null
12.6
null
12.6
12.6
null
null
STA-05 UEM-14
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
SA-9(2)
null
SA-9(2)
SA-9(2)
SA-9(2)
null
null
SA-9(2)
SA-9(2)
null
null
null
SA-9(2)
SA-9(2)
null
null
null
null
null
null
null
NFO - SA-9(2)
null
null
null
null
null
null
null
A02:2021 A05:2021
null
1.2.5
null
1.2.5
null
1.2.5
null
null
1.2.5
1.2.5
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
SA-9(2)
null
null
null
null
null
null
null
SA-9(2
null
SA-9(2
SA-9(2
null
SA-9(2
null
SA-9(2
SA-9(2
null
null
null
null
null
null
null
null
null
9.L.C
SA-9(2)
null
null
null
null
6.4
null
null
null
null
null
SA-9(2
SA-9(2
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
SA-9(2)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
16.3
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
x
null
x
x
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-1 R-AM-2 R-AM-3 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-GV-8 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1
R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
null
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Third-Party Management
Conflict of Interests
TPM-04.3
Mechanisms exist to ensure that the interests of external service providers are consistent with and reflect organizational interests.
- Third-party contract requirements for cybersecurity controls
null
Does the organization ensure that the interests of external service providers are consistent with and reflect organizational interests?
8
Identify
null
null
X
There is no evidence of a capability to ensure that the interests of third-party service providers are consistent with and reflect organizational interests.
Third-Party Management (TPM) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Third-party management is decentralized. • IT personnel use an informal process to govern third-party service providers.
Third-Party Management (TPM) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Third-party management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for third-party management. • A procurement function maintains a list of all active Third-Party Service Providers (TSP), including pertinent contract information that will assist in a risk assessment. • A Shared Responsibility Matrix (SRM) is documented for every TSP that directly or indirectly affects sensitive/regulated data. • Procurement contracts: o Require TSP to follow secure engineering practices as part of a broader Cybersecurity Supply Chain Risk Management (C-SCRM) initiative. o Contain "break clauses" in all TSP contracts to enable penalty-free, early termination of a contract for cause, based on the TSP's cybersecurity and/ or data privacy practices deficiency(ies).
Third-Party Management (TPM) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Procurement contracts and layered defenses provide safeguards to limit harm from potential adversaries who identify and target the organization's supply chain. • A Governance, Risk & Compliance (GRC) function, or similar function; o provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data with regards to third-party management. o Operates the Cybersecurity Supply Chain Risk Management (C-SCRM) program to identify and mitigate supply chain-related risks and threats. o Evaluates risks associated with weaknesses or deficiencies in supply chain elements identified during first and/ or third-party reviews. o Enables the implementation of third-party management controls. o Ensures the Information Assurance Program (IAP) evaluates applicable cybersecurity & data privacy controls as part of “business as usual” pre-production testing. • A procurement team, or similar function: o Maintains a list of all active Third-Party Service Providers (TSP), including pertinent contract information that will assist in a risk assessment. o Requires TSP to follow secure engineering practices as part of a broader Cybersecurity Supply Chain Risk Management (C-SCRM) initiative. o Includes "break clauses" in all TSP contracts to enable penalty-free, early termination of a contract for cause, based on the TSP's cybersecurity and/ or data privacy practices deficiency(ies). o Controls changes to services by suppliers, taking into account the criticality of business information, systems and processes that are in scope by the third-party. o Requires a risk assessment prior to the acquisition or outsourcing of technology-related services. o Monitors, regularly reviews and audits supplier service delivery for compliance with established contract agreements. o Uses tailored acquisition strategies, contract tools and procurement methods for the purchase of unique systems, system components or services. • A Shared Responsibility Matrix (SRM) is documented for every TSP that directly or indirectly affects sensitive/regulated data.
Third-Party Management (TPM) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to ensure that the interests of third-party service providers are consistent with and reflect organizational interests.
CC3.3
null
null
null
null
null
null
null
Principle 8
null
null
null
null
null
RQ-07-01 RQ-07-07
null
null
null
null
5.19
null
null
null
null
null
null
null
null
null
null
null
null
null
null
SA-9(4)
null
null
null
SA-9(4)
null
null
null
null
SA-9(4)
null
null
null
null
null
SA-9(4)
null
null
null
null
SA-9(4)
null
null
null
null
null
null
null
GV.SC-05 GV.SC-06
null
null
null
null
null
null
null
null
null
null
null
null
K.3.10 K.3.10.1 K.3.10.2 K.3.10.3
null
1.3.3 8.2.2
null
null
null
THIRD-PARTIES-1.E.MIL2
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
SA-9(4)
null
SA-9(4)
SA-9(4)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
9.L.C
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
SA-9(4)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
16.3
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Sec 20 Sec 21
null
null
null
null
null
null
A4.a
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
x
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-1 R-AM-2 R-AM-3 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1
R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
null
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15 MT-16
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
MT-16
null
Third-Party Management
Third-Party Processing, Storage and Service Locations
TPM-04.4
Mechanisms exist to restrict the location of information processing/storage based on business requirements.
null
E-AST-23
Does the organization restrict the location of information processing/storage based on business requirements?
10
Identify
null
null
X
There is no evidence of a capability to restrict the location of information processing/storage based on business requirements.
SP-CMM1 is N/A, since a structured process is required to restrict the location of information processing/storage based on business requirements.
Third-Party Management (TPM) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Third-party management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for third-party management. • A procurement function maintains a list of all active Third-Party Service Providers (TSP), including pertinent contract information that will assist in a risk assessment. • A Shared Responsibility Matrix (SRM) is documented for every TSP that directly or indirectly affects sensitive/regulated data. • Procurement contracts: o Require TSP to follow secure engineering practices as part of a broader Cybersecurity Supply Chain Risk Management (C-SCRM) initiative. o Contain "break clauses" in all TSP contracts to enable penalty-free, early termination of a contract for cause, based on the TSP's cybersecurity and/ or data privacy practices deficiency(ies).
Third-Party Management (TPM) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Procurement contracts and layered defenses provide safeguards to limit harm from potential adversaries who identify and target the organization's supply chain. • A Governance, Risk & Compliance (GRC) function, or similar function; o provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data with regards to third-party management. o Operates the Cybersecurity Supply Chain Risk Management (C-SCRM) program to identify and mitigate supply chain-related risks and threats. o Evaluates risks associated with weaknesses or deficiencies in supply chain elements identified during first and/ or third-party reviews. o Enables the implementation of third-party management controls. o Ensures the Information Assurance Program (IAP) evaluates applicable cybersecurity & data privacy controls as part of “business as usual” pre-production testing. • A procurement team, or similar function: o Maintains a list of all active Third-Party Service Providers (TSP), including pertinent contract information that will assist in a risk assessment. o Requires TSP to follow secure engineering practices as part of a broader Cybersecurity Supply Chain Risk Management (C-SCRM) initiative. o Includes "break clauses" in all TSP contracts to enable penalty-free, early termination of a contract for cause, based on the TSP's cybersecurity and/ or data privacy practices deficiency(ies). o Controls changes to services by suppliers, taking into account the criticality of business information, systems and processes that are in scope by the third-party. o Requires a risk assessment prior to the acquisition or outsourcing of technology-related services. o Monitors, regularly reviews and audits supplier service delivery for compliance with established contract agreements. o Uses tailored acquisition strategies, contract tools and procurement methods for the purchase of unique systems, system components or services. • A Shared Responsibility Matrix (SRM) is documented for every TSP that directly or indirectly affects sensitive/regulated data.
Third-Party Management (TPM) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to restrict the location of information processing/storage based on business requirements.
CC9.1
null
null
null
null
null
null
APO10.03
null
null
POL-02
null
null
null
RQ-07-01
null
null
null
null
5.21
6.1.3
null
null
null
null
null
null
OR-3.4
null
null
null
null
null
null
SA-9(5)
null
null
null
PE-23 SA-9(5)
null
null
null
null
PE-23 SA-9(5)
null
null
null
null
null
SA-9(5)
null
null
null
null
SA-9(5)
null
null
null
null
null
null
null
GV.SC-05 GV.SC-06
A02:2021 A05:2021
12.9
3.2.1 12.5.2
3.2.1
3.2.1
null
null
null
null
3.2.1 12.5.2
3.2.1 12.5.2
3.2.1
D.3.1
2.8A
null
null
null
null
THIRD-PARTIES-1.E.MIL2 THIRD-PARTIES-1.F.MIL3
null
null
null
null
null
null
null
null
null
SA-9(5)
null
null
null
null
null
null
null
SA-9(5)
null
SA-9(5)
SA-9(5)
null
SA-9(5)
null
SA-9(5)
SA-9(5)
null
null
null
null
null
314.4(f)(1)
null
null
null
9.L.C
2.C.7 2.C.10 SA-9(5)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
SA-9(5)
null
null
null
null
null
null
Art 6.1 Art 6.4 Art 26.1 Art 26.2 Art 26.3 Art 28.1 Art 28.2 Art 28.3 Art 28.4 Art 28.5 Art 28.6 Art 28.9 Art 28.10 Art 29 Art 44 Art 45.1 Art 45.2 Art 46.1 Art 46.2 Art 46.3 Art 47.1 Art 47.2 Art 48 Art 49.1 Art 49.2 Art 49.6
Article 21.3
null
null
Sec 10
Chapter 4 - Art 16
Art 14 Art 27
Art 41
null
Art 34
null
null
PI-02 PSS-12
null
Sec 7
Sec 2
16.3
Sec 16 Sec 17
Sec 31
null
Art 3 Art 4
Sec 12 Sec 13 Sec 14
null
Sec 13 Sec 14
Art 1 Art 36
Art 14 Art 15
null
Art 7
null
null
null
null
null
null
null
Sec 19 Sec 21
null
null
Sec 31
null
null
null
A4.a
null
null
null
Article 44 Article 45(1) Article 45(2)(a) Article 45(2)(b) Article 45(2)(c) Article 46(1) Article 46(2)(a) Article 46(2)(b) Article 46(2)(c) Article 46(2)(d) Article 46(2)(e) Article 46(2)(f) Article 46(3)(a) Article 46(3)(b)
null
null
null
null
null
1572
null
null
null
null
null
Article 21 Article 38 Article 38(3) Article 40
null
null
Art 1
Article 20
null
Sec 9
null
null
null
Sec 25
Sec 24 Sec 26
null
null
Art 17 Art 27
null
Art 9 Art 26
null
null
null
null
null
null
Sec 20
Art 7
Art 26
null
null
null
Art 23
null
null
null
x
null
x
x
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-1 R-AM-2 R-AM-3 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1
R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
null
NT-1 NT-2 NT-3 NT-4 NT-5 NT-6 NT-7 NT-8 NT-9 NT-10 NT-11 NT-12 NT-13 NT-14 MT-1 MT-2 MT-3 MT-4 MT-5 MT-6 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15 MT-16
NT-1
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
MT-16
null
Third-Party Management
Third-Party Contract Requirements
TPM-05
Mechanisms exist to identify, regularly review and document third-party confidentiality, Non-Disclosure Agreements (NDAs) and other contracts that reflect the organization’s needs to protect systems and data.
- Non-Disclosure Agreements (NDAs)
E-TPM-01 E-TPM-03
Does the organization identify, regularly review and document third-party confidentiality, Non-Disclosure Agreements (NDAs) and other contracts that reflect the organization’s needs to protect systems and data?
10
Identify
X
X
X
There is no evidence of a capability to identify, regularly review and document third-party confidentiality, Non-Disclosure Agreements (NDAs) and other contracts that reflect the organization’s needs to protect systems and data.
Third-Party Management (TPM) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Third-party management is decentralized. • IT personnel use an informal process to govern third-party service providers.
Third-Party Management (TPM) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Third-party management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for third-party management. • A procurement function maintains a list of all active Third-Party Service Providers (TSP), including pertinent contract information that will assist in a risk assessment. • A Shared Responsibility Matrix (SRM) is documented for every TSP that directly or indirectly affects sensitive/regulated data. • Procurement contracts: o Require TSP to follow secure engineering practices as part of a broader Cybersecurity Supply Chain Risk Management (C-SCRM) initiative. o Contain "break clauses" in all TSP contracts to enable penalty-free, early termination of a contract for cause, based on the TSP's cybersecurity and/ or data privacy practices deficiency(ies).
Third-Party Management (TPM) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Procurement contracts and layered defenses provide safeguards to limit harm from potential adversaries who identify and target the organization's supply chain. • A Governance, Risk & Compliance (GRC) function, or similar function; o provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data with regards to third-party management. o Operates the Cybersecurity Supply Chain Risk Management (C-SCRM) program to identify and mitigate supply chain-related risks and threats. o Evaluates risks associated with weaknesses or deficiencies in supply chain elements identified during first and/ or third-party reviews. o Enables the implementation of third-party management controls. o Ensures the Information Assurance Program (IAP) evaluates applicable cybersecurity & data privacy controls as part of “business as usual” pre-production testing. • A procurement team, or similar function: o Maintains a list of all active Third-Party Service Providers (TSP), including pertinent contract information that will assist in a risk assessment. o Requires TSP to follow secure engineering practices as part of a broader Cybersecurity Supply Chain Risk Management (C-SCRM) initiative. o Includes "break clauses" in all TSP contracts to enable penalty-free, early termination of a contract for cause, based on the TSP's cybersecurity and/ or data privacy practices deficiency(ies). o Controls changes to services by suppliers, taking into account the criticality of business information, systems and processes that are in scope by the third-party. o Requires a risk assessment prior to the acquisition or outsourcing of technology-related services. o Monitors, regularly reviews and audits supplier service delivery for compliance with established contract agreements. o Uses tailored acquisition strategies, contract tools and procurement methods for the purchase of unique systems, system components or services. • A Shared Responsibility Matrix (SRM) is documented for every TSP that directly or indirectly affects sensitive/regulated data.
Third-Party Management (TPM) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to identify, regularly review and document third-party confidentiality, Non-Disclosure Agreements (NDAs) and other contracts that reflect the organization’s needs to protect systems and data.
CC9.1
CC1.1-POF5 CC2.3-POF10 CC9.2-POF1 CC9.2-POF3 CC9.2-POF9
null
15.4
null
15.4
15.4
APO10.03
null
IPY-04 SEF-02 STA-02 STA-04 STA-09 STA-12 UEM-14
CLS-04 IMT-01 LGL-05 LGL-06 LGL-07 LGL-08 POL-01 POL-02 SET-04
null
null
null
RQ-06-10 RQ-07-02 RQ-07-03.a RQ-07-03.b RQ-07-03.c RQ-07-04.a RQ-07-04.b RQ-07-04.c RQ-07-04.d RQ-07-04.e RQ-07-04.f RC-07-05 RQ-07-07
null
null
null
13.1.2 13.2.4 15.1.2
5.19 5.20 5.21 5.31 6.6 8.21 8.30
5.1.1 CLD.6.3.1 13.1.2 13.2.4 15.1.2
null
6.10.2.4 6.12.1.2
null
null
null
null
OR-3.4
Sec 4(F)(2) Sec 6(D)(1) Sec 6(D)(2) Sec 6(D)(3)
null
ID.DE-P3 GV.PO-P4 GV.AT-P4
PW.3 PW.3.1
null
null
SA-9(3)
null
null
null
SR-3(3)
null
null
null
null
SA-9(3)
null
null
null
null
null
SA-9(3)
null
null
SA-9(3)
SA-9(3)
SA-9(3)
3.1.1
3.16.3.a 3.16.3.b 3.16.3.c
null
A.03.16.01 A.03.16.01.ODP[01] A.03.16.03.a A.03.16.03.ODP[01] A.03.17.03.b
null
PO.1 PO.1.1 PO.1.2 PO.1.3
ID.SC-3
GV.OC-05 GV.SC-02 GV.SC-05 GV.SC-10
null
2.6 12.9
8.2.3 12.4.2 12.4.2.1 12.8.2 12.8.5 12.9 12.9.1 12.9.2
12.8.2 12.8.5
12.8.2 12.8.5
12.8.2 12.8.5
12.8.2 12.8.5
12.8.2 12.8.5
12.8.2 12.8.5
12.8.2 12.8.5
8.2.3 12.4.2 12.4.2.1 12.8.2 12.8.5 12.9.1 12.9.2
12.8.2 12.8.5
B.1.1.14
2.8A
1.2.4 1.3.3 6.1.1 6.1.2 8.2.1 8.2.2
12.1
7.2.2.5
7.2.2.5
THIRD-PARTIES-2.F.MIL2
null
6.2 6.3
5.1.1.2 5.1.1.3 5.1.1.4 5.1.1.5 5.1.1.6 5.1.1.7 5.1.1.8 5.1.4
AC.L1-3.1.1
AC.L1-3.1.1
null
null
AC.L2-3.1.1
AC.L2-3.1.1
null
null
252.204-7012(m)(1) 252.204-7012(m)(2)(i) 252.204-7012(m)(2)(ii) 252.204-7019(b) 252.204-7019(c)(1) 252.204-7019(c)(2) 252.204-7020(c) 252.204-7021(b) 252.204-7021(c)(1) 252.204-7021(c)(2)
null
52.204-21(c)
52.204-27(b)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
314.4(a) 314.4(a)(1) 314.4(a)(2) 314.4(a)(3) 314.4(e)(2) 314.4(f)(1) 314.4(f)(2) 314.4(f)(3)
164.308(b)(3) 164.314 164.314(a) 164.314(a)(1) 164.314(a)(2) 164.314(a)(2)(i)(A) 164.314(a)(2)(i)(B) 164.314(a)(2)(i)(C) 164.314(a)(2)(ii) 164.314(a)(2)(iii) 164.314(b)(2) 164.314(b)(2)(i) 164.314(b)(2)(ii) 164.314(b)(2)(iii) 164.314(b)(2)(iv)
null
null
9.L.C
2.C.9 SA-9(3)
null
null
null
null
null
null
null
null
5.11
null
null
null
null
null
null
null
null
6-1-1305(3)(b) 6-1-1305(5) 6-1-1305(5)(a) 6-1-1305(5)(b) 6-1-1305(5)(c) 6-1-1305(5)(d) 6-1-1305(5)(d)(I) 6-1-1305(5)(d)(I)(A) 6-1-1305(5)(d)(I)(B) 6-1-1305(6)
null
null
Sec 45(a) Sec 45(b) Sec 45(c) Sec 45(d) Sec 50
null
null
null
null
null
38-99-20(F)(2) 38-99-40(D)(1) 38-99-40(D)(2) 38-99-40(D)(3)
null
null
null
null
null
null
null
§ 2447(b)(6) § 2447(b)(6)(A) § 2447(b)(6)(B)
3.2.3(8) 3.2.3(8)(a) 3.2.3(8)(b)
Art 28.1(a) Art 29.2 Art 30.1 Art 30.2(a) Art 30.2(b) Art 30.2(c) Art 30.2(d) Art 30.2(e) Art 30.2(f) Art 30.2(g) Art 30.2(h) Art 30.3(a) Art 30.3(b) Art 30.3(c) Art 30.3(d) Art 30.3(e)(i) Art 30.3(e)(ii) Art 30.3(e)(iii) Art 30.3(e)(iv) Art 30.3(f)(i) Art 30.3(f)(ii) Art 30.4
null
Art 28.1 Art 28.2 Art 28.3 Art 28.4 Art 28.5 Art 28.6 Art 28.9 Art 28.10 Art 29
Article 21.3
null
Principle 2.3.a Principle 2.3.b(i) Principle 2.3.b(ii) Principle 2.3.b(iii) Principle 2.3.b(iv) Principle 2.3.b(v) Principle 2.3.b(vi) Principle 2.7.a.i Principle 2.7.a.ii Principle 2.7.a.iii Principle 2.7.b Principle 2.7.c Principle 2.7.d Principle 3.10.a.i Principle 3.10.a.ii Principle 3.10.a.ii.1 Principle 3.10.a.ii.2 Principle 3.10.a.ii.3 Principle 3.10.a.iii Principle 3.10.b.i Principle 3.10.c.i
null
null
null
Art 42
null
null
null
9.4
HR-06 PI-02 SSO-02 SSO-05
null
null
null
11.1 11.3 11.10 16.2 19.5 22.4 25.17
null
null
null
null
null
null
null
Art 31
Art 18
Article 12
null
4-1-1 4-1-1-1 4-1-1-2
TPC-25
null
4-1-2 4-1-2-1 4-1-2-2 4-1-2-3
4-1-1-1 4-1-1-3
Article 5 Article 11
null
Sec 20
Art 20 Art 21
7.4.1 [OP.EXT.1]
null
null
null
null
A4.a
null
null
null
Article 3 Article 26(1) Article 26(2) Article 26(3) Article 28(1) Article 28(2) Article 28(3)(a) Article 28(3)(b) Article 28(3)(c) Article 28(3)(d) Article 28(3)(e) Article 28(3)(f) Article 28(3)(g) Article 28(3)(h) Article 28(4) Article 28(5) Article 28(6) Article 28(7) Article 28(8) Article 28(9) Article 28(10) Article 29
null
null
null
null
null
1395 1569 0072 1571 1451 1572 1573 1574 1575 1738
null
15 54(a) 54(b) 54(c) 54(d) 54(e) 54(f) 54(g) 55(a) 55(b) 55(c)
16 20 28
null
null
Article 20 Article 21 Article 38(3) Article 42
null
null
Art 6
Article 22 Article 23(1)(i) Article 23(1)(ii) Article 23(1)(iii) Article 23(1)(iv) Article 23(2) Article 23(2)(i) Article 23(2)(ii) Article 23(2)(iii) Article 23(2)(iv) Article 23(2)(v) Article 23(2)(vi) Article 23(2)(vii) Article 23(2)(viii) Article 23(3) Article 23(4) Article 23(5)(i) Article 23(5)(ii) Article 23(5)(iii) Article 23(6) Article 23(1)
6.3.P 6.3.1.P 6.3.1.1.PB 13.1.2 13.2.4 15.1.2 15.1.2.18.PB
null
null
2.3.30.C.01 23.2.19.C.01
null
Sec 25 Sec 43
null
null
3.4.1 3.4.2 3.4.3
null
null
null
null
null
null
null
2.3 4.26 4.28
null
null
null
null
null
Art 21
null
null
null
null
null
x
FAR 52.204-21 NAIC
null
x
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-1 R-AM-2 R-AM-3 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1
R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
null
NT-1 NT-2 NT-3 NT-4 NT-5 NT-6 NT-7 NT-8 NT-9 NT-10 NT-11 NT-12 NT-13 NT-14 MT-1 MT-2 MT-3 MT-4 MT-5 MT-6 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15 MT-16
NT-1
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
MT-16
- updated DFARS mapping
Third-Party Management
Security Compromise Notification Agreements
TPM-05.1
Mechanisms exist to compel External Service Providers (ESPs) to provide notification of actual or potential compromises in the supply chain that can potentially affect or have adversely affected systems, applications and/or services that the organization utilizes.
null
null
Does the organization compel External Service Providers (ESPs) to provide notification of actual or potential compromises in the supply chain that can potentially affect or have adversely affected systems, applications and/or services that the organization utilizes?
9
Detect
null
X
X
There is no evidence of a capability to compel Third-Party Service Providers (TSP) to provide notification of actual or potential compromises in the supply chain that can potentially affect or have adversely affected systems, applications and/ or services that the organization utilizes.
SP-CMM1 is N/A, since a structured process is required to compel Third-Party Service Providers (TSP) to provide notification of actual or potential compromises in the supply chain that can potentially affect or have adversely affected systems, applications and/ or services that the organization utilizes.
Third-Party Management (TPM) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Third-party management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for third-party management. • A procurement function maintains a list of all active Third-Party Service Providers (TSP), including pertinent contract information that will assist in a risk assessment. • A Shared Responsibility Matrix (SRM) is documented for every TSP that directly or indirectly affects sensitive/regulated data. • Procurement contracts: o Require TSP to follow secure engineering practices as part of a broader Cybersecurity Supply Chain Risk Management (C-SCRM) initiative. o Contain "break clauses" in all TSP contracts to enable penalty-free, early termination of a contract for cause, based on the TSP's cybersecurity and/ or data privacy practices deficiency(ies).
Third-Party Management (TPM) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Procurement contracts and layered defenses provide safeguards to limit harm from potential adversaries who identify and target the organization's supply chain. • A Governance, Risk & Compliance (GRC) function, or similar function; o provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data with regards to third-party management. o Operates the Cybersecurity Supply Chain Risk Management (C-SCRM) program to identify and mitigate supply chain-related risks and threats. o Evaluates risks associated with weaknesses or deficiencies in supply chain elements identified during first and/ or third-party reviews. o Enables the implementation of third-party management controls. o Ensures the Information Assurance Program (IAP) evaluates applicable cybersecurity & data privacy controls as part of “business as usual” pre-production testing. • A procurement team, or similar function: o Maintains a list of all active Third-Party Service Providers (TSP), including pertinent contract information that will assist in a risk assessment. o Requires TSP to follow secure engineering practices as part of a broader Cybersecurity Supply Chain Risk Management (C-SCRM) initiative. o Includes "break clauses" in all TSP contracts to enable penalty-free, early termination of a contract for cause, based on the TSP's cybersecurity and/ or data privacy practices deficiency(ies). o Controls changes to services by suppliers, taking into account the criticality of business information, systems and processes that are in scope by the third-party. o Requires a risk assessment prior to the acquisition or outsourcing of technology-related services. o Monitors, regularly reviews and audits supplier service delivery for compliance with established contract agreements. o Uses tailored acquisition strategies, contract tools and procurement methods for the purchase of unique systems, system components or services. • A Shared Responsibility Matrix (SRM) is documented for every TSP that directly or indirectly affects sensitive/regulated data.
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to compel Third-Party Service Providers (TSP) to provide notification of actual or potential compromises in the supply chain that can potentially affect or have adversely affected systems, applications and/ or services that the organization utilizes.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to compel Third-Party Service Providers (TSP) to provide notification of actual or potential compromises in the supply chain that can potentially affect or have adversely affected systems, applications and/ or services that the organization utilizes.
null
null
null
null
null
null
null
null
null
STA-02
POL-01
null
null
null
null
null
null
null
null
5.21
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
SR-8
null
SR-8
SR-8
SR-8
null
null
SR-8
SR-8
SR-8
null
SR-8
SR-8
null
null
SR-8
SR-8
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
P.8 C.1.8
null
null
null
null
null
null
null
6.2 6.3
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
SR-8
SR-8
SR-8
SR-8
SR-8
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
SR-8
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
A4.a
null
null
null
null
null
null
null
null
null
1576
null
null
null
null
null
null
null
null
null
null
null
null
null
7.2.22.C.01 7.2.23.C.01
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-1 R-AM-2 R-AM-3 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1
R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
null
NT-1 NT-2 NT-3 NT-4 NT-5 NT-6 NT-7 NT-8 NT-9 NT-10 NT-11 NT-12 NT-13 NT-14 MT-1 MT-2 MT-3 MT-4 MT-5 MT-6 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15 MT-16
NT-1
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
MT-16
null
Third-Party Management
Contract Flow-Down Requirements
TPM-05.2
Mechanisms exist to ensure cybersecurity & data privacy requirements are included in contracts that flow-down to applicable sub-contractors and suppliers.
null
null
Does the organization ensure cybersecurity & data privacy requirements are included in contracts that flow-down to applicable sub-contractors and suppliers?
9
Protect
null
X
X
There is no evidence of a capability to ensure cybersecurity & data privacy requirements are included in contracts that flow-down to applicable sub-contractors and suppliers.
SP-CMM1 is N/A, since a structured process is required to ensure cybersecurity & data privacy requirements are included in contracts that flow-down to applicable sub-contractors and suppliers.
Third-Party Management (TPM) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Third-party management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for third-party management. • A procurement function maintains a list of all active Third-Party Service Providers (TSP), including pertinent contract information that will assist in a risk assessment. • A Shared Responsibility Matrix (SRM) is documented for every TSP that directly or indirectly affects sensitive/regulated data. • Procurement contracts: o Require TSP to follow secure engineering practices as part of a broader Cybersecurity Supply Chain Risk Management (C-SCRM) initiative. o Contain "break clauses" in all TSP contracts to enable penalty-free, early termination of a contract for cause, based on the TSP's cybersecurity and/ or data privacy practices deficiency(ies).
Third-Party Management (TPM) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Procurement contracts and layered defenses provide safeguards to limit harm from potential adversaries who identify and target the organization's supply chain. • A Governance, Risk & Compliance (GRC) function, or similar function; o provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data with regards to third-party management. o Operates the Cybersecurity Supply Chain Risk Management (C-SCRM) program to identify and mitigate supply chain-related risks and threats. o Evaluates risks associated with weaknesses or deficiencies in supply chain elements identified during first and/ or third-party reviews. o Enables the implementation of third-party management controls. o Ensures the Information Assurance Program (IAP) evaluates applicable cybersecurity & data privacy controls as part of “business as usual” pre-production testing. • A procurement team, or similar function: o Maintains a list of all active Third-Party Service Providers (TSP), including pertinent contract information that will assist in a risk assessment. o Requires TSP to follow secure engineering practices as part of a broader Cybersecurity Supply Chain Risk Management (C-SCRM) initiative. o Includes "break clauses" in all TSP contracts to enable penalty-free, early termination of a contract for cause, based on the TSP's cybersecurity and/ or data privacy practices deficiency(ies). o Controls changes to services by suppliers, taking into account the criticality of business information, systems and processes that are in scope by the third-party. o Requires a risk assessment prior to the acquisition or outsourcing of technology-related services. o Monitors, regularly reviews and audits supplier service delivery for compliance with established contract agreements. o Uses tailored acquisition strategies, contract tools and procurement methods for the purchase of unique systems, system components or services. • A Shared Responsibility Matrix (SRM) is documented for every TSP that directly or indirectly affects sensitive/regulated data.
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to ensure cybersecurity & data privacy requirements are included in contracts that flow-down to applicable sub-contractors and suppliers.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to ensure cybersecurity & data privacy requirements are included in contracts that flow-down to applicable sub-contractors and suppliers.
null
CC9.2-POF1 CC9.2-POF3 CC9.2-POF9
null
null
null
null
null
null
null
null
null
null
null
null
RQ-06-10 RQ-07-02 RQ-07-03.a RQ-07-03.b RQ-07-03.c RQ-07-04.a RQ-07-04.b RQ-07-04.c RQ-07-04.d RQ-07-04.e RQ-07-04.f RC-07-05 RQ-07-07
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
SR-3(3)
null
null
null
null
null
null
null
null
null
null
SR-3(3)
null
SR-3(3)
null
SR-3(3)
SR-3(3)
3.1.1
3.16.3.a 3.16.3.b 3.16.3.c
null
null
null
null
null
GV.OC-05 GV.SC-02 GV.SC-05 GV.SC-10
null
null
null
null
null
null
null
null
null
null
null
null
null
2.8A
null
null
7.2.2.5
7.2.2.5
null
null
null
null
AC.L1-3.1.1
AC.L1-3.1.1
null
null
AC.L2-3.1.1
AC.L2-3.1.1
null
null
252.204-7012(m)(1) 252.204-7012(m)(2)(i) 252.204-7012(m)(2)(ii) 252.204-7019(b) 252.204-7019(c)(1) 252.204-7019(c)(2) 252.204-7020(c) 252.204-7021(b) 252.204-7021(c)(1) 252.204-7021(c)(2)
null
52.204-21(c)
52.204-27(b)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
2.C.9 SR-3(3)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
3.2.3(8) 3.2.3(8)(a) 3.2.3(8)(b)
Art 29.2
null
null
Article 21.3
null
Principle 2.3.a Principle 2.3.b(i) Principle 2.3.b(ii) Principle 2.3.b(iii) Principle 2.3.b(iv) Principle 2.3.b(v) Principle 2.3.b(vi) Principle 2.7.a.i Principle 2.7.a.ii Principle 2.7.a.iii Principle 2.7.b Principle 2.7.c Principle 2.7.d Principle 3.10.a.i Principle 3.10.a.ii Principle 3.10.a.ii.1 Principle 3.10.a.ii.2 Principle 3.10.a.ii.3 Principle 3.10.a.iii Principle 3.10.b.i Principle 3.10.c.i
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Article 12
null
null
TPC-25
null
null
null
Article 5 Article 11
null
null
null
null
null
null
null
null
A4.a
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
FAR 52.204-21
null
null
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-1 R-AM-2 R-AM-3 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1
R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
null
MT-8 MT-9 MT-12 MT-13 MT-14 MT-15 MT-16
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
MT-8
MT-9
null
null
MT-12
MT-13
MT-14
MT-15
MT-16
- updated DFARS mapping
Third-Party Management
Third-Party Authentication Practices
TPM-05.3
Mechanisms exist to ensure External Service Providers (ESPs) use unique authentication factors for each of its customers.
null
null
Does the organization ensure External Service Providers (ESPs) use unique authentication factors for each of its customers?
8
Protect
null
X
X
There is no evidence of a capability to ensure External Service Providers (ESPs) use unique authentication factors for each of its customers.
SP-CMM1 is N/A, since a structured process is required to ensure External Service Providers (ESPs) use unique authentication factors for each of its customers.
Third-Party Management (TPM) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Third-party management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for third-party management. • A procurement function maintains a list of all active External Service Providers (ESPs), including pertinent contract information that will assist in a risk assessment. • A Shared Responsibility Matrix (SRM) is documented for every TSP that directly or indirectly affects sensitive/regulated data. • Procurement contracts: o Require TSP to follow secure engineering practices as part of a broader Cybersecurity Supply Chain Risk Management (C-SCRM) initiative. o Contain "break clauses" in all TSP contracts to enable penalty-free, early termination of a contract for cause, based on the TSP's cybersecurity and/ or data privacy practices deficiency(ies).
Third-Party Management (TPM) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Procurement contracts and layered defenses provide safeguards to limit harm from potential adversaries who identify and target the organization's supply chain. • A Governance, Risk & Compliance (GRC) function, or similar function; o provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data with regards to third-party management. o Operates the Cybersecurity Supply Chain Risk Management (C-SCRM) program to identify and mitigate supply chain-related risks and threats. o Evaluates risks associated with weaknesses or deficiencies in supply chain elements identified during first and/ or third-party reviews. o Enables the implementation of third-party management controls. o Ensures the Information Assurance Program (IAP) evaluates applicable cybersecurity & data privacy controls as part of “business as usual” pre-production testing. • A procurement team, or similar function: o Maintains a list of all active External Service Providers (ESPs), including pertinent contract information that will assist in a risk assessment. o Requires TSP to follow secure engineering practices as part of a broader Cybersecurity Supply Chain Risk Management (C-SCRM) initiative. o Includes "break clauses" in all TSP contracts to enable penalty-free, early termination of a contract for cause, based on the TSP's cybersecurity and/ or data privacy practices deficiency(ies). o Controls changes to services by suppliers, taking into account the criticality of business information, systems and processes that are in scope by the third-party. o Requires a risk assessment prior to the acquisition or outsourcing of technology-related services. o Monitors, regularly reviews and audits supplier service delivery for compliance with established contract agreements. o Uses tailored acquisition strategies, contract tools and procurement methods for the purchase of unique systems, system components or services. • A Shared Responsibility Matrix (SRM) is documented for every TSP that directly or indirectly affects sensitive/regulated data.
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to ensure External Service Providers (ESPs) use unique authentication factors for each of its customers.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to ensure External Service Providers (ESPs) use unique authentication factors for each of its customers.
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
8.2.3
null
null
null
null
null
null
null
8.2.3
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-1 R-AM-2 R-AM-3 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1
R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
null
MT-8 MT-9 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
MT-8
MT-9
null
null
MT-12
MT-13
MT-14
MT-15
null
null
Third-Party Management
Responsible, Accountable, Supportive, Consulted & Informed (RASCI) Matrix
TPM-05.4
Mechanisms exist to document and maintain a Responsible, Accountable, Supportive, Consulted & Informed (RASCI) matrix, or similar documentation, to delineate assignment for cybersecurity & data privacy controls between internal stakeholders and External Service Providers (ESPs).
- Customer Responsibility Matrix (CRM) - Shared Responsibility Matrix (SRM) - Responsible, Accountable, Supporting, Consulted and Informed (RASCI) matrix
E-CPL-03
Does the organization document and maintain a Responsible, Accountable, Supportive, Consulted & Informed (RASCI) matrix, or similar documentation, to delineate assignment for cybersecurity & data privacy controls between internal stakeholders and External Service Providers (ESPs)?
8
Identify
X
X
X
There is no evidence of a capability to document and maintain a Responsible, Accountable, Supportive, Consulted & Informed (RASCI) matrix, or similar documentation, to delineate assignment for cybersecurity & data privacy controls between internal stakeholders and External Service Providers (ESPs).
SP-CMM1 is N/A, since a structured process is required to document and maintain a Responsible, Accountable, Supportive, Consulted & Informed (RASCI) matrix, or similar documentation, to delineate assignment for cybersecurity & data privacy controls between internal stakeholders and External Service Providers (ESPs).
Third-Party Management (TPM) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Third-party management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for third-party management. • A procurement function maintains a list of all active External Service Providers (ESPs), including pertinent contract information that will assist in a risk assessment. • A Shared Responsibility Matrix (SRM) is documented for every TSP that directly or indirectly affects sensitive/regulated data. • Procurement contracts: o Require TSP to follow secure engineering practices as part of a broader Cybersecurity Supply Chain Risk Management (C-SCRM) initiative. o Contain "break clauses" in all TSP contracts to enable penalty-free, early termination of a contract for cause, based on the TSP's cybersecurity and/ or data privacy practices deficiency(ies).
Third-Party Management (TPM) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Procurement contracts and layered defenses provide safeguards to limit harm from potential adversaries who identify and target the organization's supply chain. • A Governance, Risk & Compliance (GRC) function, or similar function; o provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data with regards to third-party management. o Operates the Cybersecurity Supply Chain Risk Management (C-SCRM) program to identify and mitigate supply chain-related risks and threats. o Evaluates risks associated with weaknesses or deficiencies in supply chain elements identified during first and/ or third-party reviews. o Enables the implementation of third-party management controls. o Ensures the Information Assurance Program (IAP) evaluates applicable cybersecurity & data privacy controls as part of “business as usual” pre-production testing. • A procurement team, or similar function: o Maintains a list of all active External Service Providers (ESPs), including pertinent contract information that will assist in a risk assessment. o Requires TSP to follow secure engineering practices as part of a broader Cybersecurity Supply Chain Risk Management (C-SCRM) initiative. o Includes "break clauses" in all TSP contracts to enable penalty-free, early termination of a contract for cause, based on the TSP's cybersecurity and/ or data privacy practices deficiency(ies). o Controls changes to services by suppliers, taking into account the criticality of business information, systems and processes that are in scope by the third-party. o Requires a risk assessment prior to the acquisition or outsourcing of technology-related services. o Monitors, regularly reviews and audits supplier service delivery for compliance with established contract agreements. o Uses tailored acquisition strategies, contract tools and procurement methods for the purchase of unique systems, system components or services. • A Shared Responsibility Matrix (SRM) is documented for every TSP that directly or indirectly affects sensitive/regulated data.
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to document and maintain a Responsible, Accountable, Supportive, Consulted & Informed (RASCI) matrix, or similar documentation, to delineate assignment for cybersecurity & data privacy controls between internal stakeholders and External Service Providers (ESPs).
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to document and maintain a Responsible, Accountable, Supportive, Consulted & Informed (RASCI) matrix, or similar documentation, to delineate assignment for cybersecurity & data privacy controls between internal stakeholders and External Service Providers (ESPs).
null
CC9.2-POF3
null
null
null
null
null
null
null
null
null
null
null
null
RQ-06-04 RQ-07-02 RQ-07-04.a RQ-07-04.b RC-07-08
null
null
4.3(c)
null
5.23
5.1.1 6.1.1 CLD.6.3.1
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
3.16.3.b
null
A.03.16.03.b A.03.17.03.b
null
PO.2 PO.2.1 PO.2.2 PO.2.3
null
GV.OC-02 GV.OC-04 GV.RM-05 GV.SC-02 GV.SC-05 GV.RR-02 ID.AM-04
null
null
12.4.1 12.8.2 12.8.5 12.9 12.9.1 12.9.2
12.8.2 12.8.5
12.8.2 12.8.5
12.8.2 12.8.5
12.8.2 12.8.5
12.8.2 12.8.5
12.8.2 12.8.5
12.8.2 12.8.5
12.4.1 12.8.2 12.8.5 12.9.1 12.9.2
12.8.2 12.8.5
null
2.8A
1.2.4
null
7.2.2.5
7.2.2.5
THIRD-PARTIES-1.A.MIL1
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
3.2.3(8) 3.2.3(8)(a) 3.2.3(8)(b) 3.3.2(16) 3.5(55)
null
null
null
Article 21.3
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
1-2-1-1
null
null
null
null
null
null
null
null
null
A4.a
A4
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
6.3.P 6.3.1.P 6.3.1.1.PB 6.1.1.13.PB 6.1.3.13.PB
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
RASCI
null
null
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-1 R-AM-2 R-AM-3 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1
R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
null
MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15 MT-16
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
MT-16
null
Third-Party Management
Third-Party Scope Review
TPM-05.5
Mechanisms exist to perform recurring validation of the Responsible, Accountable, Supportive, Consulted & Informed (RASCI) matrix, or similar documentation, to ensure cybersecurity & data privacy control assignments accurately reflect current business practices, compliance obligations, technologies and stakeholders.
null
E-TPM-03
Does the organization perform recurring validation of the Responsible, Accountable, Supportive, Consulted & Informed (RASCI) matrix, or similar documentation, to ensure cybersecurity & data privacy control assignments accurately reflect current business practices, compliance obligations, technologies and stakeholders?
10
Identify
X
X
X
There is no evidence of a capability to perform recurring validation of the Responsible, Accountable, Supportive, Consulted & Informed (RASCI) matrix, or similar documentation, to ensure cybersecurity & data privacy control assignments accurately reflect current business practices, compliance obligations, technologies and stakeholders.
SP-CMM1 is N/A, since a structured process is required to perform recurring validation of the Responsible, Accountable, Supportive, Consulted & Informed (RASCI) matrix, or similar documentation, to ensure cybersecurity & data privacy control assignments accurately reflect current business practices, compliance obligations, technologies and stakeholders.
Third-Party Management (TPM) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Third-party management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for third-party management. • A procurement function maintains a list of all active Third-Party Service Providers (TSP), including pertinent contract information that will assist in a risk assessment. • A Shared Responsibility Matrix (SRM) is documented for every TSP that directly or indirectly affects sensitive/regulated data. • Procurement contracts: o Require TSP to follow secure engineering practices as part of a broader Cybersecurity Supply Chain Risk Management (C-SCRM) initiative. o Contain "break clauses" in all TSP contracts to enable penalty-free, early termination of a contract for cause, based on the TSP's cybersecurity and/ or data privacy practices deficiency(ies).
Third-Party Management (TPM) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Procurement contracts and layered defenses provide safeguards to limit harm from potential adversaries who identify and target the organization's supply chain. • A Governance, Risk & Compliance (GRC) function, or similar function; o provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data with regards to third-party management. o Operates the Cybersecurity Supply Chain Risk Management (C-SCRM) program to identify and mitigate supply chain-related risks and threats. o Evaluates risks associated with weaknesses or deficiencies in supply chain elements identified during first and/ or third-party reviews. o Enables the implementation of third-party management controls. o Ensures the Information Assurance Program (IAP) evaluates applicable cybersecurity & data privacy controls as part of “business as usual” pre-production testing. • A procurement team, or similar function: o Maintains a list of all active Third-Party Service Providers (TSP), including pertinent contract information that will assist in a risk assessment. o Requires TSP to follow secure engineering practices as part of a broader Cybersecurity Supply Chain Risk Management (C-SCRM) initiative. o Includes "break clauses" in all TSP contracts to enable penalty-free, early termination of a contract for cause, based on the TSP's cybersecurity and/ or data privacy practices deficiency(ies). o Controls changes to services by suppliers, taking into account the criticality of business information, systems and processes that are in scope by the third-party. o Requires a risk assessment prior to the acquisition or outsourcing of technology-related services. o Monitors, regularly reviews and audits supplier service delivery for compliance with established contract agreements. o Uses tailored acquisition strategies, contract tools and procurement methods for the purchase of unique systems, system components or services. • A Shared Responsibility Matrix (SRM) is documented for every TSP that directly or indirectly affects sensitive/regulated data.
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to perform recurring validation of the Responsible, Accountable, Supportive, Consulted & Informed (RASCI) matrix, or similar documentation, to ensure cybersecurity & data privacy control assignments accurately reflect current business practices, compliance obligations, technologies and stakeholders.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to perform recurring validation of the Responsible, Accountable, Supportive, Consulted & Informed (RASCI) matrix, or similar documentation, to ensure cybersecurity & data privacy control assignments accurately reflect current business practices, compliance obligations, technologies and stakeholders.
null
CC2.2-POF9
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
3.17.2 3.17.3.a 3.17.3.b
null
A.03.16.03.c
null
null
null
GV.SC-05 ID.IM-02
null
null
12.5.2.1 12.5.3 12.8 12.8.1 A3.2.1 A3.2.3
12.8.1
12.8.1
12.8.1
12.8.1
12.8.1
12.8.1
12.8.1
12.5.2.1 12.5.3 12.8.1
12.8.1
null
2.8A
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
3.5(55)
null
null
null
Article 21.3
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
1793
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
R-AM-3 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-IR-1 R-IR-2 R-IR-3 R-IR-4
null
null
null
null
null
null
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
null
null
null
null
null
null
null
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
R-IR-1
R-IR-2
R-IR-3
R-IR-4
null
null
MT-8 MT-9 MT-12 MT-13 MT-14 MT-15 MT-16
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
MT-8
MT-9
null
null
MT-12
MT-13
MT-14
MT-15
MT-16
null
Third-Party Management
First-Party Declaration (1PD)
TPM-05.6
Mechanisms exist to obtain a First-Party Declaration (1PD) from applicable External Service Providers (ESPs) that provides assurance of compliance with specified statutory, regulatory and contractual obligations for cybersecurity & data privacy controls, including any flow-down requirements to subcontractors.
null
null
Does the organization obtain a First-Party Declaration (1PD) from applicable External Service Providers (ESPs) that provides assurance of compliance with specified statutory, regulatory and contractual obligations for cybersecurity & data privacy controls, including any flow-down requirements to subcontractors?
7
Identify
null
X
null
There is no evidence of a capability to obtain a First-Party Declaration (1PD) from applicable External Service Providers (ESPs) that provides assurance of compliance with specified statutory, regulatory and contractual obligations for cybersecurity & data privacy controls, including any flow-down requirements to subcontractors.
SP-CMM1 is N/A, since a structured process is required to obtain a First-Party Declaration (1PD) from applicable External Service Providers (ESPs) that provides assurance of compliance with specified statutory, regulatory and contractual obligations for cybersecurity & data privacy controls, including any flow-down requirements to subcontractors.
Third-Party Management (TPM) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Third-party management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for third-party management. • A procurement function maintains a list of all active External Service Providers (ESPs), including pertinent contract information that will assist in a risk assessment. • A Shared Responsibility Matrix (SRM) is documented for every TSP that directly or indirectly affects sensitive/regulated data. • Procurement contracts: o Require TSP to follow secure engineering practices as part of a broader Cybersecurity Supply Chain Risk Management (C-SCRM) initiative. o Contain "break clauses" in all TSP contracts to enable penalty-free, early termination of a contract for cause, based on the TSP's cybersecurity and/ or data privacy practices deficiency(ies).
Third-Party Management (TPM) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Procurement contracts and layered defenses provide safeguards to limit harm from potential adversaries who identify and target the organization's supply chain. • A Governance, Risk & Compliance (GRC) function, or similar function; o provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data with regards to third-party management. o Operates the Cybersecurity Supply Chain Risk Management (C-SCRM) program to identify and mitigate supply chain-related risks and threats. o Evaluates risks associated with weaknesses or deficiencies in supply chain elements identified during first and/ or third-party reviews. o Enables the implementation of third-party management controls. o Ensures the Information Assurance Program (IAP) evaluates applicable cybersecurity & data privacy controls as part of “business as usual” pre-production testing. • A procurement team, or similar function: o Maintains a list of all active External Service Providers (ESPs), including pertinent contract information that will assist in a risk assessment. o Requires TSP to follow secure engineering practices as part of a broader Cybersecurity Supply Chain Risk Management (C-SCRM) initiative. o Includes "break clauses" in all TSP contracts to enable penalty-free, early termination of a contract for cause, based on the TSP's cybersecurity and/ or data privacy practices deficiency(ies). o Controls changes to services by suppliers, taking into account the criticality of business information, systems and processes that are in scope by the third-party. o Requires a risk assessment prior to the acquisition or outsourcing of technology-related services. o Monitors, regularly reviews and audits supplier service delivery for compliance with established contract agreements. o Uses tailored acquisition strategies, contract tools and procurement methods for the purchase of unique systems, system components or services. • A Shared Responsibility Matrix (SRM) is documented for every TSP that directly or indirectly affects sensitive/regulated data.
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to obtain a First-Party Declaration (1PD) from applicable External Service Providers (ESPs) that provides assurance of compliance with specified statutory, regulatory and contractual obligations for cybersecurity & data privacy controls, including any flow-down requirements to subcontractors.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to obtain a First-Party Declaration (1PD) from applicable External Service Providers (ESPs) that provides assurance of compliance with specified statutory, regulatory and contractual obligations for cybersecurity & data privacy controls, including any flow-down requirements to subcontractors.
null
CC9.2-POF9 CC9.2-POF11
null
null
null
null
null
null
null
null
null
null
null
null
RQ-07-02 RQ-07-03.a RQ-07-03.b RQ-07-03.c
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
2.8A
8.2.2
null
7.2.2.5
7.2.2.5
THIRD-PARTIES-2.G.MIL2
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
3.2.3(9)
null
null
null
Article 21.3
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-1 R-AM-2 R-AM-3 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1
R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
null
MT-8 MT-9 MT-12 MT-13 MT-14 MT-15 MT-16
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
MT-8
MT-9
null
null
MT-12
MT-13
MT-14
MT-15
MT-16
null
Third-Party Management
Break Clauses
TPM-05.7
Mechanisms exist to include "break clauses" within contracts for failure to meet contract criteria for cybersecurity and/or data privacy controls.
null
E-TPM-05
Does the organization include "break clauses" within contracts for failure to meet contract criteria for cybersecurity and/or data privacy controls?
9
Protect
X
X
null
There is no evidence of a capability to include "break clauses" within contracts for failure to meet contract criteria for cybersecurity and/ or data privacy controls.
SP-CMM1 is N/A, since a structured process is required to include "break clauses" within contracts for failure to meet contract criteria for cybersecurity and/ or data privacy controls.
Third-Party Management (TPM) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Third-party management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for third-party management. • A procurement function maintains a list of all active Third-Party Service Providers (TSP), including pertinent contract information that will assist in a risk assessment. • A Shared Responsibility Matrix (SRM) is documented for every TSP that directly or indirectly affects sensitive/regulated data. • Procurement contracts: o Require TSP to follow secure engineering practices as part of a broader Cybersecurity Supply Chain Risk Management (C-SCRM) initiative. o Contain "break clauses" in all TSP contracts to enable penalty-free, early termination of a contract for cause, based on the TSP's cybersecurity and/ or data privacy practices deficiency(ies).
Third-Party Management (TPM) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Procurement contracts and layered defenses provide safeguards to limit harm from potential adversaries who identify and target the organization's supply chain. • A Governance, Risk & Compliance (GRC) function, or similar function; o provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data with regards to third-party management. o Operates the Cybersecurity Supply Chain Risk Management (C-SCRM) program to identify and mitigate supply chain-related risks and threats. o Evaluates risks associated with weaknesses or deficiencies in supply chain elements identified during first and/ or third-party reviews. o Enables the implementation of third-party management controls. o Ensures the Information Assurance Program (IAP) evaluates applicable cybersecurity & data privacy controls as part of “business as usual” pre-production testing. • A procurement team, or similar function: o Maintains a list of all active Third-Party Service Providers (TSP), including pertinent contract information that will assist in a risk assessment. o Requires TSP to follow secure engineering practices as part of a broader Cybersecurity Supply Chain Risk Management (C-SCRM) initiative. o Includes "break clauses" in all TSP contracts to enable penalty-free, early termination of a contract for cause, based on the TSP's cybersecurity and/ or data privacy practices deficiency(ies). o Controls changes to services by suppliers, taking into account the criticality of business information, systems and processes that are in scope by the third-party. o Requires a risk assessment prior to the acquisition or outsourcing of technology-related services. o Monitors, regularly reviews and audits supplier service delivery for compliance with established contract agreements. o Uses tailored acquisition strategies, contract tools and procurement methods for the purchase of unique systems, system components or services. • A Shared Responsibility Matrix (SRM) is documented for every TSP that directly or indirectly affects sensitive/regulated data.
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to include "break clauses" within contracts for failure to meet contract criteria for cybersecurity and/ or data privacy controls.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to include "break clauses" within contracts for failure to meet contract criteria for cybersecurity and/ or data privacy controls.
null
P6.4-POF2 P6.5-POF1 P6.5-POF2 P6.6-POF1
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
GV.SC-05
null
null
null
null
null
null
null
null
null
null
null
null
null
2.8A
null
null
7.2.2.5
7.2.2.5
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Art 28.7(a) Art 28.7(b) Art 28.7(c) Art 28.7(d) Art 28.8 Art 28.8(a) Art 28.8(b) Art 28.8(c)
null
null
Article 21.3
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
1804
null
50(g)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-2 R-AM-3 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-7 R-GV-8 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1
R-AC-1
R-AC-2
R-AC-3
R-AC-4
null
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
null
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
null
MT-12 MT-13 MT-14 MT-15 MT-16
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
MT-12
MT-13
MT-14
MT-15
MT-16
null
Third-Party Management
Third-Party Personnel Security
TPM-06
Mechanisms exist to control personnel security requirements including security roles and responsibilities for third-party providers.
null
null
Does the organization control personnel security requirements including security roles and responsibilities for third-party providers?
9
Identify
null
X
null
There is no evidence of a capability to control personnel security requirements including security roles and responsibilities for third-party providers.
Third-Party Management (TPM) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Third-party management is decentralized. • IT personnel use an informal process to govern third-party service providers.
Third-Party Management (TPM) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Third-party management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for third-party management. • A procurement function maintains a list of all active Third-Party Service Providers (TSP), including pertinent contract information that will assist in a risk assessment. • A Shared Responsibility Matrix (SRM) is documented for every TSP that directly or indirectly affects sensitive/regulated data. • Procurement contracts: o Require TSP to follow secure engineering practices as part of a broader Cybersecurity Supply Chain Risk Management (C-SCRM) initiative. o Contain "break clauses" in all TSP contracts to enable penalty-free, early termination of a contract for cause, based on the TSP's cybersecurity and/ or data privacy practices deficiency(ies).
Third-Party Management (TPM) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Procurement contracts and layered defenses provide safeguards to limit harm from potential adversaries who identify and target the organization's supply chain. • A Governance, Risk & Compliance (GRC) function, or similar function; o provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data with regards to third-party management. o Operates the Cybersecurity Supply Chain Risk Management (C-SCRM) program to identify and mitigate supply chain-related risks and threats. o Evaluates risks associated with weaknesses or deficiencies in supply chain elements identified during first and/ or third-party reviews. o Enables the implementation of third-party management controls. o Ensures the Information Assurance Program (IAP) evaluates applicable cybersecurity & data privacy controls as part of “business as usual” pre-production testing. • A procurement team, or similar function: o Maintains a list of all active Third-Party Service Providers (TSP), including pertinent contract information that will assist in a risk assessment. o Requires TSP to follow secure engineering practices as part of a broader Cybersecurity Supply Chain Risk Management (C-SCRM) initiative. o Includes "break clauses" in all TSP contracts to enable penalty-free, early termination of a contract for cause, based on the TSP's cybersecurity and/ or data privacy practices deficiency(ies). o Controls changes to services by suppliers, taking into account the criticality of business information, systems and processes that are in scope by the third-party. o Requires a risk assessment prior to the acquisition or outsourcing of technology-related services. o Monitors, regularly reviews and audits supplier service delivery for compliance with established contract agreements. o Uses tailored acquisition strategies, contract tools and procurement methods for the purchase of unique systems, system components or services. • A Shared Responsibility Matrix (SRM) is documented for every TSP that directly or indirectly affects sensitive/regulated data.
Third-Party Management (TPM) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to control personnel security requirements including security roles and responsibilities for third-party providers.
CC9.1
CC1.1-POF5
null
null
null
null
null
APO10.03
null
STA-04
POL-02
null
null
null
null
null
null
null
null
5.2 5.19 8.30
6.1.1
null
null
null
null
null
null
OR-3.4
null
null
ID.IM-P2 GV.PO-P4 GV.AT-P4
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
PO.2 PO.2.1 PO.2.2 PO.2.3
ID.GV-2 PR.AT-3
GV.SC-05 GV.SC-06
null
null
null
null
null
null
null
null
null
null
null
null
K.8.3.1.1
null
6.1.1 6.1.2
12.1
7.2.2.5
7.2.2.5
null
OPD:SG1.SP6
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
D1.G.SP.B.7 D4.RM.Co.B.2 D4.RM.Co.B.5
null
null
null
null
null
null
9.L.C
1.9.3
null
null
null
null
null
null
null
null
5.11
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Article 21.3
null
null
null
null
null
null
null
null
null
null
null
null
null
null
11.1 11.3 18.10 19.5
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
A4.a
null
null
null
null
null
null
null
null
null
1569
null
null
null
null
null
Article 52
null
null
null
null
6.1.1.13.PB 6.1.3.13.PB
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
2.3
null
null
null
null
null
null
null
null
null
null
null
x
null
null
null
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-1 R-AM-2 R-AM-3 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1
R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
null
NT-1 NT-2 NT-3 NT-4 NT-5 NT-6 NT-7 NT-8 NT-9 NT-10 NT-11 NT-12 NT-13 NT-14 MT-1 MT-2 MT-3 MT-4 MT-5 MT-6 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15 MT-16
NT-1
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
MT-16
null
Third-Party Management
Monitoring for Third-Party Information Disclosure
TPM-07
Mechanisms exist to monitor for evidence of unauthorized exfiltration or disclosure of organizational information.
null
null
Does the organization monitor for evidence of unauthorized exfiltration or disclosure of organizational information?
8
Identify
null
X
null
There is no evidence of a capability to monitor for evidence of unauthorized exfiltration or disclosure of organizational information.
SP-CMM1 is N/A, since a structured process is required to monitor for evidence of unauthorized exfiltration or disclosure of organizational information.
Third-Party Management (TPM) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Third-party management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for third-party management. • A procurement function maintains a list of all active Third-Party Service Providers (TSP), including pertinent contract information that will assist in a risk assessment. • A Shared Responsibility Matrix (SRM) is documented for every TSP that directly or indirectly affects sensitive/regulated data. • Procurement contracts: o Require TSP to follow secure engineering practices as part of a broader Cybersecurity Supply Chain Risk Management (C-SCRM) initiative. o Contain "break clauses" in all TSP contracts to enable penalty-free, early termination of a contract for cause, based on the TSP's cybersecurity and/ or data privacy practices deficiency(ies).
Third-Party Management (TPM) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Procurement contracts and layered defenses provide safeguards to limit harm from potential adversaries who identify and target the organization's supply chain. • A Governance, Risk & Compliance (GRC) function, or similar function; o provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data with regards to third-party management. o Operates the Cybersecurity Supply Chain Risk Management (C-SCRM) program to identify and mitigate supply chain-related risks and threats. o Evaluates risks associated with weaknesses or deficiencies in supply chain elements identified during first and/ or third-party reviews. o Enables the implementation of third-party management controls. o Ensures the Information Assurance Program (IAP) evaluates applicable cybersecurity & data privacy controls as part of “business as usual” pre-production testing. • A procurement team, or similar function: o Maintains a list of all active Third-Party Service Providers (TSP), including pertinent contract information that will assist in a risk assessment. o Requires TSP to follow secure engineering practices as part of a broader Cybersecurity Supply Chain Risk Management (C-SCRM) initiative. o Includes "break clauses" in all TSP contracts to enable penalty-free, early termination of a contract for cause, based on the TSP's cybersecurity and/ or data privacy practices deficiency(ies). o Controls changes to services by suppliers, taking into account the criticality of business information, systems and processes that are in scope by the third-party. o Requires a risk assessment prior to the acquisition or outsourcing of technology-related services. o Monitors, regularly reviews and audits supplier service delivery for compliance with established contract agreements. o Uses tailored acquisition strategies, contract tools and procurement methods for the purchase of unique systems, system components or services. • A Shared Responsibility Matrix (SRM) is documented for every TSP that directly or indirectly affects sensitive/regulated data.
Third-Party Management (TPM) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to monitor for evidence of unauthorized exfiltration or disclosure of organizational information.
CC9.1
null
null
null
null
null
null
null
null
STA-11
POL-02
SO4
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
3.1.22.b
null
null
null
null
null
ID.IM-02 DE.CM-06
null
null
null
null
null
null
null
null
null
null
null
null
P.8 C.1.8
null
null
12.1
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
9.L.C
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
17.04(3)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
SSO-04
null
null
null
11.5 11.11
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
4.27
null
null
null
null
null
null
null
null
null
null
null
x
MA 201 CMR 17
null
x
R-AM-3 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-IR-1 R-IR-2 R-IR-4 R-SA-1
null
null
null
null
null
null
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
null
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
R-IR-1
R-IR-2
null
R-IR-4
R-SA-1
null
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Third-Party Management
Review of Third-Party Services
TPM-08
Mechanisms exist to monitor, regularly review and audit External Service Providers (ESPs) for compliance with established contractual requirements for cybersecurity & data privacy controls.
null
E-TPM-03
Does the organization monitor, regularly review and audit External Service Providers (ESPs) for compliance with established contractual requirements for cybersecurity & data privacy controls?
9
Identify
null
X
X
There is no evidence of a capability to monitor, regularly review and audit Third-Party Service Providers (TSP) for compliance with established contractual requirements for cybersecurity & data privacy controls.
SP-CMM1 is N/A, since a structured process is required to monitor, regularly review and audit Third-Party Service Providers (TSP) for compliance with established contractual requirements for cybersecurity & data privacy controls.
Third-Party Management (TPM) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Third-party management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for third-party management. • A procurement function maintains a list of all active Third-Party Service Providers (TSP), including pertinent contract information that will assist in a risk assessment. • A Shared Responsibility Matrix (SRM) is documented for every TSP that directly or indirectly affects sensitive/regulated data. • Procurement contracts: o Require TSP to follow secure engineering practices as part of a broader Cybersecurity Supply Chain Risk Management (C-SCRM) initiative. o Contain "break clauses" in all TSP contracts to enable penalty-free, early termination of a contract for cause, based on the TSP's cybersecurity and/ or data privacy practices deficiency(ies).
Third-Party Management (TPM) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Procurement contracts and layered defenses provide safeguards to limit harm from potential adversaries who identify and target the organization's supply chain. • A Governance, Risk & Compliance (GRC) function, or similar function; o provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data with regards to third-party management. o Operates the Cybersecurity Supply Chain Risk Management (C-SCRM) program to identify and mitigate supply chain-related risks and threats. o Evaluates risks associated with weaknesses or deficiencies in supply chain elements identified during first and/ or third-party reviews. o Enables the implementation of third-party management controls. o Ensures the Information Assurance Program (IAP) evaluates applicable cybersecurity & data privacy controls as part of “business as usual” pre-production testing. • A procurement team, or similar function: o Maintains a list of all active Third-Party Service Providers (TSP), including pertinent contract information that will assist in a risk assessment. o Requires TSP to follow secure engineering practices as part of a broader Cybersecurity Supply Chain Risk Management (C-SCRM) initiative. o Includes "break clauses" in all TSP contracts to enable penalty-free, early termination of a contract for cause, based on the TSP's cybersecurity and/ or data privacy practices deficiency(ies). o Controls changes to services by suppliers, taking into account the criticality of business information, systems and processes that are in scope by the third-party. o Requires a risk assessment prior to the acquisition or outsourcing of technology-related services. o Monitors, regularly reviews and audits supplier service delivery for compliance with established contract agreements. o Uses tailored acquisition strategies, contract tools and procurement methods for the purchase of unique systems, system components or services. • A Shared Responsibility Matrix (SRM) is documented for every TSP that directly or indirectly affects sensitive/regulated data.
Third-Party Management (TPM) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to monitor, regularly review and audit Third-Party Service Providers (TSP) for compliance with established contractual requirements for cybersecurity & data privacy controls.
CC3.4 CC9.1
CC1.4-POF2 CC1.4-POF3 CC9.2-POF6 CC9.2-POF10 CC9.2-POF12
null
15.6
null
null
15.6
APO09.03 APO09.04 APO09.05 APO10.05
Principle 9
STA-05 STA-07 STA-10 STA-11 STA-13 UEM-14
POL-02
SO4
null
null
null
null
null
null
13.1.2 15.2.1
5.19 5.20 5.22 8.21
13.1.2 15.2.1
null
6.12.2 6.12.2.1
null
null
null
T1059.002, T1078, T1204.003, T1505, T1505.001, T1505.002, T1505.004, T1546.006, T1554, T1601, T1601.001, T1601.002
null
null
MANAGE 3.0 MANAGE 3.1
null
PW.3 PW.3.1 PW.3.2
null
null
SA-12(2)
null
null
null
SR-6 SR-6(1)
null
null
SR-6
SR-6
SR-6(1)
null
null
SR-6
SR-6
null
SR-6
null
null
null
SR-6
SR-6
null
null
null
A.03.16.03.c
null
null
ID.SC-4
GV.SC-05 GV.SC-09 ID.IM-02
A02:2021 A05:2021
null
12.4.2 12.4.2.1 12.8.4
12.8.4
12.8.4
12.8.4
12.8.4
12.8.4
12.8.4
12.8.4
12.4.2 12.4.2.1 12.8.4
12.8.4
L.9.4
2.8A
null
12.1
7.2.2.5
7.2.2.5
RISK-2.J.MIL3 THIRD-PARTIES-1.F.MIL3
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
SR-6
null
SR-6
SR-6
null
null
null
null
null
314.4(f)(3)
null
null
null
9.L.C
2.C.10 SR-6
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
§ 2447(b)(6) § 2447(b)(6)(A) § 2447(b)(6)(B)
3.2.3(9)
Art 28.6
null
null
Article 21.3
null
null
null
null
null
null
null
null
null
null
SSO-04 SSO-05
null
null
null
11.4 11.5
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
4-1-1-4
null
null
null
null
null
null
null
null
null
A4.a
null
null
null
null
null
null
null
null
null
1793
null
58(a) 58(b) 58(c)
28
null
null
null
null
null
null
Article 24(3)
13.1.2 15.2.1
null
null
null
null
null
null
null
3.4.3
null
null
null
null
null
null
null
4.27
null
null
null
null
null
null
null
null
null
null
null
x
null
x
x
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-1 R-AM-2 R-AM-3 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1
R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
null
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15 MT-16
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
MT-16
null
Third-Party Management
Third-Party Deficiency Remediation
TPM-09
Mechanisms exist to address weaknesses or deficiencies in supply chain elements identified during independent or organizational assessments of such elements.
null
E-TPM-03
Does the organization address weaknesses or deficiencies in supply chain elements identified during independent or organizational assessments of such elements?
9
Identify
null
X
X
There is no evidence of a capability to address weaknesses or deficiencies in supply chain elements identified during independent or organizational assessments of such elements.
SP-CMM1 is N/A, since a structured process is required to address weaknesses or deficiencies in supply chain elements identified during independent or organizational assessments of such elements.
Third-Party Management (TPM) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Third-party management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for third-party management. • A procurement function maintains a list of all active Third-Party Service Providers (TSP), including pertinent contract information that will assist in a risk assessment. • A Shared Responsibility Matrix (SRM) is documented for every TSP that directly or indirectly affects sensitive/regulated data. • Procurement contracts: o Require TSP to follow secure engineering practices as part of a broader Cybersecurity Supply Chain Risk Management (C-SCRM) initiative. o Contain "break clauses" in all TSP contracts to enable penalty-free, early termination of a contract for cause, based on the TSP's cybersecurity and/ or data privacy practices deficiency(ies).
Third-Party Management (TPM) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Procurement contracts and layered defenses provide safeguards to limit harm from potential adversaries who identify and target the organization's supply chain. • A Governance, Risk & Compliance (GRC) function, or similar function; o provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data with regards to third-party management. o Operates the Cybersecurity Supply Chain Risk Management (C-SCRM) program to identify and mitigate supply chain-related risks and threats. o Evaluates risks associated with weaknesses or deficiencies in supply chain elements identified during first and/ or third-party reviews. o Enables the implementation of third-party management controls. o Ensures the Information Assurance Program (IAP) evaluates applicable cybersecurity & data privacy controls as part of “business as usual” pre-production testing. • A procurement team, or similar function: o Maintains a list of all active Third-Party Service Providers (TSP), including pertinent contract information that will assist in a risk assessment. o Requires TSP to follow secure engineering practices as part of a broader Cybersecurity Supply Chain Risk Management (C-SCRM) initiative. o Includes "break clauses" in all TSP contracts to enable penalty-free, early termination of a contract for cause, based on the TSP's cybersecurity and/ or data privacy practices deficiency(ies). o Controls changes to services by suppliers, taking into account the criticality of business information, systems and processes that are in scope by the third-party. o Requires a risk assessment prior to the acquisition or outsourcing of technology-related services. o Monitors, regularly reviews and audits supplier service delivery for compliance with established contract agreements. o Uses tailored acquisition strategies, contract tools and procurement methods for the purchase of unique systems, system components or services. • A Shared Responsibility Matrix (SRM) is documented for every TSP that directly or indirectly affects sensitive/regulated data.
Third-Party Management (TPM) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to address weaknesses or deficiencies in supply chain elements identified during independent or organizational assessments of such elements.
CC4.2 CC9.1
P6.4-POF2 P6.5-POF1 P6.5-POF2 P6.6-POF1
null
null
null
null
null
APO10.04
Principle 17
SEF-02 SEF-06
POL-01
SO10
null
null
RQ-07-06
null
10.1
null
null
5.19
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
GV.SC-05 GV.SC-06 ID.RA-06
A02:2021 A05:2021
null
A3.3.1.2
null
null
null
null
null
null
null
null
null
T.2.1
2.8A
null
12.1
7.2.2.5
7.2.2.5
RISK-2.J.MIL3
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
9.L.C
null
null
null
null
null
6.11
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
§ 2447(b)(6) § 2447(b)(6)(A) § 2447(b)(6)(B)
null
null
null
null
Article 21.3 Article 21.4
null
null
null
null
null
null
null
null
null
null
SSO-04
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
4-1-2-3
null
null
null
null
null
null
null
null
null
null
A4.a
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
4.7.1
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
2.7 4.27
null
null
null
null
null
null
null
null
null
null
null
x
null
x
x
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-1 R-AM-2 R-AM-3 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1
R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
null
NT-1 NT-2 NT-3 NT-4 NT-5 NT-6 NT-7 NT-8 NT-9 NT-10 NT-11 NT-12 NT-13 NT-14 MT-1 MT-2 MT-3 MT-4 MT-5 MT-6 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15 MT-16
NT-1
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
MT-16
null
Third-Party Management
Managing Changes To Third-Party Services
TPM-10
Mechanisms exist to control changes to services by suppliers, taking into account the criticality of business information, systems and processes that are in scope by the third-party.
- Contact requirement to report changes to service offerings that may impact the contract. - CimTrak Integrity Suite (https://www.cimcor.com/cimtrak/)
null
Does the organization control changes to services by suppliers, taking into account the criticality of business information, systems and processes that are in scope by the third-party?
8
Identify
X
X
X
There is no evidence of a capability to control changes to services by suppliers, taking into account the criticality of business information, systems and processes that are in scope by the third-party.
SP-CMM1 is N/A, since a structured process is required to control changes to services by suppliers, taking into account the criticality of business information, systems and processes that are in scope by the third-party.
Third-Party Management (TPM) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Third-party management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for third-party management. • A procurement function maintains a list of all active Third-Party Service Providers (TSP), including pertinent contract information that will assist in a risk assessment. • A Shared Responsibility Matrix (SRM) is documented for every TSP that directly or indirectly affects sensitive/regulated data. • Procurement contracts: o Require TSP to follow secure engineering practices as part of a broader Cybersecurity Supply Chain Risk Management (C-SCRM) initiative. o Contain "break clauses" in all TSP contracts to enable penalty-free, early termination of a contract for cause, based on the TSP's cybersecurity and/ or data privacy practices deficiency(ies).
Third-Party Management (TPM) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Procurement contracts and layered defenses provide safeguards to limit harm from potential adversaries who identify and target the organization's supply chain. • A Governance, Risk & Compliance (GRC) function, or similar function; o provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data with regards to third-party management. o Operates the Cybersecurity Supply Chain Risk Management (C-SCRM) program to identify and mitigate supply chain-related risks and threats. o Evaluates risks associated with weaknesses or deficiencies in supply chain elements identified during first and/ or third-party reviews. o Enables the implementation of third-party management controls. o Ensures the Information Assurance Program (IAP) evaluates applicable cybersecurity & data privacy controls as part of “business as usual” pre-production testing. • A procurement team, or similar function: o Maintains a list of all active Third-Party Service Providers (TSP), including pertinent contract information that will assist in a risk assessment. o Requires TSP to follow secure engineering practices as part of a broader Cybersecurity Supply Chain Risk Management (C-SCRM) initiative. o Includes "break clauses" in all TSP contracts to enable penalty-free, early termination of a contract for cause, based on the TSP's cybersecurity and/ or data privacy practices deficiency(ies). o Controls changes to services by suppliers, taking into account the criticality of business information, systems and processes that are in scope by the third-party. o Requires a risk assessment prior to the acquisition or outsourcing of technology-related services. o Monitors, regularly reviews and audits supplier service delivery for compliance with established contract agreements. o Uses tailored acquisition strategies, contract tools and procurement methods for the purchase of unique systems, system components or services. • A Shared Responsibility Matrix (SRM) is documented for every TSP that directly or indirectly affects sensitive/regulated data.
Third-Party Management (TPM) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to control changes to services by suppliers, taking into account the criticality of business information, systems and processes that are in scope by the third-party.
CC3.4 CC9.1
CC3.4-POF5
null
15.7
null
null
15.7
APO10.04
Principle 9
STA-05 STA-10 STA-13
null
null
null
null
null
null
null
null
15.2.2
5.20 5.22
15.2.2
null
6.12.2.2
null
null
null
null
null
null
null
null
null
null
null
SA-4
SA-4
SA-4
SA-4
SA-4
SA-4
SA-4
SA-4
SA-4
null
null
SA-4
SA-4
SA-4
null
SA-4
SA-4
null
SA-4
SA-4
SA-4
NFO - SA-4
3.16.1
null
null
null
null
null
GV.SC-05
null
null
null
null
null
null
null
null
null
null
null
null
B.1.1.5 B.1.1.10
2.8A
null
7.1 7.1.1 7.1.2 7.1.3
null
null
THIRD-PARTIES-1.F.MIL3
EXD:SG3.SP4 RTSE:SG1.SP1 RTSE:SG1.SP2 RTSE:SG1.SP3 RTSE:SG1.SP4 RTSE:SG1.SP5
null
null
null
null
null
null
null
null
SA-4
null
null
null
null
null
null
null
SA-4
SA-4
SA-4
SA-4
SA-4
SA-4
SA-4
SA-4
SA-4
SA-4
null
null
null
null
null
null
null
null
9.L.C
SA-4
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
17.03(2)(d)(B)(i)
null
null
null
null
null
null
null
SA-4
SA-4
SA-4
null
null
null
null
null
null
null
Article 21.3
null
null
null
null
null
null
null
null
null
null
SSO-04 SSO-05
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
7.4.2 [OP.EXT.2]
null
null
null
null
A4.a
null
null
null
null
null
null
null
null
null
1794
null
null
null
null
null
null
null
null
null
Article 24(3)
15.2.2
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
4.27
null
null
null
null
null
null
null
null
null
null
null
x
MA 201 CMR 17
null
x
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-1 R-AM-2 R-AM-3 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1
R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
null
NT-1 NT-2 NT-3 NT-4 NT-5 NT-6 NT-7 NT-8 NT-9 NT-10 NT-11 NT-12 NT-13 NT-14 MT-1 MT-2 MT-3 MT-4 MT-5 MT-6 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15 MT-16
NT-1
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
MT-16
null
Third-Party Management
Third-Party Incident Response & Recovery Capabilities
TPM-11
Mechanisms exist to ensure response/recovery planning and testing are conducted with critical suppliers/providers.
null
null
Does the organization ensure response/recovery planning and testing are conducted with critical suppliers/providers?
8
Identify
null
X
null
There is no evidence of a capability to ensure response/recovery planning and testing are conducted with critical suppliers/providers.
SP-CMM1 is N/A, since a structured process is required to ensure response/recovery planning and testing are conducted with critical suppliers/providers.
Third-Party Management (TPM) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Third-party management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for third-party management. • A procurement function maintains a list of all active Third-Party Service Providers (TSP), including pertinent contract information that will assist in a risk assessment. • A Shared Responsibility Matrix (SRM) is documented for every TSP that directly or indirectly affects sensitive/regulated data. • Procurement contracts: o Require TSP to follow secure engineering practices as part of a broader Cybersecurity Supply Chain Risk Management (C-SCRM) initiative. o Contain "break clauses" in all TSP contracts to enable penalty-free, early termination of a contract for cause, based on the TSP's cybersecurity and/ or data privacy practices deficiency(ies).
Third-Party Management (TPM) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Procurement contracts and layered defenses provide safeguards to limit harm from potential adversaries who identify and target the organization's supply chain. • A Governance, Risk & Compliance (GRC) function, or similar function; o provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data with regards to third-party management. o Operates the Cybersecurity Supply Chain Risk Management (C-SCRM) program to identify and mitigate supply chain-related risks and threats. o Evaluates risks associated with weaknesses or deficiencies in supply chain elements identified during first and/ or third-party reviews. o Enables the implementation of third-party management controls. o Ensures the Information Assurance Program (IAP) evaluates applicable cybersecurity & data privacy controls as part of “business as usual” pre-production testing. • A procurement team, or similar function: o Maintains a list of all active Third-Party Service Providers (TSP), including pertinent contract information that will assist in a risk assessment. o Requires TSP to follow secure engineering practices as part of a broader Cybersecurity Supply Chain Risk Management (C-SCRM) initiative. o Includes "break clauses" in all TSP contracts to enable penalty-free, early termination of a contract for cause, based on the TSP's cybersecurity and/ or data privacy practices deficiency(ies). o Controls changes to services by suppliers, taking into account the criticality of business information, systems and processes that are in scope by the third-party. o Requires a risk assessment prior to the acquisition or outsourcing of technology-related services. o Monitors, regularly reviews and audits supplier service delivery for compliance with established contract agreements. o Uses tailored acquisition strategies, contract tools and procurement methods for the purchase of unique systems, system components or services. • A Shared Responsibility Matrix (SRM) is documented for every TSP that directly or indirectly affects sensitive/regulated data.
Third-Party Management (TPM) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to ensure response/recovery planning and testing are conducted with critical suppliers/providers.
CC7.3 P6.5 P6.6
null
null
null
null
null
null
null
null
SEF-02 SEF-06
IMT-01 OPA-05 OPA-06 POL-01
null
null
null
null
null
null
null
null
5.19
null
null
null
null
null
null
null
null
Sec 6(D)(1) Sec 6(D)(2) Sec 6(D)(3)
null
null
null
null
null
null
null
null
null
IR-4(10)
null
null
null
null
IR-4(10)
null
null
null
null
null
IR-4(10)
null
IR-4(10)
null
IR-4(10)
null
null
null
null
null
null
null
ID.SC-5
GV.SC-08
null
null
10.7 10.7.1 10.7.2 10.7.3
null
null
null
null
null
null
10.7.2 10.7.3
10.7.1 10.7.2 10.7.3
null
K.2.9
null
null
null
null
null
null
null
6.2 6.3
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
38-99-40(D)(1) 38-99-40(D)(2) 38-99-40(D)(3)
null
null
null
null
null
null
null
null
3.2.3(8)(b)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
25.17
null
null
null
null
null
null
null
null
null
null
null
null
null
null
4-1-2-2
null
null
null
null
null
null
null
null
null
null
A4.a
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
4.28
null
null
null
null
null
null
null
null
null
null
null
x
NAIC
null
x
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-1 R-AM-2 R-AM-3 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1
R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
null
NT-1 NT-2 NT-3 NT-4 NT-5 NT-6 NT-7 NT-8 NT-9 NT-10 NT-11 NT-12 NT-13 NT-14 MT-1 MT-2 MT-3 MT-4 MT-5 MT-6 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15 MT-16
NT-1
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
MT-16
null
Threat Management
Threat Intelligence Program
THR-01
Mechanisms exist to implement a threat intelligence program that includes a cross-organization information-sharing capability that can influence the development of the system and security architectures, selection of security solutions, monitoring, threat hunting, response and recovery activities.
null
E-THR-04
Does the organization implement a threat intelligence program that includes a cross-organization information-sharing capability that can influence the development of the system and security architectures, selection of security solutions, monitoring, threat hunting, response and recovery activities?
8
Identify
X
X
X
There is no evidence of a capability to implement a threat intelligence program that includes a cross-organization information-sharing capability that can influence the development of the system and security architectures, selection of security solutions, monitoring, threat hunting, response and recovery activities.
Threat Management (THR) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Threat management is decentralized. • IT personnel subscribe to threat feeds to maintain situational awareness of emerging threats.
Threat Management (THR) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Threat management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • The HR department, in conjunction with cybersecurity personnel, helps ensure secure practices are implemented in personnel management operations to help manage threats. • IT/cybersecurity personnel: o Identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for threat management. o Subscribe to threat feeds to maintain situational awareness of emerging threats.
Threat Management (THR) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • The Chief Information Security Officer (CISO), or similar function, analyzes the organization’s business strategy to determine prioritized and authoritative guidance for Thread Management (TM) practices. • The CISO, or similar function, develops a security-focused Concept of Operations (CONOPS) that documents management, operational and technical measures to apply defense-in-depth techniques across the enterprise for TM. • A Governance, Risk & Compliance (GRC) function, or similar function, provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data with regards to TM. • A steering committee is formally established to provide executive oversight of the cybersecurity & data privacy program, including TM. • A Security Operations Center (SOC), or similar function: o Subscribes to threat feeds to maintain situational awareness of emerging threats. o Develops Indicators of Exposure (IOE) to better understand potential attack vectors that attackers could use to attack the organization. o Implements a Threat Awareness Program (TAP) that includes a cross-organization information-sharing capability. o Implements a “threat hunting” capability to actively identify internal threats. • An Integrated Security Incident Response Team (ISIRT), or similar function, exists to form an on-demand, integrated team of cybersecurity, IT, data privacy and business function representatives that can execute coordinated incident response operations, including a cross-discipline incident handling capability. • Cybersecurity personnel enable security awareness training on recognizing and reporting potential indicators of insider threat.
Threat Management (THR) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to implement a threat intelligence program that includes a cross-organization information-sharing capability that can influence the development of the system and security architectures, selection of security solutions, monitoring, threat hunting, response and recovery activities.
CC3.3
CC3.2-POF7 CC3.3-POF1 CC3.3-POF2 CC3.3-POF3 CC3.3-POF4 CC3.3-POF5
null
null
null
null
null
null
Principle 8
null
null
null
null
null
null
null
null
null
null
5.7
null
null
null
null
null
null
null
null
Sec 4(D)(4)
null
null
null
null
null
PM-16
null
null
null
PM-15 PM-16
null
null
null
null
PM-15 PM-16
null
null
null
null
null
PM-15 PM-16
null
null
PM-15 PM-16
PM-15 PM-16
null
3.12.3 3.14.3
3.14.3.a 3.14.3.b 3.14.3.c
null
null
3.11.1e
null
ID.BE-2 ID.RA-3
DE.AE DE.AE-07
null
12.6
6.3 A3.5.1
null
null
null
null
null
null
null
null
null
C.1.7
null
null
null
null
null
THREAT-1.I.MIL2 THREAT-1.L.MIL3 THREAT-1.M.MIL3 THREAT-2.A.MIL1 THREAT-2.B.MIL1 THREAT-2.C.MIL1 THREAT-2.E.MIL2 THREAT-2.F.MIL2 THREAT-2.G.MIL2 THREAT-2.H.MIL2 THREAT-2.I.MIL3 THREAT-2.J.MIL3 THREAT-2.K.MIL3 THREAT-3.A.MIL2 RISK-2.J.MIL3
COMM:SG1.SP1 OTA:SG1.SP2 OTA:SG2.SP1
8.2
null
null
CA.L2-3.12.3 SI.L2-3.14.3
TBD - 3.11.1e
null
CA.L2-3.12.3 SI.L2-3.14.3
CA.L2-3.12.3 SI.L2-3.14.3 RA.L3-3.11.1e
PM-16
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
D1.G.SP.Inn.1
null
null
null
null
8.S.B
null
null
null
null
CIP-014-2 R4
8-103
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
500.1
null
null
38-99-20(D)(4)
null
null
PM-15 PM-16
null
null
null
null
null
null
Art 13.1 Art 45.1 Art 45.1(a) Art 45.1(b) Art 45.1(c) Art 45.2 Art 45.3
null
Art 32.1 Art 32.2
null
null
null
Sec 14 Sec 15
Art 16
null
null
null
null
null
3.10 5.3
null
null
null
null
23.1 23.4
null
null
null
null
null
null
null
null
null
null
null
null
null
3.3.16
2-10-4 2-13-1 2-13-2 2-13-3 2-13-4
null
null
null
null
null
null
null
null
null
null
B4.d C1.d
null
null
null
null
null
null
null
null
null
null
null
null
17
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
4.2.1 13.5.1 13.5.2 14.3.1 14.3.2 14.3.3
null
null
null
null
null
6.2
null
1.3
3.1.2 3.1.5
null
null
null
null
null
null
null
null
null
null
x
NAIC
null
x
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-1 R-AM-2 R-AM-3 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1 R-SA-2
R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
R-SA-2
NT-1 NT-2 NT-3 NT-4 NT-5 NT-6 NT-7 NT-8 NT-9 NT-10 NT-11 NT-12 NT-13 NT-14 MT-1 MT-2 MT-3 MT-4 MT-5 MT-6 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15 MT-16
NT-1
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
MT-16
null
Threat Management
Indicators of Exposure (IOE)
THR-02
Mechanisms exist to develop Indicators of Exposure (IOE) to understand the potential attack vectors that attackers could use to attack the organization.
- Indicators of Exposure (IoE)
E-THR-01
Does the organization develop Indicators of Exposure (IOE) to understand the potential attack vectors that attackers could use to attack the organization?
8
Identify
X
X
X
There is no evidence of a capability to develop Indicators of Exposure (IOE) to understand the potential attack vectors that attackers could use to attack the organization.
SP-CMM1 is N/A, since a structured process is required to develop Indicators of Exposure (IOE) to understand the potential attack vectors that attackers could use to attack the organization.
Threat Management (THR) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Threat management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • The HR department, in conjunction with cybersecurity personnel, helps ensure secure practices are implemented in personnel management operations to help manage threats. • IT/cybersecurity personnel: o Identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for threat management. o Subscribe to threat feeds to maintain situational awareness of emerging threats.
Threat Management (THR) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • A Security Operations Center (SOC), or similar function: o Subscribes to threat feeds to maintain situational awareness of emerging threats. o Develops Indicators of Exposure (IOE) to better understand potential attack vectors that attackers could use to attack the organization. o Implements a Threat Awareness Program (TAP) that includes a cross-organization information-sharing capability. o Implements a “threat hunting” capability to actively identify internal threats. • An Integrated Security Incident Response Team (ISIRT), or similar function, exists to form an on-demand, integrated team of cybersecurity, IT, data privacy and business function representatives that can execute coordinated incident response operations, including a cross-discipline incident handling capability. • Cybersecurity personnel enable security awareness training on recognizing and reporting potential indicators of insider threat.
Threat Management (THR) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
Threat Management (THR) efforts are “world-class” capabilities that leverage predictive analysis (e.g., machine learning, AI, etc.). In addition to CMM Level 4 criteria, CMM Level 5 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Stakeholders make time-sensitive decisions to support operational efficiency, which may include automated remediation actions. ▪ Based on predictive analysis, process improvements are implemented according to “continuous improvement” practices that affect process changes.
CC3.3
null
null
null
null
null
null
null
Principle 8
null
null
null
null
null
RQ-08-01 RQ-08-02
null
null
null
null
5.7
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
DE.AE-07
null
null
null
null
null
null
null
null
null
null
null
null
G.3.2
null
null
null
null
null
null
null
8.2
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
23.3
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
2-12-2-8
null
null
null
null
null
null
null
null
null
B4.d C1.d
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
14.3.1 14.3.2 14.3.3
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
R-AC-4 R-AM-1 R-AM-3 R-BC-1 R-BC-2 R-BC-4 R-BC-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1
null
null
null
R-AC-4
R-AM-1
null
R-AM-3
R-BC-1
R-BC-2
null
R-BC-4
R-BC-5
null
null
null
null
null
R-EX-6
R-EX-7
R-GV-1
R-GV-2
null
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
null
NT-7 MT-1 MT-2 MT-5 MT-6 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
MT-5
MT-6
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Threat Management
Threat Intelligence Feeds
THR-03
Mechanisms exist to maintain situational awareness of evolving threats by leveraging the knowledge of attacker tactics, techniques and procedures to facilitate the implementation of preventative and compensating controls.
- US-CERT mailing lists & feeds - InfraGard - Internal newsletters
E-THR-03
Does the organization maintain situational awareness of evolving threats by leveraging the knowledge of attacker tactics, techniques and procedures to facilitate the implementation of preventative and compensating controls?
8
Identify
X
X
X
There is no evidence of a capability to maintain situational awareness of evolving threats by leveraging the knowledge of attacker tactics, techniques and procedures to facilitate the implementation of preventative and compensating controls.
Threat Management (THR) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Threat management is decentralized. • IT personnel subscribe to threat feeds to maintain situational awareness of emerging threats.
Threat Management (THR) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Threat management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • The HR department, in conjunction with cybersecurity personnel, helps ensure secure practices are implemented in personnel management operations to help manage threats. • IT/cybersecurity personnel: o Identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for threat management. o Subscribe to threat feeds to maintain situational awareness of emerging threats.
Threat Management (THR) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • A Security Operations Center (SOC), or similar function: o Subscribes to threat feeds to maintain situational awareness of emerging threats. o Develops Indicators of Exposure (IOE) to better understand potential attack vectors that attackers could use to attack the organization. o Implements a Threat Awareness Program (TAP) that includes a cross-organization information-sharing capability. o Implements a “threat hunting” capability to actively identify internal threats. • An Integrated Security Incident Response Team (ISIRT), or similar function, exists to form an on-demand, integrated team of cybersecurity, IT, data privacy and business function representatives that can execute coordinated incident response operations, including a cross-discipline incident handling capability. • Cybersecurity personnel enable security awareness training on recognizing and reporting potential indicators of insider threat.
Threat Management (THR) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to maintain situational awareness of evolving threats by leveraging the knowledge of attacker tactics, techniques and procedures to facilitate the implementation of preventative and compensating controls.
null
null
null
null
null
null
null
null
null
null
MON-11
null
null
null
RQ-08-01 RQ-08-02
null
null
7.4 7.4(a) 7.4(b) 7.4(c) 7.4(d)
null
5.7
null
null
null
null
null
null
T1068, T1210, T1211, T1212
TS-4.2
Sec 4(D)(4)
null
null
null
null
null
SI-5 SI-5(1)
SI-5
SI-5
SI-5 SI-5(1)
PM-16(1) SI-5 SI-5(1)
null
SI-5
SI-5
SI-5 SI-5(1)
PM-16(1)
null
SI-5
SI-5
SI-5 SI-5(1)
null
SI-5
SI-5
SI-5
SI-5
SI-5
SI-5
3.14.3
3.2.1.b 3.2.2.b 3.14.3.a
null
A.03.14.03.a A.03.14.03.b[01] A.03.14.03.b[02] A.03.14.03.c
3.14.6e
null
ID.RA-2 RS.AN-5
ID.RA-02 ID.RA-08
null
6.2 12.4
6.3.1
6.3.1
6.3.1
null
6.3.1
6.3.1
6.3.1
6.3.1
6.3.1
null
K.12.4
null
null
null
null
null
THREAT-1.A.MIL1 THREAT-1.L.MIL3 THREAT-1.M.MIL3 THREAT-2.K.MIL3 RISK-2.J.MIL3
COMM:SG2.SP1 COMM:SG2.SP2
4.5 5.2 5.3 8.2
5.10.4.4
null
SI.L2-3.14.3
TBD - 3.14.6e
SI.L1-b.1.xii
SI.L2-3.14.3
SI.L2-3.14.3 SI.L3-3.14.6e
SI-5
null
null
null
52.204-21(b)(1)(xii)
null
null
null
SI-5
SI-5
SI-5
SI-5
SI-5
SI-5
SI-5
SI-5
SI-5
SI-5
null
D2.TI.Ti.B.1
null
null
null
null
8.S.B 8.M.C
null
7.L.A 8.L.B 9.L.D
SI-5
null
null
8-103
17.3
null
null
null
null
null
SI-5
SI-5
SI-5
null
null
null
null
null
null
null
null
null
null
null
null
null
622(2)(d)(B)(iii)
38-99-20(D)(4)
null
null
SI-5
SI-5
SI-5
null
null
null
3.3.3(21)
Art 13.1
null
null
null
null
null
null
null
null
null
null
null
null
5.3
null
null
null
null
23.2
null
null
null
null
null
null
null
null
null
null
null
null
null
null
2-10-3-5 2-13-3-5
1-8-3 2-12-2-8
null
null
null
null
null
null
null
null
null
B4.d C1.d
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
12.1.1 12.1.2 12.1.3
null
null
null
null
null
null
null
3.7
3.1.5
null
null
null
null
null
null
null
null
null
null
x
FAR 52.204-21 NAIC OR 6464A
null
x
R-AM-3 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1
null
null
null
null
null
null
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
null
NT-7 MT-1 MT-2 MT-4 MT-5 MT-6 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Threat Management
Insider Threat Program
THR-04
Mechanisms exist to implement an insider threat program that includes a cross-discipline insider threat incident handling team.
- Insider threat program
E-THR-04
Does the organization implement an insider threat program that includes a cross-discipline insider threat incident handling team?
8
Identify
X
X
X
There is no evidence of a capability to implement an insider threat program that includes a cross-discipline insider threat incident handling team.
Threat Management (THR) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Threat management is decentralized. • IT personnel subscribe to threat feeds to maintain situational awareness of emerging threats. • The HR department, in conjunction with IT/cybersecurity personnel, helps ensure secure practices are implemented in personnel management operations to help manage insider threats.
Threat Management (THR) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Threat management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • The HR department, in conjunction with cybersecurity personnel, helps ensure secure practices are implemented in personnel management operations to help manage threats. • IT/cybersecurity personnel: o Identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for threat management. o Subscribe to threat feeds to maintain situational awareness of emerging threats.
Threat Management (THR) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • A Security Operations Center (SOC), or similar function: o Subscribes to threat feeds to maintain situational awareness of emerging threats. o Develops Indicators of Exposure (IOE) to better understand potential attack vectors that attackers could use to attack the organization. o Implements a Threat Awareness Program (TAP) that includes a cross-organization information-sharing capability. o Implements a “threat hunting” capability to actively identify internal threats. • An Integrated Security Incident Response Team (ISIRT), or similar function, exists to form an on-demand, integrated team of cybersecurity, IT, data privacy and business function representatives that can execute coordinated incident response operations, including a cross-discipline incident handling capability. • Cybersecurity personnel enable security awareness training on recognizing and reporting potential indicators of insider threat. • The HR department, in conjunction with cybersecurity personnel, helps ensure secure practices are implemented in personnel management operations to help manage threats.
Threat Management (THR) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to implement an insider threat program that includes a cross-discipline insider threat incident handling team.
CC3.3
CC3.3-POF1 CC3.3-POF2 CC3.3-POF3 CC3.3-POF4 CC3.3-POF5
null
null
null
null
null
null
Principle 8
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
PM-12
null
null
null
PM-12
null
null
null
null
PM-12
null
null
null
null
null
PM-12
null
null
PM-12
PM-12
PM-12
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
K.16.2
null
null
null
null
null
null
IMC:SG1.SP1
null
null
null
null
null
null
null
null
PM-12
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
PM-12
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
1625 1626
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-1 R-AM-2 R-AM-3 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-GV-8 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1 R-SA-2
R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
R-SA-2
NT-7 MT-1 MT-2 MT-5 MT-6 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
MT-5
MT-6
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Threat Management
Insider Threat Awareness
THR-05
Mechanisms exist to utilize security awareness training on recognizing and reporting potential indicators of insider threat.
null
null
Does the organization utilize security awareness training on recognizing and reporting potential indicators of insider threat?
8
Identify
null
X
null
There is no evidence of a capability to utilize security awareness training on recognizing and reporting potential indicators of insider threat.
Threat Management (THR) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Threat management is decentralized. • IT personnel subscribe to threat feeds to maintain situational awareness of emerging threats.
Threat Management (THR) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Threat management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • The HR department, in conjunction with cybersecurity personnel, helps ensure secure practices are implemented in personnel management operations to help manage threats. • IT/cybersecurity personnel: o Identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for threat management. o Subscribe to threat feeds to maintain situational awareness of emerging threats.
Threat Management (THR) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • A Security Operations Center (SOC), or similar function: o Subscribes to threat feeds to maintain situational awareness of emerging threats. o Develops Indicators of Exposure (IOE) to better understand potential attack vectors that attackers could use to attack the organization. o Implements a Threat Awareness Program (TAP) that includes a cross-organization information-sharing capability. o Implements a “threat hunting” capability to actively identify internal threats. • An Integrated Security Incident Response Team (ISIRT), or similar function, exists to form an on-demand, integrated team of cybersecurity, IT, data privacy and business function representatives that can execute coordinated incident response operations, including a cross-discipline incident handling capability. • Cybersecurity personnel enable security awareness training on recognizing and reporting potential indicators of insider threat.
Threat Management (THR) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to utilize security awareness training on recognizing and reporting potential indicators of insider threat.
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
AT-2(2)
null
AT-2(2)
AT-2(2)
AT-2(2)
null
AT-2(2)
AT-2(2)
AT-2(2)
null
null
AT-2(2)
AT-2(2)
AT-2(2)
null
AT-2(2)
AT-2(2)
AT-2(2)
null
AT-2(2)
null
3.2.3
3.2.1.a.3 3.2.2.a
3.2.3[a] 3.2.3[b]
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
K.16.2
null
null
null
null
null
null
null
null
null
null
AT.L2-3.2.3
AT.L2-3.2.3
null
AT.L2-3.2.3
AT.L2-3.2.3
AT-2(2)
null
null
null
null
null
null
null
AT-2(2)
null
AT-2(2)
AT-2(2)
null
AT-2(2)
AT-2(2)
AT-2(2)
AT-2(2)
AT-2(2)
null
null
null
null
null
null
null
null
null
AT-2(2)
null
null
null
null
null
null
null
null
null
null
AT-2(2)
AT-2(2)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
AT-2(2)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
1625 1626
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
x
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-1 R-AM-2 R-AM-3 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-GV-8 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1 R-SA-2
R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
R-SA-2
NT-7 MT-1 MT-2 MT-5 MT-6 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
MT-5
MT-6
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Threat Management
Vulnerability Disclosure Program (VDP)
THR-06
Mechanisms exist to establish a Vulnerability Disclosure Program (VDP) to assist with the secure development and maintenance of products and services that receives unsolicited input from the public about vulnerabilities in organizational systems, services and processes.
- "bug bounty" program
E-TDA-16
Does the organization establish a Vulnerability Disclosure Program (VDP) to assist with the secure development and maintenance of products and services that receives unsolicited input from the public about vulnerabilities in organizational systems, services and processes?
8
Detect
X
X
X
There is no evidence of a capability to establish a Vulnerability Disclosure Program (VDP) to assist with the secure development and maintenance of products and services that receives unsolicited input from the public about vulnerabilities in organizational systems, services and processes.
SP-CMM1 is N/A, since a structured process is required to establish a Vulnerability Disclosure Program (VDP) to assist with the secure development and maintenance of products and services that receives unsolicited input from the public about vulnerabilities in organizational systems, services and processes.
Threat Management (THR) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Threat management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • The HR department, in conjunction with cybersecurity personnel, helps ensure secure practices are implemented in personnel management operations to help manage threats. • IT/cybersecurity personnel: o Identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for threat management. o Subscribe to threat feeds to maintain situational awareness of emerging threats. • A Vulnerability Disclosure Program (VDP) is formed to receive and triage unsolicited input from the public about vulnerabilities in organizational systems, services and processes.
Threat Management (THR) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • A Security Operations Center (SOC), or similar function: o Subscribes to threat feeds to maintain situational awareness of emerging threats. o Develops Indicators of Exposure (IOE) to better understand potential attack vectors that attackers could use to attack the organization. o Implements a Threat Awareness Program (TAP) that includes a cross-organization information-sharing capability. o Implements a “threat hunting” capability to actively identify internal threats. • An Integrated Security Incident Response Team (ISIRT), or similar function, exists to form an on-demand, integrated team of cybersecurity, IT, data privacy and business function representatives that can execute coordinated incident response operations, including a cross-discipline incident handling capability. • Cybersecurity personnel enable security awareness training on recognizing and reporting potential indicators of insider threat. • A Vulnerability Disclosure Program (VDP) is formed to receive and triage unsolicited input from the public about vulnerabilities in organizational systems, services and processes.
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to establish a Vulnerability Disclosure Program (VDP) to assist with the secure development and maintenance of products and services that receives unsolicited input from the public about vulnerabilities in organizational systems, services and processes.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to establish a Vulnerability Disclosure Program (VDP) to assist with the secure development and maintenance of products and services that receives unsolicited input from the public about vulnerabilities in organizational systems, services and processes.
null
null
null
null
null
null
null
null
null
null
TRN-03 SET-05
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
RA-5(11)
null
RA-5(11)
RA-5(11)
RA-5(11)
null
null
RA-5(11)
RA-5(11)
RA-5(11)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
6.3.1
6.3.1
6.3.1
null
6.3.1
6.3.1
6.3.1
6.3.1
6.3.1
null
null
null
null
null
null
null
null
null
5.2
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
RA-5(11)
RA-5(11)
RA-5(11)
RA-5(11)
RA-5(11)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
1616 1755 1756 1717
Principle 2
null
null
null
null
null
null
null
null
null
null
null
null
5.9.23.C.01 5.9.24.C.01 5.9.24.C.02 5.9.25.C.01 5.9.26.C.01 5.9.26.C.02 5.9.27.C.01
null
null
null
null
13.2.2
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
x
R-AC-3 R-AC-4 R-AM-1 R-AM-2 R-AM-3 R-BC-1 R-BC-2 R-BC-4 R-EX-7 R-GV-1 R-GV-2 R-GV-4 R-GV-5 R-IR-4 R-SA-1
null
null
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
null
R-BC-4
null
null
null
null
null
null
null
R-EX-7
R-GV-1
R-GV-2
null
R-GV-4
R-GV-5
null
null
null
null
null
null
R-IR-4
R-SA-1
null
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Threat Management
Threat Hunting
THR-07
Mechanisms exist to perform cyber threat hunting that uses Indicators of Compromise (IoC) to detect, track and disrupt threats that evade existing security controls.
null
E-THR-05
Does the organization perform cyber threat hunting that uses Indicators of Compromise (IoC) to detect, track and disrupt threats that evade existing security controls?
4
Detect
X
X
X
There is no evidence of a capability to perform cyber threat hunting that uses Indicators of Compromise (IoC) to detect, track and disrupt threats that evade existing security controls.
SP-CMM1 is N/A, since a structured process is required to perform cyber threat hunting that uses Indicators of Compromise (IoC) to detect, track and disrupt threats that evade existing security controls.
Threat Management (THR) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Threat management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • The HR department, in conjunction with cybersecurity personnel, helps ensure secure practices are implemented in personnel management operations to help manage threats. • IT/cybersecurity personnel: o Identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for threat management. o Subscribe to threat feeds to maintain situational awareness of emerging threats.
Threat Management (THR) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • A Security Operations Center (SOC), or similar function: o Subscribes to threat feeds to maintain situational awareness of emerging threats. o Develops Indicators of Exposure (IOE) to better understand potential attack vectors that attackers could use to attack the organization. o Implements a Threat Awareness Program (TAP) that includes a cross-organization information-sharing capability. o Implements a “threat hunting” capability to actively identify internal threats. • An Integrated Security Incident Response Team (ISIRT), or similar function, exists to form an on-demand, integrated team of cybersecurity, IT, data privacy and business function representatives that can execute coordinated incident response operations, including a cross-discipline incident handling capability. • Cybersecurity personnel enable security awareness training on recognizing and reporting potential indicators of insider threat.
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to perform cyber threat hunting that uses Indicators of Compromise (IoC) to detect, track and disrupt threats that evade existing security controls.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to perform cyber threat hunting that uses Indicators of Compromise (IoC) to detect, track and disrupt threats that evade existing security controls.
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
T1068, T1190, T1195, T1195.001, T1195.002, T1210, T1211, T1212
null
null
null
null
null
null
null
null
null
null
null
RA-10 SC-48
null
null
null
null
RA-10 SC-48
null
null
null
null
null
RA-10
null
null
RA-10
RA-10
RA-10
null
null
null
null
3.11.2e
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
7.3.7(a) 7.3.7(b) 7.3.7(c)
7.3.7(a) 7.3.7(b) 7.3.7(c)
RISK-2.J.MIL3
null
null
null
null
null
TBD - 3.11.2e
null
null
RA.L3-3.11.2e
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
C2.b
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
3.1.2 3.1.6
null
null
null
null
null
null
null
null
null
null
null
null
null
null
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-1 R-AM-2 R-AM-3 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-GV-8 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1 R-SA-2
R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
R-SA-2
NT-7 MT-1 MT-2 MT-5 MT-6 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
MT-5
MT-6
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Threat Management
Tainting
THR-08
Mechanisms exist to embed false data or steganographic data in files to enable the organization to determine if data has been exfiltrated and provide a means to identify the individual(s) involved.
null
null
Does the organization embed false data or steganographic data in files to enable the organization to determine if data has been exfiltrated and provide a means to identify the individual(s) involved?
1
Detect
X
X
X
There is no evidence of a capability to embed false data or steganographic data in files to enable the organization to determine if data has been exfiltrated and provide a means to identify the individual(s) involved.
SP-CMM1 is N/A, since a structured process is required to embed false data or steganographic data in files to enable the organization to determine if data has been exfiltrated and provide a means to identify the individual(s) involved.
SP-CMM2 is N/A, since a well-defined process is required to embed false data or steganographic data in files to enable the organization to determine if data has been exfiltrated and provide a means to identify the individual(s) involved.
Threat Management (THR) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • A Security Operations Center (SOC), or similar function: o Subscribes to threat feeds to maintain situational awareness of emerging threats. o Develops Indicators of Exposure (IOE) to better understand potential attack vectors that attackers could use to attack the organization. o Implements a Threat Awareness Program (TAP) that includes a cross-organization information-sharing capability. o Implements a “threat hunting” capability to actively identify internal threats. • An Integrated Security Incident Response Team (ISIRT), or similar function, exists to form an on-demand, integrated team of cybersecurity, IT, data privacy and business function representatives that can execute coordinated incident response operations, including a cross-discipline incident handling capability. • Cybersecurity personnel enable security awareness training on recognizing and reporting potential indicators of insider threat.
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to embed false data or steganographic data in files to enable the organization to determine if data has been exfiltrated and provide a means to identify the individual(s) involved.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to embed false data or steganographic data in files to enable the organization to determine if data has been exfiltrated and provide a means to identify the individual(s) involved.
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
SI-20
null
null
null
null
SI-20
null
null
null
null
null
SI-20
null
SI-20
null
SI-20
SI-20
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
R-AC-4 R-AM-1 R-AM-2 R-AM-3 R-BC-1 R-BC-2 R-BC-4 R-BC-5 R-EX-7 R-GV-1 R-GV-2 R-GV-4 R-GV-5 R-IR-1 R-SA-1
null
null
null
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
null
R-BC-4
R-BC-5
null
null
null
null
null
null
R-EX-7
R-GV-1
R-GV-2
null
R-GV-4
R-GV-5
null
null
null
R-IR-1
null
null
null
R-SA-1
null
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Threat Management
Threat Catalog
THR-09
Mechanisms exist to develop and keep current a catalog of applicable internal and external threats to the organization, both natural and manmade.
null
null
Does the organization develop and keep current a catalog of applicable internal and external threats to the organization, both natural and manmade?
5
Protect
X
X
X
There is no evidence of a capability to develop and keep current a catalog of applicable internal and external threats to the organization, both natural and manmade.
SP-CMM1 is N/A, since a structured process is required to develop and keep current a catalog of applicable internal and external threats to the organization, both natural and manmade.
Threat Management (THR) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Threat management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • The HR department, in conjunction with cybersecurity personnel, helps ensure secure practices are implemented in personnel management operations to help manage threats. • IT/cybersecurity personnel: o Identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for threat management. o Subscribe to threat feeds to maintain situational awareness of emerging threats.
Threat Management (THR) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • A Security Operations Center (SOC), or similar function: o Subscribes to threat feeds to maintain situational awareness of emerging threats. o Develops Indicators of Exposure (IOE) to better understand potential attack vectors that attackers could use to attack the organization. o Implements a Threat Awareness Program (TAP) that includes a cross-organization information-sharing capability. o Implements a “threat hunting” capability to actively identify internal threats. • An Integrated Security Incident Response Team (ISIRT), or similar function, exists to form an on-demand, integrated team of cybersecurity, IT, data privacy and business function representatives that can execute coordinated incident response operations, including a cross-discipline incident handling capability. • Cybersecurity personnel enable security awareness training on recognizing and reporting potential indicators of insider threat.
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to develop and keep current a catalog of applicable internal and external threats to the organization, both natural and manmade.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to develop and keep current a catalog of applicable internal and external threats to the organization, both natural and manmade.
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
ID.RA-03
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
3.3 5.3
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
R-BC-1 R-BC-2 R-EX-5 R-GV-1 R-GV-2 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-IR-4 R-SA-1 R-SA-2
null
null
null
null
null
null
null
R-BC-1
R-BC-2
null
null
null
null
null
null
null
R-EX-5
null
null
R-GV-1
R-GV-2
null
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
null
null
null
R-IR-4
R-SA-1
R-SA-2
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Threat Management
Threat Analysis
THR-10
Mechanisms exist to identify, assess, prioritize and document the potential impact(s) and likelihood(s) of applicable internal and external threats.
null
null
Does the organization identify, assess, prioritize and document the potential impact(s) and likelihood(s) of applicable internal and external threats?
7
Protect
X
X
X
There is no evidence of a capability to embed false data or steganographic data in files to identify, assess, prioritize and document the potential impact(s) and likelihood(s) of applicable internal and external threats.
SP-CMM1 is N/A, since a structured process is required to identify, assess, prioritize and document the potential impact(s) and likelihood(s) of applicable internal and external threats.
Threat Management (THR) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Threat management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • The HR department, in conjunction with cybersecurity personnel, helps ensure secure practices are implemented in personnel management operations to help manage threats. • IT/cybersecurity personnel: o Identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for threat management. o Subscribe to threat feeds to maintain situational awareness of emerging threats.
Threat Management (THR) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • A Security Operations Center (SOC), or similar function: o Subscribes to threat feeds to maintain situational awareness of emerging threats. o Develops Indicators of Exposure (IOE) to better understand potential attack vectors that attackers could use to attack the organization. o Implements a Threat Awareness Program (TAP) that includes a cross-organization information-sharing capability. o Implements a “threat hunting” capability to actively identify internal threats. • An Integrated Security Incident Response Team (ISIRT), or similar function, exists to form an on-demand, integrated team of cybersecurity, IT, data privacy and business function representatives that can execute coordinated incident response operations, including a cross-discipline incident handling capability. • Cybersecurity personnel enable security awareness training on recognizing and reporting potential indicators of insider threat.
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to identify, assess, prioritize and document the potential impact(s) and likelihood(s) of applicable internal and external threats.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to identify, assess, prioritize and document the potential impact(s) and likelihood(s) of applicable internal and external threats.
null
null
null
null
null
null
null
null
null
null
null
null
null
null
PM-06-08 RQ-09-03.a RQ-09-03.b RQ-09-03.c RQ-09-03.d RQ-09-03.e RQ-09-03.f RQ-09-04 RQ-15-01 RQ-15-02 RQ-15-03 RQ-15-04 RQ-15-05 RQ-15-06 RQ-15-07 RQ-15-08 RQ-15-09 RQ-15-10 RQ-15-11.a RQ-15-11.b RQ-15-11.c RQ-15-12.a RQ-15-12.b RQ-15-12.c RQ-15-12.d RQ-15-12.e RQ-15-13.a RQ-15-13.b RQ-15-13.c RQ-15-13.d RQ-15-14 RQ-15-15 RQ-15-16
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
3.14.3.a 3.14.3.b 3.14.3.c
null
null
null
null
null
ID.RA-04
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
17 CFR 229.106(B)(2)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
3.10 5.3
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
R-BC-1 R-BC-2 R-EX-5 R-GV-1 R-GV-2 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-IR-4 R-SA-1 R-SA-2
null
null
null
null
null
null
null
R-BC-1
R-BC-2
null
null
null
null
null
null
null
R-EX-5
null
null
R-GV-1
R-GV-2
null
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
null
null
null
R-IR-4
R-SA-1
R-SA-2
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Vulnerability & Patch Management
Vulnerability & Patch Management Program (VPMP)
VPM-01
Mechanisms exist to facilitate the implementation and monitoring of vulnerability management controls.
- Vulnerability & Patch Management Program (ComplianceForge)
E-MNT-03 E-THR-05 E-VPM-01
Does the organization facilitate the implementation and monitoring of vulnerability management controls?
9
Protect
null
X
X
There is no evidence of a capability to facilitate the implementation and monitoring of vulnerability management controls.
Vulnerability & Patch Management (VPM) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Attack Surface Management (ASM) is decentralized. • IT personnel apply software patches through an informal process. • Occasional vulnerability scanning is conducted on High Value Assets (HVAs).
Vulnerability & Patch Management (VPM) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Attack Surface Management (ASM) is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel: o Identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for ASM. o Apply software patches and other vulnerability remediation efforts. • Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
Vulnerability & Patch Management (VPM) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • The Chief Information Security Officer (CISO), or similar function, analyzes the organization’s business strategy to determine prioritized and authoritative guidance for Attack Surface Management (ASM) practices. • The CISO, or similar function, develops a security-focused Concept of Operations (CONOPS) that documents management, operational and technical measures to apply defense-in-depth techniques across the enterprise for ASM. • A steering committee is formally established to provide executive oversight of the cybersecurity & data privacy program, including ASM. • An IT Asset Management (ITAM) function, or similar function, categorizes devices according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data. • A Governance, Risk & Compliance (GRC) function, or similar function: o Defines the scope of ASM activities. o Provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data with regards to ASM. o Provides oversight of ASM activities to centrally manage the flaw remediation process as part of the organization’s overall Patch& Vulnerability & Patch Management Program (VPMP). • A Security Operations Center (SOC), or similar function: o Manages the identification, tracking and remediation of vulnerabilities. o Utilizes a Security Incident Event monitor (SIEM), or similar automated tool, to monitor for unauthorized activities, accounts, connections, devices and software according to organization-specific Indicators of Compromise (IoC), including feeds from applications, hosts, network devices and vulnerability scanners. • Asset custodians install the latest stable version of security-related updates on all systems within the organization-defined time requirements.
Vulnerability & Patch Management (VPM) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to facilitate the implementation and monitoring of vulnerability management controls.
null
CC3.2-POF7
null
7.0 7.1 18.0
7.1
7.1
7.1
DSS05.07 MEA01.01
null
AIS-07 TVM-01 TVM-02 UEM-07
CLS-06 SAP-05 VLN-01 VLN-02 VLN-04
null
null
null
RQ-08-05 RQ-08-06 RQ-08-07.a RQ-08-07.b
null
null
null
12.6.1
8.8
12.6.1
null
6.9.6 6.9.6.1
null
null
null
T1003, T1003.001, T1027, T1027.002, T1047, T1055, T1055.001, T1055.002, T1055.003, T1055.004, T1055.005, T1055.008, T1055.009, T1055.011, T1055.012, T1055.013, T1055.014, T1059, T1059.001, T1059.005, T1059.006, T1068, T1072, T1106, T1137, T1137.003, T1137.004, T1137.005, T1189, T1190, T1195, T1195.001, T1195.002, T1195.003, T1204, T1204.001, T1204.003, T1210, T1211, T1212, T1213.003, T1221, T1495, T1525, T1542, T1542.001, T1542.003, T1542.004, T1542.005, T1546.006, T1546.010, T1546.011, T1547.006, T1548.002, T1550.002, T1552, T1552.006, T1553, T1553.006, T1555.005, T1559, T1559.002, T1566, T1566.001, T1566.003, T1574, T1574.002, T1601, T1601.001, T1601.002, T1606, T1606.001, T1611
TS-4.0
Sec 4(D)(4)
null
PR.PO-P10
RV.1 RV.1.1 RV.1.2 RV.1.3 RV.3 RV.3.1 RV.3.2
null
null
SI-2 SI-3(2)
SI-2
SI-2 SI-3(2)
SI-2 SI-3(2)
SI-2 SI-3
null
SI-2 SI-3
SI-2 SI-3
SI-2 SI-3
null
null
SI-2 SI-3
SI-2 SI-3
SI-2 SI-3
null
SI-2 SI-3
SI-2 SI-3
SI-2 SI-3
null
SI-2 SI-3
SI-2 SI-3
3.14.1
3.11.2.a 3.11.2.b 3.11.2.c 3.14.1.a 3.14.1.b
3.14.1[a] 3.14.1[b] 3.14.1[c] 3.14.1[d] 3.14.1[e] 3.14.1[f]
A.03.14.01.a[01] A.03.14.01.a[02] A.03.14.01.a[03]
null
null
ID.RA-1 PR.IP-12
ID.RA-01 ID.RA-08
A05:2021 A06:2021
null
6.3 6.3.1 6.3.3 11.3
6.3.1 6.3.3
6.3.1 6.3.3
null
6.3.1 6.3.3
6.3.1 6.3.3
6.3.1 6.3.3
6.3.1 6.3.3
6.3.1 6.3.3
null
T.1
2.2 2.7
5.2.5 5.2.6
null
null
null
THREAT-1.A.MIL1 THREAT-1.B.MIL1 THREAT-1.I.MIL2 RISK-2.I.MIL3
TM:SG4.SP2 VAR:SG1.SP1 VAR:SG2.SP2 VAR:SG2.SP3 VAR:SG3.SP1 VAR:SG4.SP1
5.1 5.2
5.10.4 5.10.4.1
SI.L1-3.14.1
SI.L1-3.14.1
SI.L1-3.14.1
SI.L1-b.1.xii
SI.L2-3.14.1
SI.L2-3.14.1
SI-2 SI-3(2)
null
null
null
52.204-21(b)(1)(xii)
null
null
null
SI-2 SI-3(2)
SI-2
SI-2 SI-3(2)
SI-2 SI-3(2)
SI-2
SI-2 SI-3(2)
SI-2
SI-2 SI-3(2)
SI-2 SI-3(2)
SI-2
null
D2.TI.Ti.B.2 D3.DC.Th.B.1 D1.RM.RA.E.2 D3.DC.Th.E.5 D3.DC.Th.A.1 D3.CC.Re.Ev.2
null
null
314.4(d)(2)
null
2.S.A 7.S.A
2.M.A 7.M.D
2.M.A 7.M.D 7.L.A 7.L.B 9.L.A
SI-2 SI-3
null
null
8-311 8-610
9.1 17.1
null
null
null
null
5.6
SI-2
SI-2
SI-2 SI-3(2)
III.E III.E.1 III.E III.E.2.a III.E.2.b
null
null
null
null
null
null
null
null
null
null
null
null
null
38-99-20(D)(4)
null
null
SI-2 SI-3
SI-2
SI-2 SI-3(2)
null
null
§ 2447(c)(7)
3.3.3(21) 3.4.4(36)(a)
Art 9.4(f) Art 25.1 Art 25.2 Art 25.3
null
Art 32.1 Art 32.2
Article 21.2(e)
null
null
Sec 14 Sec 15
Art 16
null
null
null
null
null
5.6
OPS-18 PSS-02
null
null
null
22.1 22.2
null
null
null
null
null
null
null
null
null
null
null
2-3-1-3 2-9 2-9-2
TPC-11
3.3.17
2-3-4 2-10-1 2-10-2 2-10-3 2-10-4 2-11-1 2-11-2 2-11-3 2-11-4 5-1-3-8
2-9 2-9-1 2-9-2
null
null
Sec 19
null
null
null
null
null
null
B4.d
null
5
null
null
null
null
null
null
null
1163 1460 1143 1493
null
null
17
null
null
null
null
null
null
null
12.6.1 12.6.1.18.PB
null
null
6.2.4.C.01
null
null
null
4.2(a) 4.2(b)
4.2.1 7.4.1 7.4.2
null
null
null
null
null
6.16
null
null
2.2.5 2.6 2.6.1 3.1.2 3.1.3
null
null
null
null
null
null
null
null
null
null
x
FAR 52.204-21 NAIC Lockton
x
x
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-1 R-AM-2 R-AM-3 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-GV-8 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1
R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
null
NT-1 NT-2 NT-3 NT-4 NT-5 NT-6 NT-7 NT-8 NT-9 NT-10 NT-11 NT-12 NT-13 NT-14 MT-1 MT-2 MT-3 MT-4 MT-5 MT-6 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15 MT-16
NT-1
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
MT-16
null
Vulnerability & Patch Management
Attack Surface Scope
VPM-01.1
Mechanisms exist to define and manage the scope for its attack surface management activities.
null
null
Does the organization define and manage the scope for its attack surface management activities?
5
Protect
X
X
null
There is no evidence of a capability to define and manage the scope for its attack surface management activities.
Vulnerability & Patch Management (VPM) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Attack Surface Management (ASM) is decentralized. • IT personnel apply software patches through an informal process. • Occasional vulnerability scanning is conducted on High Value Assets (HVAs).
Vulnerability & Patch Management (VPM) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Attack Surface Management (ASM) is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel: o Defines the scope of ASM activities. o Identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for ASM. o Apply software patches and other vulnerability remediation efforts. • Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
Vulnerability & Patch Management (VPM) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • An IT Asset Management (ITAM) function, or similar function, categorizes devices according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data. • A Governance, Risk & Compliance (GRC) function, or similar function: o Defines the scope of ASM activities. o Provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data with regards to ASM. o Provides oversight of ASM activities to centrally manage the flaw remediation process as part of the organization’s overall Patch& Vulnerability & Patch Management Program (VPMP). • A Security Operations Center (SOC), or similar function: o Manages the identification, tracking and remediation of vulnerabilities. o Utilizes a Security Incident Event monitor (SIEM), or similar automated tool, to monitor for unauthorized activities, accounts, connections, devices and software according to organization-specific Indicators of Compromise (IoC), including feeds from applications, hosts, network devices and vulnerability scanners. • Asset custodians install the latest stable version of security-related updates on all systems within the organization-defined time requirements.
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to define and manage the scope for its attack surface management activities.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to define and manage the scope for its attack surface management activities.
null
CC2.2-POF9
null
null
null
null
null
MEA01.01
null
TVM-07
CLS-06 VLN-02 SET-01 SET-04
null
null
null
RQ-09-01.a RQ-09-01.b RQ-09-01.c RQ-09-02
null
4.3
null
null
8.8
null
null
null
null
null
null
null
TS-4.0
null
null
null
null
null
null
null
null
null
null
SA-11(6) SA-11(7)
null
null
null
null
SA-11(6) SA-11(7)
null
null
null
null
null
null
null
null
null
null
null
null
3.11.2.a 3.14.1.a
null
null
3.14.3e
null
null
null
null
null
6.3.1 6.3.2 11.3.1 11.3.1.1 11.3.1.2 11.3.1.3 11.3.2 11.3.2.1
6.3.1
6.3.1 6.3.2
null
6.3.1
6.3.1 11.3.1 11.3.1.3 11.3.1.2 11.3.2.1
6.3.1
6.3.1 6.3.2 11.3.1 11.3.1.1 11.3.1.2 11.3.1.3 11.3.1.2 11.3.2.1
6.3.1 6.3.2 11.3.1 11.3.1.1 11.3.1.2 11.3.1.3 11.3.1.2 11.3.2.1
null
T.1 T.1.1 T.1.2
2.2 2.7 7.3A
5.2.5 5.2.6
null
null
null
THREAT-1.A.MIL1 THREAT-1.B.MIL1 THREAT-1.D.MIL1 THREAT-1.E.MIL2 THREAT-1.J.MIL3
VAR:SG1.SP1
null
null
null
null
TBD - 3.14.3e
null
null
SI.L3-3.14.3e
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
SA-11(6)
null
null
null
9.1 17.1
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
PSS-02
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
2-10-1-1
TPC-27 TPC-28 TPC-29
null
2-11-3-1 5-1-3-8
2-9-1-1
null
null
null
null
null
null
null
null
null
B4.d
null
null
null
null
Principle 2.1 Principle 2.2 Principle 2.3 Principle 2.4 Principle 6.3 Principle 6.4 Principle 6.5 Principle 6.6
Principle 2.1 Principle 2.2 Principle 2.3 Principle 2.4 Principle 2.5 Principle 6.1 Principle 6.2 Principle 6.3 Principle 6.4
Principle 2.1 Principle 2.2 Principle 2.3 Principle 2.4 Principle 2.5 Principle 6.1 Principle 6.2 Principle 6.3 Principle 6.4
null
null
null
null
null
null
null
null
null
null
null
null
null
4.4.4
null
null
6.2.4.C.01
null
null
null
null
13.1.2
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
x
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-1 R-AM-2 R-AM-3 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-GV-8 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1
R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
null
NT-1 NT-2 NT-3 NT-4 NT-5 NT-6 NT-7 NT-8 NT-9 NT-10 NT-11 NT-12 NT-13 NT-14 MT-1 MT-2 MT-3 MT-4 MT-5 MT-6 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15
NT-1
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Vulnerability & Patch Management
Vulnerability Remediation Process
VPM-02
Mechanisms exist to ensure that vulnerabilities are properly identified, tracked and remediated.
- CimTrak Integrity Suite (https://www.cimcor.com/cimtrak/) - NNT Change Tracker (https://www.newnettechnologies.com)
null
Does the organization ensure that vulnerabilities are properly identified, tracked and remediated?
10
Protect
X
X
X
There is no evidence of a capability to ensure that vulnerabilities are properly identified, tracked and remediated.
SP-CMM1 is N/A, since a structured process is required to ensure that vulnerabilities are properly identified, tracked and remediated.
Vulnerability & Patch Management (VPM) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Attack Surface Management (ASM) is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel: o Identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for ASM. o Apply software patches and other vulnerability remediation efforts. • Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
Vulnerability & Patch Management (VPM) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • An IT Asset Management (ITAM) function, or similar function, categorizes devices according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data. • A Governance, Risk & Compliance (GRC) function, or similar function: o Defines the scope of ASM activities. o Provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data with regards to ASM. o Provides oversight of ASM activities to centrally manage the flaw remediation process as part of the organization’s overall Patch& Vulnerability & Patch Management Program (VPMP). • A Security Operations Center (SOC), or similar function: o Manages the identification, tracking and remediation of vulnerabilities. o Utilizes a Security Incident Event monitor (SIEM), or similar automated tool, to monitor for unauthorized activities, accounts, connections, devices and software according to organization-specific Indicators of Compromise (IoC), including feeds from applications, hosts, network devices and vulnerability scanners. • Asset custodians install the latest stable version of security-related updates on all systems within the organization-defined time requirements.
Vulnerability & Patch Management (VPM) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
Vulnerability & Patch Management (VPM) efforts are “world-class” capabilities that leverage predictive analysis (e.g., machine learning, AI, etc.). In addition to CMM Level 4 criteria, CMM Level 5 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Stakeholders make time-sensitive decisions to support operational efficiency, which may include automated remediation actions. ▪ Based on predictive analysis, process improvements are implemented according to “continuous improvement” practices that affect process changes.
CC4.2
CC5.3-POF4
null
7.2 7.7
7.2
7.2 7.7
7.2 7.7
DSS03.01 DSS03.02 DSS03.03 DSS03.04 DSS03.05 DSS06.04 MEA01.05
Principle 17
AIS-07 TVM-03
CLS-06 VLN-02 VLN-04
null
null
null
RQ-08-07.b RQ-08-08 RQ-09-04 RQ-09-07.a RQ-09-07.b RQ-09-07.c RQ-09-07.d RQ-15-17.a RQ-15-17.b RQ-15-17.c RQ-15-17.d
null
10.1
null
12.6.1
8.8
12.6.1
null
null
null
null
null
null
TS-4.0
null
null
null
RV.2 RV.2.1 RV.2.2
null
null
PM-4 SC-18(1)
null
null
null
PM-4 SC-18(1)
null
null
null
null
PM-4 SC-18(1)
null
null
null
null
null
PM-4
null
null
null
PM-4
PM-4
null
3.11.2.b 3.14.1.a
3.11.3[a] 3.11.3[b]
null
null
null
RS.MI-3
ID.RA-01 ID.RA-06 ID.RA-08
A05:2021 A06:2021
null
11.3 11.3.1 11.3.1.1 11.3.1.2 11.3.1.3 11.3.2 11.3.2.1 A3.3.1.2
11.3.2 11.3.2.1
11.3.2 11.3.2.1
null
11.3.2
11.3.1 11.3.1.3 11.3.1.2 11.3.2.1
null
11.3.1 11.3.1.1 11.3.1.2 11.3.1.3 11.3.1.2 11.3.2.1
11.3.1 11.3.1.1 11.3.1.2 11.3.1.3 11.3.1.2 11.3.2.1
null
T.1.3
2.2 2.7
null
7.1
null
null
THREAT-1.G.MIL2 THREAT-1.H.MIL2 THREAT-2.D.MIL1 RISK-2.I.MIL3
EC:SG3.SP2 EF:SG2.SP1 EF:SG2.SP2 KIM:SG3.SP2 PM:SG2.SP2 RISK:SG5.SP1 TM:SG3.SP2 VAR:SG1.SP2
null
null
null
null
null
SI.L1-b.1.xii
null
null
PM-4
null
null
null
52.204-21(b)(1)(xii)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
2.S.A 7.S.A
2.M.A 7.M.D
2.M.A 7.M.D 7.L.B
PM-4 SC-18(1)
null
null
null
9.1 17.1
6.11
null
null
null
5.6
null
null
null
III.E.2.a III.E.2.b
null
null
null
null
null
null
null
null
17.03(2)(j)
null
null
null
622(2)(d)(A)(i)
null
null
null
PM-4
null
null
null
null
null
null
null
null
null
Article 21.4
null
null
null
null
null
null
null
null
null
null
OPS-18 PSS-02
null
null
null
22.8 22.11 22.13
null
null
null
null
null
null
null
null
null
null
null
2-9-1-2
TPC-11 TPC-91
null
2-10-3-3 5-1-3-8
2-9-1-2
null
null
null
null
null
null
null
null
null
B4.d
null
5
null
null
null
null
null
null
null
null
null
null
21
null
null
null
null
null
null
null
4.7.1 12.6.1 12.6.1.18.PB
null
null
6.2.6.C.01 23.2.19.C.01
null
null
null
4.2(a) 4.2(b)
13.6.1(a) 13.6.1(b) 13.6.1(c)
null
null
null
null
null
null
null
2.7
3.2.6
null
null
null
null
null
null
null
null
null
null
x
FAR 52.204-21 MA 201 CMR 17 OR 6464A
x
x
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-1 R-AM-2 R-AM-3 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-GV-8 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1
R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
null
NT-1 NT-2 NT-3 NT-4 NT-5 NT-6 NT-7 NT-8 NT-9 NT-10 NT-11 NT-12 NT-13 NT-14 MT-1 MT-2 MT-3 MT-4 MT-5 MT-6 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15
NT-1
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Vulnerability & Patch Management
Vulnerability Ranking
VPM-03
Mechanisms exist to identify and assign a risk ranking to newly discovered security vulnerabilities using reputable outside sources for security vulnerability information.
- US-CERT
null
Does the organization identify and assign a risk ranking to newly discovered security vulnerabilities using reputable outside sources for security vulnerability information?
8
Identify
null
X
null
There is no evidence of a capability to identify and assign a risk ranking to newly discovered security vulnerabilities using reputable outside sources for security vulnerability information.
SP-CMM1 is N/A, since a structured process is required to identify and assign a risk ranking to newly discovered security vulnerabilities using reputable outside sources for security vulnerability information.
Vulnerability & Patch Management (VPM) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Attack Surface Management (ASM) is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel: o Identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for ASM. o Apply software patches and other vulnerability remediation efforts. • Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
Vulnerability & Patch Management (VPM) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • An IT Asset Management (ITAM) function, or similar function, categorizes devices according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data. • A Governance, Risk & Compliance (GRC) function, or similar function: o Defines the scope of ASM activities. o Provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data with regards to ASM. o Provides oversight of ASM activities to centrally manage the flaw remediation process as part of the organization’s overall Patch& Vulnerability & Patch Management Program (VPMP). • A Security Operations Center (SOC), or similar function: o Manages the identification, tracking and remediation of vulnerabilities. o Utilizes a Security Incident Event monitor (SIEM), or similar automated tool, to monitor for unauthorized activities, accounts, connections, devices and software according to organization-specific Indicators of Compromise (IoC), including feeds from applications, hosts, network devices and vulnerability scanners. • Asset custodians install the latest stable version of security-related updates on all systems within the organization-defined time requirements.
Vulnerability & Patch Management (VPM) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to identify and assign a risk ranking to newly discovered security vulnerabilities using reputable outside sources for security vulnerability information.
null
null
null
null
null
null
null
null
null
TVM-08
VLN-04
null
null
null
RQ-08-05 RQ-08-06 RQ-08-07.a RQ-09-03.c
null
null
null
null
8.8
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
RS.AN-5
ID.RA-01 ID.RA-05
A05:2021 A06:2021
6.1
6.3.1 11.3
6.3.1
6.3.1
null
6.3.1
6.3.1
6.3.1
6.3.1
6.3.1
null
T.1.6
null
null
null
null
null
THREAT-1.G.MIL2 RISK-2.I.MIL3
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
7.M.D
7.M.D
null
null
null
null
null
null
null
null
null
null
null
null
null
III.E.2.b
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
OPS-18 OPS-22 PSS-02
null
null
null
22.8
null
null
null
null
null
null
null
null
null
null
null
2-9-1-2
null
null
2-10-3-2
2-9-1-2 2-9-1-3
null
null
null
null
null
null
null
null
null
B4.d
null
null
null
null
null
null
null
null
null
1163
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
x
null
x
null
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-1 R-AM-2 R-AM-3 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-GV-8 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1
R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
null
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Vulnerability & Patch Management
Vulnerability Exploitation Analysis
VPM-03.1
Mechanisms exist to identify, assess, prioritize and document the potential impact(s) and likelihood(s) of applicable internal and external threats exploiting known vulnerabilities.
null
null
Does the organization identify, assess, prioritize and document the potential impact(s) and likelihood(s) of applicable internal and external threats exploiting known vulnerabilities?
5
Protect
null
X
X
There is no evidence of a capability to identify, assess, prioritize and document the potential impact(s) and likelihood(s) of applicable internal and external threats exploiting known vulnerabilities.
SP-CMM1 is N/A, since a structured process is required to identify, assess, prioritize and document the potential impact(s) and likelihood(s) of applicable internal and external threats exploiting known vulnerabilities.
Vulnerability & Patch Management (VPM) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Attack Surface Management (ASM) is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel: o Identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for ASM. o Apply software patches and other vulnerability remediation efforts. • Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
Vulnerability & Patch Management (VPM) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • An IT Asset Management (ITAM) function, or similar function, categorizes devices according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data. • A Governance, Risk & Compliance (GRC) function, or similar function: o Defines the scope of ASM activities. o Provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data with regards to ASM. o Provides oversight of ASM activities to centrally manage the flaw remediation process as part of the organization’s overall Patch& Vulnerability & Patch Management Program (VPMP). • A Security Operations Center (SOC), or similar function: o Manages the identification, tracking and remediation of vulnerabilities. o Utilizes a Security Incident Event monitor (SIEM), or similar automated tool, to monitor for unauthorized activities, accounts, connections, devices and software according to organization-specific Indicators of Compromise (IoC), including feeds from applications, hosts, network devices and vulnerability scanners. • Asset custodians install the latest stable version of security-related updates on all systems within the organization-defined time requirements.
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to identify, assess, prioritize and document the potential impact(s) and likelihood(s) of applicable internal and external threats exploiting known vulnerabilities.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to identify, assess, prioritize and document the potential impact(s) and likelihood(s) of applicable internal and external threats exploiting known vulnerabilities. activities.
null
null
null
null
null
null
null
null
null
null
null
null
null
null
RQ-08-05 RQ-08-06 RQ-08-07.a RQ-09-03.a RQ-09-03.b RQ-09-03.c RQ-09-03.d RQ-09-03.e RQ-09-03.f RQ-09-04
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
ID.RA-04
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
R-BC-1 R-BC-2 R-EX-5 R-GV-1 R-GV-2 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-IR-4 R-SA-1 R-SA-2
null
null
null
null
null
null
null
R-BC-1
R-BC-2
null
null
null
null
null
null
null
R-EX-5
null
null
R-GV-1
R-GV-2
null
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
null
null
null
R-IR-4
R-SA-1
R-SA-2
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Vulnerability & Patch Management
Continuous Vulnerability Remediation Activities
VPM-04
Mechanisms exist to address new threats and vulnerabilities on an ongoing basis and ensure assets are protected against known attacks.
- NNT Change Tracker (https://www.newnettechnologies.com)
E-MNT-03 E-THR-05
Does the organization address new threats and vulnerabilities on an ongoing basis and ensure assets are protected against known attacks?
8
Protect
null
X
null
There is no evidence of a capability to address new threats and vulnerabilities on an ongoing basis and ensure assets are protected against known attacks.
SP-CMM1 is N/A, since a structured process is required to address new threats and vulnerabilities on an ongoing basis and ensure assets are protected against known attacks.
Vulnerability & Patch Management (VPM) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Attack Surface Management (ASM) is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel: o Identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for ASM. o Apply software patches and other vulnerability remediation efforts. • Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
Vulnerability & Patch Management (VPM) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • An IT Asset Management (ITAM) function, or similar function, categorizes devices according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data. • A Governance, Risk & Compliance (GRC) function, or similar function: o Defines the scope of ASM activities. o Provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data with regards to ASM. o Provides oversight of ASM activities to centrally manage the flaw remediation process as part of the organization’s overall Patch& Vulnerability & Patch Management Program (VPMP). • A Security Operations Center (SOC), or similar function: o Manages the identification, tracking and remediation of vulnerabilities. o Utilizes a Security Incident Event monitor (SIEM), or similar automated tool, to monitor for unauthorized activities, accounts, connections, devices and software according to organization-specific Indicators of Compromise (IoC), including feeds from applications, hosts, network devices and vulnerability scanners. • Asset custodians install the latest stable version of security-related updates on all systems within the organization-defined time requirements.
Vulnerability & Patch Management (VPM) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
Vulnerability & Patch Management (VPM) efforts are “world-class” capabilities that leverage predictive analysis (e.g., machine learning, AI, etc.). In addition to CMM Level 4 criteria, CMM Level 5 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Stakeholders make time-sensitive decisions to support operational efficiency, which may include automated remediation actions. ▪ Based on predictive analysis, process improvements are implemented according to “continuous improvement” practices that affect process changes.
CC4.2
null
null
7.7 12.1 18.3
12.1
7.7 12.1 18.3
7.7 12.1 18.3
DSS03.01 DSS03.02 DSS03.03 DSS03.04 DSS03.05 DSS06.04 MEA01.05
Principle 17
AIS-07 TVM-03
CLS-06 VLN-03
null
null
null
null
null
10.2
null
null
null
null
null
null
null
null
null
null
null
null
null
null
RV.1 RV.1.1 RV.1.2 RV.1.3
null
null
SC-18(1)
null
null
null
SC-18(1)
null
null
null
null
SC-18(1)
null
null
null
null
null
null
null
null
null
null
null
null
3.11.2.b 3.14.1.a 3.14.1.b
null
null
null
null
RS.MI-3
ID.RA-06
A05:2021 A06:2021
6.6
6.3.3
6.3.3
6.3.3
null
6.3.3
6.3.3
6.3.3
6.3.3
6.3.3
null
T.1.1.1 T.1.1.2 T.1.2.1 T.1.2.2
2.7
null
null
null
null
RISK-2.I.MIL3
KIM:SG3.SP2 VAR:SG1.SP2
null
null
null
null
null
SI.L1-b.1.xii
null
null
null
null
null
null
52.204-21(b)(1)(xii)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
D1.RM.RA.E.1
null
null
null
null
null
null
7.L.B
SC-18(1)
null
null
null
9.1 17.1
6.11
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Article 21.4
null
null
null
null
null
null
null
null
null
null
OPS-18 PSS-02
null
null
null
22.6 22.11
null
null
null
null
null
null
null
null
null
null
null
2-9-1-3
null
null
2-10-3-3
2-9-1-2 2-9-1-3
null
null
null
null
null
null
null
null
null
B4.d
null
null
null
null
null
null
null
null
null
1801
null
null
21
null
null
null
null
null
null
null
4.6 4.6.1
null
null
6.2.6.C.01 23.2.19.C.01
null
null
null
null
13.6.1(a) 13.6.1(b) 13.6.1(c)
null
null
null
null
null
null
null
2.7
null
null
null
null
null
null
null
null
null
null
null
x
FAR 52.204-21
x
x
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-1 R-AM-2 R-AM-3 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-GV-8 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1
R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
null
NT-1 NT-2 NT-3 NT-4 NT-5 NT-6 NT-7 NT-8 NT-9 NT-10 NT-11 NT-12 NT-13 NT-14 MT-1 MT-2 MT-3 MT-4 MT-5 MT-6 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15
NT-1
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Vulnerability & Patch Management
Stable Versions
VPM-04.1
Mechanisms exist to install the latest stable version of any software and/or security-related updates on all applicable systems.
null
null
Does the organization install the latest stable version of any software and/or security-related updates on all applicable systems?
8
Identify
null
X
X
There is no evidence of a capability to install the latest stable version of any software and/ or security-related updates on all applicable systems.
SP-CMM1 is N/A, since a structured process is required to install the latest stable version of any software and/ or security-related updates on all applicable systems.
Vulnerability & Patch Management (VPM) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Attack Surface Management (ASM) is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel: o Identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for ASM. o Apply software patches and other vulnerability remediation efforts. • Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
Vulnerability & Patch Management (VPM) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • An IT Asset Management (ITAM) function, or similar function, categorizes devices according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data. • A Governance, Risk & Compliance (GRC) function, or similar function: o Defines the scope of ASM activities. o Provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data with regards to ASM. o Provides oversight of ASM activities to centrally manage the flaw remediation process as part of the organization’s overall Patch& Vulnerability & Patch Management Program (VPMP). • A Security Operations Center (SOC), or similar function: o Manages the identification, tracking and remediation of vulnerabilities. o Utilizes a Security Incident Event monitor (SIEM), or similar automated tool, to monitor for unauthorized activities, accounts, connections, devices and software according to organization-specific Indicators of Compromise (IoC), including feeds from applications, hosts, network devices and vulnerability scanners. • Asset custodians install the latest stable version of security-related updates on all systems within the organization-defined time requirements.
Vulnerability & Patch Management (VPM) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to install the latest stable version of any software and/ or security-related updates on all applicable systems.
null
null
null
12.1
12.1
12.1
12.1
null
null
null
CLS-06
null
null
NDR 3.10 (15.7.3(1))
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
N.3 N.3.1 N.3.3 N.3.4
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
12.22
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Principle 6.7
null
null
1467 1483
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
7.4.1 7.4.2
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
x
null
x
null
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-1 R-AM-2 R-AM-3 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-GV-8 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1
R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
null
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Vulnerability & Patch Management
Flaw Remediation with Personal Data (PD)
VPM-04.2
Mechanisms exist to identify and correct flaws related to the collection, usage, processing or dissemination of Personal Data (PD).
null
null
Does the organization identify and correct flaws related to the collection, usage, processing or dissemination of Personal Data (PD)?
8
Identify
null
X
null
There is no evidence of a capability to identify and correct flaws related to the collection, usage, processing or dissemination of Personal Data (PD).
SP-CMM1 is N/A, since a structured process is required to identify and correct flaws related to the collection, usage, processing or dissemination of Personal Data (PD).
Vulnerability & Patch Management (VPM) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Attack Surface Management (ASM) is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel: o Identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for ASM. o Apply software patches and other vulnerability remediation efforts. • Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
Vulnerability & Patch Management (VPM) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • An IT Asset Management (ITAM) function, or similar function, categorizes devices according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data. • A Governance, Risk & Compliance (GRC) function, or similar function: o Defines the scope of ASM activities. o Provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data with regards to ASM. o Provides oversight of ASM activities to centrally manage the flaw remediation process as part of the organization’s overall Patch& Vulnerability & Patch Management Program (VPMP). • A Security Operations Center (SOC), or similar function: o Manages the identification, tracking and remediation of vulnerabilities. o Utilizes a Security Incident Event monitor (SIEM), or similar automated tool, to monitor for unauthorized activities, accounts, connections, devices and software according to organization-specific Indicators of Compromise (IoC), including feeds from applications, hosts, network devices and vulnerability scanners. • Asset custodians install the latest stable version of security-related updates on all systems within the organization-defined time requirements.
Vulnerability & Patch Management (VPM) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
Vulnerability & Patch Management (VPM) efforts are “world-class” capabilities that leverage predictive analysis (e.g., machine learning, AI, etc.). In addition to CMM Level 4 criteria, CMM Level 5 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Stakeholders make time-sensitive decisions to support operational efficiency, which may include automated remediation actions. ▪ Based on predictive analysis, process improvements are implemented according to “continuous improvement” practices that affect process changes.
null
null
null
null
null
null
null
DSS06.04
null
null
null
null
null
null
null
null
10.1
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
A06:2021
null
null
null
null
null
null
null
null
null
null
null
P.1.5.4
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
7.L.B
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Art 5.1
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Sec 4
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
4.7.1
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
x
null
x
null
R-AC-4 R-AM-2 R-AM-3 R-BC-1 R-BC-2 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-GV-1 R-GV-2 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-IR-3
null
null
null
R-AC-4
null
R-AM-2
R-AM-3
R-BC-1
R-BC-2
null
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
null
R-GV-1
R-GV-2
null
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
null
null
R-IR-3
null
null
null
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Vulnerability & Patch Management
Software & Firmware Patching
VPM-05
Mechanisms exist to conduct software patching for all deployed operating systems, applications and firmware.
- Patch management tools
E-MNT-03
Does the organization conduct software patching for all deployed operating systems, applications and firmware?
10
Protect
null
X
X
There is no evidence of a capability to conduct software patching for all deployed operating systems, applications and firmware.
Vulnerability & Patch Management (VPM) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Attack Surface Management (ASM) is decentralized. • IT personnel apply software patches through an informal process. • Occasional vulnerability scanning is conducted on High Value Assets (HVAs).
Vulnerability & Patch Management (VPM) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Attack Surface Management (ASM) is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel: o Identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for ASM. o Apply software patches and other vulnerability remediation efforts. • Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
Vulnerability & Patch Management (VPM) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • An IT Asset Management (ITAM) function, or similar function, categorizes devices according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data. • A Governance, Risk & Compliance (GRC) function, or similar function: o Defines the scope of ASM activities. o Provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data with regards to ASM. o Provides oversight of ASM activities to centrally manage the flaw remediation process as part of the organization’s overall Patch& Vulnerability & Patch Management Program (VPMP). • A Security Operations Center (SOC), or similar function: o Manages the identification, tracking and remediation of vulnerabilities. o Utilizes a Security Incident Event monitor (SIEM), or similar automated tool, to monitor for unauthorized activities, accounts, connections, devices and software according to organization-specific Indicators of Compromise (IoC), including feeds from applications, hosts, network devices and vulnerability scanners. • Asset custodians install the latest stable version of security-related updates on all systems within the organization-defined time requirements.
Vulnerability & Patch Management (VPM) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
Vulnerability & Patch Management (VPM) efforts are “world-class” capabilities that leverage predictive analysis (e.g., machine learning, AI, etc.). In addition to CMM Level 4 criteria, CMM Level 5 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Stakeholders make time-sensitive decisions to support operational efficiency, which may include automated remediation actions. ▪ Based on predictive analysis, process improvements are implemented according to “continuous improvement” practices that affect process changes.
null
null
null
7.3 7.4 12.1 18.3
7.3 7.4 12.1
7.3 7.4 12.1 18.3
7.3 7.4 12.1 18.3
null
null
UEM-07
CCM-07 CLS-06 SAP-05 VLN-01
null
null
HDR 3.10 (14.5.1) NDR 3.10 (15.7.1)
null
null
null
null
12.6.1
8.8
12.6.1
null
6.9.6 6.9.6.1
null
null
null
null
TS-4.2
null
null
null
null
null
null
SI-2 SI-3(2)
SI-2
SI-2 SI-3(2)
SI-2 SI-3(2)
SI-2 SI-2(4) SI-3
null
SI-2 SI-3
SI-2 SI-3
SI-2 SI-3
SI-2(4)
null
SI-2 SI-3
SI-2 SI-3
SI-2 SI-3
null
SI-2 SI-3
SI-2 SI-3
SI-2 SI-3
null
SI-2 SI-3
SI-2 SI-3
3.11.3
3.11.2.b 3.14.1.a 3.14.1.b
null
A.03.11.02.b A.03.11.02.ODP[01] A.03.14.01.b[01] A.03.14.01.b[02] A.03.14.01.ODP[01] A.03.14.01.ODP[02]
null
null
null
ID.RA-06
A06:2021
6.1 6.2
6.3.3
6.3.3
6.3.3
null
6.3.3
6.3.3
6.3.3
6.3.3
6.3.3
null
N.3
2.2
5.2.5 5.2.6
null
null
null
null
TM:SG4.SP2 VAR:SG2.SP2 VAR:SG2.SP3 VAR:SG3.SP1 VAR:SG4.SP1
null
5.10.4.1
null
RA.L2-3.11.3
null
SI.L1-b.1.xii
RA.L2-3.11.3
RA.L2-3.11.3
SI-2 SI-3(2)
null
null
null
52.204-21(b)(1)(xii)
null
null
null
SI-2 SI-3(2)
SI-2
SI-2 SI-3(2)
SI-2 SI-3(2)
SI-2
SI-2 SI-3(2)
SI-2
SI-2 SI-3(2)
SI-2 SI-3(2)
SI-2
null
null
null
null
null
null
2.S.A 7.S.A
2.M.A 7.M.D
2.M.A 7.M.D
SI-2 SI-2(4) SI-3
null
CIP-007-6 R2
8-311 8-610
9.1 17.1
null
null
null
null
null
SI-2
SI-2
SI-2 SI-3(2)
III.E III.E.1
null
null
null
null
null
null
null
null
17.04(6)
null
null
null
622(2)(d)(B)(iii)
null
null
null
SI-2 SI-3
SI-2
SI-2 SI-3(2)
null
null
§ 2447(c)(7)
null
Art 9.4(f)
null
null
null
null
null
null
null
null
null
null
null
null
null
PSS-03
null
null
null
12.21
null
null
null
null
null
null
null
null
null
null
null
2-3-1-3
TPC-11 TPC-78
null
2-3-3-3 2-10-3-4 5-1-3-9
2-3-1-3 2-4-1-15
null
null
null
null
null
null
null
null
null
B4.d
null
5
null
null
Principle 2.5 Principle 2.6 Principle 6.5 Principle 6.6
Principle 2.6 Principle 2.7 Principle 2.8 Principle 6.5 Principle 6.6
Principle 2.6 Principle 2.7 Principle 2.8 Principle 6.5 Principle 6.6
null
null
1143 1493 1690 1691 1692 1693 1694 1695 1696 1751 1697
null
null
21
null
null
null
null
null
null
null
12.6.1 12.6.1.18.PB
null
null
23.2.19.C.01
null
null
null
4.2(a) 4.2(b)
7.4.1 7.4.2
null
null
null
null
null
6.16
null
4.5 4.7 4.9
2.6 2.6.1
null
null
null
null
null
null
null
null
null
null
x
FAR 52.204-21 MA 201 CMR 17 OR 6464A Lockton
x
x
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-1 R-AM-2 R-AM-3 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-GV-8 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1
R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
null
NT-2 NT-3 NT-4 NT-5 NT-6 NT-7 NT-8 NT-9 NT-10 NT-11 NT-12 NT-13 NT-14 MT-1 MT-2 MT-3 MT-4 MT-5 MT-6 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15
null
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Vulnerability & Patch Management
Centralized Management of Flaw Remediation Processes
VPM-05.1
Mechanisms exist to centrally-manage the flaw remediation process.
- Patch management tools
null
Does the organization centrally-manage the flaw remediation process?
9
Protect
X
X
X
There is no evidence of a capability to centrally-manage the flaw remediation process.
SP-CMM1 is N/A, since a structured process is required to centrally-manage the flaw remediation process.
Vulnerability & Patch Management (VPM) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Attack Surface Management (ASM) is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel: o Identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for ASM. o Apply software patches and other vulnerability remediation efforts. • Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
Vulnerability & Patch Management (VPM) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • An IT Asset Management (ITAM) function, or similar function, categorizes devices according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data. • A Governance, Risk & Compliance (GRC) function, or similar function: o Defines the scope of ASM activities. o Provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data with regards to ASM. o Provides oversight of ASM activities to centrally manage the flaw remediation process as part of the organization’s overall Patch& Vulnerability & Patch Management Program (VPMP). • A Security Operations Center (SOC), or similar function: o Manages the identification, tracking and remediation of vulnerabilities. o Utilizes a Security Incident Event monitor (SIEM), or similar automated tool, to monitor for unauthorized activities, accounts, connections, devices and software according to organization-specific Indicators of Compromise (IoC), including feeds from applications, hosts, network devices and vulnerability scanners. • Asset custodians install the latest stable version of security-related updates on all systems within the organization-defined time requirements.
Vulnerability & Patch Management (VPM) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to centrally-manage the flaw remediation process.
null
null
null
7.4 18.3
7.4
7.4 18.3
7.4 18.3
null
null
AIS-07 TVM-05 UEM-07
CCM-07 CLS-06 VLN-01
null
null
NDR 3.10 (15.7.3(1))
null
null
null
null
null
null
null
null
null
null
null
null
null
TS-4.2
null
null
null
null
null
null
SI-2(1)
null
null
SI-2(1)
PL-9 SI-2(4)
PL-9
null
null
null
SI-2(4)
null
null
null
null
null
PL-9
null
null
PL-9
PL-9
null
null
null
null
null
null
null
null
ID.RA-01
A06:2021
6.2 6.4.5 6.4.5.1 6.4.5.2 6.4.5.3 6.4.5.4 6.4.6
6.3 6.3.1 6.3.2 6.3.3 6.4 6.4.1 6.4.2 6.4.3
6.3.1 6.3.3 6.4.3
6.3.1 6.3.2 6.3.3 6.4.1 6.4.2 6.4.3
null
6.3.1 6.3.3
6.3.1 6.3.3
6.3.1 6.3.3
6.3.1 6.3.2 6.3.3 6.4.1 6.4.2 6.4.3
6.3.1 6.3.2 6.3.3 6.4.1 6.4.2 6.4.3
null
T.1
null
null
null
null
null
RISK-2.I.MIL3
null
null
null
null
null
null
null
null
null
SI-2(1)
null
null
null
null
null
null
null
SI-2(1)
null
null
SI-2(1)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
SI-2(4)
null
null
null
null
6.11
null
null
null
5.6
null
null
null
null
null
null
null
null
null
null
null
null
17.04(7)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Article 21.4
null
null
null
null
null
null
null
null
null
null
PSS-03
null
null
null
12.21 22.11 22.12
null
null
null
null
null
null
null
null
null
null
null
null
TPC-91
null
null
null
null
null
null
null
null
null
null
null
null
B4.d
null
null
null
null
null
null
null
null
null
0300 0298
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
7.4.1 7.4.2
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
x
MA 201 CMR 17
x
x
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-1 R-AM-2 R-AM-3 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-GV-8 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1
R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
null
NT-1 NT-2 NT-3 NT-4 NT-5 NT-6 NT-7 NT-8 NT-9 NT-10 NT-11 NT-12 NT-13 NT-14 MT-1 MT-2 MT-3 MT-4 MT-5 MT-6 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15
NT-1
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Vulnerability & Patch Management
Automated Remediation Status
VPM-05.2
Automated mechanisms exist to determine the state of system components with regard to flaw remediation.
- Vulnerability scanning tools - CimTrak Integrity Suite (https://www.cimcor.com/cimtrak/)
null
Does the organization use automated mechanisms to determine the state of system components with regard to flaw remediation?
9
Protect
null
null
X
There is no evidence of a capability to determine the state of system components with regard to flaw remediation.
SP-CMM1 is N/A, since a structured process is required to determine the state of system components with regard to flaw remediation.
Vulnerability & Patch Management (VPM) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Attack Surface Management (ASM) is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel: o Identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for ASM. o Apply software patches and other vulnerability remediation efforts. • Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
Vulnerability & Patch Management (VPM) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • An IT Asset Management (ITAM) function, or similar function, categorizes devices according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data. • A Governance, Risk & Compliance (GRC) function, or similar function: o Defines the scope of ASM activities. o Provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data with regards to ASM. o Provides oversight of ASM activities to centrally manage the flaw remediation process as part of the organization’s overall Patch& Vulnerability & Patch Management Program (VPMP). • A Security Operations Center (SOC), or similar function: o Manages the identification, tracking and remediation of vulnerabilities. o Utilizes a Security Incident Event monitor (SIEM), or similar automated tool, to monitor for unauthorized activities, accounts, connections, devices and software according to organization-specific Indicators of Compromise (IoC), including feeds from applications, hosts, network devices and vulnerability scanners. • Asset custodians install the latest stable version of security-related updates on all systems within the organization-defined time requirements.
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to determine the state of system components with regard to flaw remediation.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to determine the state of system components with regard to flaw remediation.
null
null
null
7.4
7.4
7.4
7.4
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
SI-2(2)
null
SI-2(2)
SI-2(2)
SI-2(2) SI-2(4)
null
null
SI-2(2)
SI-2(2)
SI-2(4)
null
null
SI-2(2)
SI-2(2)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
A06:2021
null
null
null
null
null
null
null
null
null
null
null
J.3.2
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
SI-2(2)
null
null
null
null
null
null
null
SI-2(2)
null
SI-2(2)
SI-2(2)
null
SI-2(2)
null
SI-2(2)
SI-2(2)
null
null
null
null
null
null
null
null
null
null
SI-2(2) SI-2(4)
null
null
null
null
null
null
null
null
null
null
null
SI-2(2)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
SI-2(2)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
22.11 22.12
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
x
null
x
x
R-AM-3 R-EX-6 R-EX-7 R-GV-1 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-IR-2 R-IR-3
null
null
null
null
null
null
R-AM-3
null
null
null
null
null
null
null
null
null
null
R-EX-6
R-EX-7
R-GV-1
null
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
null
R-IR-2
R-IR-3
null
null
null
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
null
null
null
Vulnerability & Patch Management
Time To Remediate / Benchmarks For Corrective Action
VPM-05.3
Mechanisms exist to track the effectiveness of remediation operations through metrics reporting.
- CimTrak Integrity Suite (https://www.cimcor.com/cimtrak/) - NNT Change Tracker (https://www.newnettechnologies.com)
null
Does the organization track the effectiveness of remediation operations through metrics reporting?
6
Protect
null
X
X
There is no evidence of a capability to track the effectiveness of remediation operations through metrics reporting.
SP-CMM1 is N/A, since a structured process is required to track the effectiveness of remediation operations through metrics reporting.
Vulnerability & Patch Management (VPM) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Attack Surface Management (ASM) is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel: o Identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for ASM. o Apply software patches and other vulnerability remediation efforts. • Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
Vulnerability & Patch Management (VPM) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • An IT Asset Management (ITAM) function, or similar function, categorizes devices according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data. • A Governance, Risk & Compliance (GRC) function, or similar function: o Defines the scope of ASM activities. o Provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data with regards to ASM. o Provides oversight of ASM activities to centrally manage the flaw remediation process as part of the organization’s overall Patch& Vulnerability & Patch Management Program (VPMP). • A Security Operations Center (SOC), or similar function: o Manages the identification, tracking and remediation of vulnerabilities. o Utilizes a Security Incident Event monitor (SIEM), or similar automated tool, to monitor for unauthorized activities, accounts, connections, devices and software according to organization-specific Indicators of Compromise (IoC), including feeds from applications, hosts, network devices and vulnerability scanners. • Asset custodians install the latest stable version of security-related updates on all systems within the organization-defined time requirements.
Vulnerability & Patch Management (VPM) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
Vulnerability & Patch Management (VPM) efforts are “world-class” capabilities that leverage predictive analysis (e.g., machine learning, AI, etc.). In addition to CMM Level 4 criteria, CMM Level 5 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Stakeholders make time-sensitive decisions to support operational efficiency, which may include automated remediation actions. ▪ Based on predictive analysis, process improvements are implemented according to “continuous improvement” practices that affect process changes.
null
null
null
null
null
null
null
null
null
TVM-03
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
SI-2(3)
null
null
null
SI-2(3)
null
null
null
null
SI-2(3)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
A06:2021
null
null
null
null
null
null
null
null
null
null
null
J.1.5
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
SI-2(3)
null
SI-2(3)
SI-2(3)
null
SI-2(3)
null
SI-2(3)
SI-2(3)
null
null
null
null
null
null
null
null
null
null
SI-2(3)
null
null
null
null
null
null
null
null
null
null
null
SI-2(3)
III.E.2.a
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
SI-2(3)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
OPS-19
null
null
null
12.22
null
null
null
null
null
null
null
null
null
null
null
null
TPC-91
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
13.6.1(b)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
x
null
x
null
R-AM-3 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-IR-2 R-IR-3
null
null
null
null
null
null
R-AM-3
null
null
null
null
null
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
null
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
null
R-IR-2
R-IR-3
null
null
null
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Vulnerability & Patch Management
Automated Software & Firmware Updates
VPM-05.4
Automated mechanisms exist to install the latest stable versions of security-relevant software and firmware updates.
null
null
Does the organization use automated mechanisms to install the latest stable versions of security-relevant software and firmware updates?
5
Protect
null
X
null
There is no evidence of a capability to install the latest stable versions of security-relevant software and firmware updates.
SP-CMM1 is N/A, since a structured process is required to install the latest stable versions of security-relevant software and firmware updates.
Vulnerability & Patch Management (VPM) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Attack Surface Management (ASM) is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel: o Identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for ASM. o Apply software patches and other vulnerability remediation efforts. • Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
Vulnerability & Patch Management (VPM) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • An IT Asset Management (ITAM) function, or similar function, categorizes devices according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data. • A Governance, Risk & Compliance (GRC) function, or similar function: o Defines the scope of ASM activities. o Provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data with regards to ASM. o Provides oversight of ASM activities to centrally manage the flaw remediation process as part of the organization’s overall Patch& Vulnerability & Patch Management Program (VPMP). • A Security Operations Center (SOC), or similar function: o Manages the identification, tracking and remediation of vulnerabilities. o Utilizes a Security Incident Event monitor (SIEM), or similar automated tool, to monitor for unauthorized activities, accounts, connections, devices and software according to organization-specific Indicators of Compromise (IoC), including feeds from applications, hosts, network devices and vulnerability scanners. • Asset custodians install the latest stable version of security-related updates on all systems within the organization-defined time requirements.
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to install the latest stable versions of security-relevant software and firmware updates.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to install the latest stable versions of security-relevant software and firmware updates.
null
null
null
7.4
7.4
7.4
7.4
null
null
TVM-04 TVM-05
CCM-06 CCM-07 CLS-06 IAM-22 IOT-03 IOT-09 VLN-03
null
null
NDR 3.10 (15.7.3(1))
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
SI-2(5)
null
null
null
SI-2(4) SI-2(5)
null
null
null
null
SI-2(4) SI-2(5)
null
null
null
null
null
SI-2(5)
null
null
null
SI-2(5)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
J.2.10.1
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
SI-2(4) SI-2(5)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
§ 2447(c)(7)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
TPC-78
null
2-10-3-5
2-3-1-3
null
null
null
null
null
null
null
null
null
B4.d C1.d
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
4.2(a)
7.4.1 7.4.2
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
x
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-1 R-AM-2 R-AM-3 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-GV-8 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1
R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
null
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-10 MT-11 MT-12 MT-13 MT-14
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
null
null
null
Vulnerability & Patch Management
Removal of Previous Versions
VPM-05.5
Mechanisms exist to remove old versions of software and firmware components after updated versions have been installed.
null
null
Does the organization remove old versions of software and firmware components after updated versions have been installed?
5
Protect
null
X
X
There is no evidence of a capability to remove old versions of software and firmware components after updated versions have been installed.
Vulnerability & Patch Management (VPM) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Attack Surface Management (ASM) is decentralized. • IT personnel apply software patches through an informal process. • Occasional vulnerability scanning is conducted on High Value Assets (HVAs).
Vulnerability & Patch Management (VPM) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Attack Surface Management (ASM) is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel: o Identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for ASM. o Apply software patches and other vulnerability remediation efforts. • Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
Vulnerability & Patch Management (VPM) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • An IT Asset Management (ITAM) function, or similar function, categorizes devices according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data. • A Governance, Risk & Compliance (GRC) function, or similar function: o Defines the scope of ASM activities. o Provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data with regards to ASM. o Provides oversight of ASM activities to centrally manage the flaw remediation process as part of the organization’s overall Patch& Vulnerability & Patch Management Program (VPMP). • A Security Operations Center (SOC), or similar function: o Manages the identification, tracking and remediation of vulnerabilities. o Utilizes a Security Incident Event monitor (SIEM), or similar automated tool, to monitor for unauthorized activities, accounts, connections, devices and software according to organization-specific Indicators of Compromise (IoC), including feeds from applications, hosts, network devices and vulnerability scanners. • Asset custodians install the latest stable version of security-related updates on all systems within the organization-defined time requirements.
Vulnerability & Patch Management (VPM) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
Vulnerability & Patch Management (VPM) efforts are “world-class” capabilities that leverage predictive analysis (e.g., machine learning, AI, etc.). In addition to CMM Level 4 criteria, CMM Level 5 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Stakeholders make time-sensitive decisions to support operational efficiency, which may include automated remediation actions. ▪ Based on predictive analysis, process improvements are implemented according to “continuous improvement” practices that affect process changes.
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
SI-2(6)
null
null
null
SI-2(6)
null
null
null
null
SI-2(6)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
I.3.7 M.1.22 U.1.2
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
SI-2(6)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
x
R-AM-3 R-EX-6 R-EX-7 R-GV-1 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-IR-2 R-IR-3
null
null
null
null
null
null
R-AM-3
null
null
null
null
null
null
null
null
null
null
R-EX-6
R-EX-7
R-GV-1
null
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
null
R-IR-2
R-IR-3
null
null
null
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Vulnerability & Patch Management
Vulnerability Scanning
VPM-06
Mechanisms exist to detect vulnerabilities and configuration errors by recurring vulnerability scanning of systems and web applications.
- External vulnerability scans (unauthenticated) - Internal vulnerability scans (authenticated) - Nessus (https://www.tenable.com/products/nessus/nessus-professional) - Qualys (https://www.qualys.com/) - Rapid7 (https://www.rapid7.com/) - CimTrak Integrity Suite (https://www.cimcor.com/cimtrak/)
E-VPM-05
Does the organization detect vulnerabilities and configuration errors by recurring vulnerability scanning of systems and web applications?
9
Detect
null
X
X
There is no evidence of a capability to detect vulnerabilities and configuration errors by recurring vulnerability scanning of systems and web applications.
Vulnerability & Patch Management (VPM) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Attack Surface Management (ASM) is decentralized. • IT personnel apply software patches through an informal process. • Occasional vulnerability scanning is conducted on High Value Assets (HVAs). • Vulnerability scanning services may not be internal competencies and have to be outsourced.
Vulnerability & Patch Management (VPM) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Attack Surface Management (ASM) is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel: o Identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for ASM. o Apply software patches and other vulnerability remediation efforts. • Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
Vulnerability & Patch Management (VPM) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • An IT Asset Management (ITAM) function, or similar function, categorizes devices according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data. • A Governance, Risk & Compliance (GRC) function, or similar function: o Defines the scope of ASM activities. o Provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data with regards to ASM. o Provides oversight of ASM activities to centrally manage the flaw remediation process as part of the organization’s overall Patch& Vulnerability & Patch Management Program (VPMP). • A Security Operations Center (SOC), or similar function: o Manages the identification, tracking and remediation of vulnerabilities. o Utilizes a Security Incident Event monitor (SIEM), or similar automated tool, to monitor for unauthorized activities, accounts, connections, devices and software according to organization-specific Indicators of Compromise (IoC), including feeds from applications, hosts, network devices and vulnerability scanners. • Asset custodians install the latest stable version of security-related updates on all systems within the organization-defined time requirements. • Comprehensive vulnerability scanning is utilized to detect vulnerabilities and configuration errors for systems, applications and services across the enterprise. Scanning is performed in accordance with statutory, regulatory and contractual obligations for scope, recurrence and rescanning.
Vulnerability & Patch Management (VPM) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
Vulnerability & Patch Management (VPM) efforts are “world-class” capabilities that leverage predictive analysis (e.g., machine learning, AI, etc.). In addition to CMM Level 4 criteria, CMM Level 5 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Stakeholders make time-sensitive decisions to support operational efficiency, which may include automated remediation actions. ▪ Based on predictive analysis, process improvements are implemented according to “continuous improvement” practices that affect process changes.
CC7.1
CC7.1-POF5
null
7.5 7.6
null
7.5 7.6
7.5 7.6
DSS05.07
null
TVM-03 TVM-07
VLN-04
null
null
null
null
null
null
null
null
8.8
null
null
null
null
null
null
T1011.001, T1021.001, T1021.003, T1021.004, T1021.005, T1021.006, T1046, T1047, T1052, T1052.001, T1053, T1053.001, T1053.002, T1053.003, T1053.005, T1059, T1059.001, T1059.005, T1059.007, T1068, T1078, T1091, T1092, T1098.004, T1127, T1127.001, T1133, T1137, T1137.001, T1176, T1190, T1195, T1195.001, T1195.002, T1204.003, T1210, T1211, T1212, T1213, T1213.001, T1213.002, T1213.003, T1218, T1218.003, T1218.004, T1218.005, T1218.008, T1218.009, T1218.012, T1218.013, T1218.014, T1221, T1482, T1484, T1505, T1505.001, T1505.002, T1505.003, T1505.004, T1525, T1528, T1530, T1542.004, T1542.005, T1543, T1546.002, T1546.014, T1547.006, T1547.007, T1547.008, T1548, T1548.002, T1548.003, T1552, T1552.001, T1552.002, T1552.004, T1552.006, T1557, T1558.004, T1559, T1559.002, T1560, T1560.001, T1562, T1562.010, T1563, T1563.001, T1563.002, T1574, T1574.001, T1574.004, T1574.005, T1574.007, T1574.008, T1574.009, T1574.010, T1578, T1578.001, T1578.002, T1578.003, T1612
TS-4.0
null
null
null
null
null
null
RA-5
RA-5
RA-5
RA-5
RA-5
null
RA-5
RA-5
RA-5
null
null
RA-5
RA-5
RA-5
null
RA-5
RA-5
RA-5
null
RA-5
RA-5
3.11.2
3.11.2.a
3.11.2[a] 3.11.2[b] 3.11.2[c] 3.11.2[d] 3.11.2[e]
A.03.11.02.a[01] A.03.11.02.a[02] A.03.11.02.a[03] A.03.11.02.a[04]
null
null
DE.CM-8
null
A05:2021 A06:2021
11.2
6.4.1 11.3.1 11.3.1.1 11.3.1.2 11.3.1.3 11.3.2 11.3.2.1
11.3.2 11.3.2.1
6.4.1 11.3.2 11.3.2.1
null
11.3.2
11.3.1 11.3.1.3 11.3.1.2 11.3.2.1
null
6.4.1 11.3.1 11.3.1.1 11.3.1.2 11.3.1.3 11.3.1.2 11.3.2.1
6.4.1 11.3.1 11.3.1.1 11.3.1.2 11.3.1.3 11.3.1.2 11.3.2.1
null
T.1.1 T.1.1.1 T.1.1.2 T.1.2 T.1.2.1 T.1.2.2
2.7
null
null
null
null
THREAT-1.B.MIL1 THREAT-1.C.MIL1 THREAT-1.D.MIL1 THREAT-1.F.MIL2 THREAT-1.K.MIL3
MON:SG2.SP1 MON:SG2.SP2 MON:SG2.SP3 MON:SG2.SP4 VAR:SG2.SP1 VAR:SG2.SP2 VAR:SG2.SP3 VAR:SG3.SP1 VAR:SG4.SP1
5.6
null
null
RA.L2-3.11.2
RA.L2-3.11.2
null
RA.L2-3.11.2
RA.L2-3.11.2
RA-5
null
null
null
null
null
null
null
RA-5
RA-5
RA-5
RA-5
RA-5
RA-5
RA-5
RA-5
RA-5
RA-5
null
D3.DC.Th.E.5
null
null
314.4(d)(2) 314.4(d)(2)(ii)
null
2.S.A 7.S.A
7.M.A 7.M.B
7.M.A 7.M.B 7.L.A 9.L.A 9.L.B
RA-5
null
CIP-010-2 R3
8-614
null
null
null
null
null
5.6
RA-5
RA-5
RA-5
null
null
null
null
null
null
null
null
null
null
null
500.05
null
622(2)(B)(iii) 622(2)(d)(A)(iii)
null
null
null
RA-5
RA-5
RA-5
null
null
null
null
Art 25.1 Art 25.2 Art 25.3
null
null
null
null
null
null
null
null
null
null
null
null
5.6
OPS-22 PSS-02 PSS-03
null
null
null
3.4 9.25 12.30 22.3 22.6
null
null
null
null
null
null
null
null
null
null
null
2-9-1-1 2-9-2
TPC-85
null
2-10-3-1
null
null
null
null
null
null
null
null
null
null
B2.b B4.d
null
null
null
null
Principle 2.2 Principle 2.3 Principle 2.4 Principle 6.2 Principle 6.3 Principle 6.4
Principle 2.2 Principle 2.3 Principle 2.4 Principle 2.5
Principle 2.2 Principle 2.3 Principle 2.4 Principle 2.5
null
null
1163 1698 1699 1700 1701 1702 1752 1703
null
null
null
null
null
null
null
null
null
null
null
null
null
6.2.5.C.01
null
null
null
null
13.1.1 13.1.2
null
null
null
null
null
6.15
null
2.5
3.1.3
null
null
null
null
null
null
null
null
null
null
x
OR 6464A
x
x
R-AC-2 R-AC-3 R-AC-4 R-AM-3 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1
null
R-AC-2
R-AC-3
R-AC-4
null
null
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
null
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
null
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Vulnerability & Patch Management
Update Tool Capability
VPM-06.1
Mechanisms exist to update vulnerability scanning tools.
null
null
Does the organization update vulnerability scanning tools?
8
Protect
null
X
X
There is no evidence of a capability to update vulnerability scanning tools.
Vulnerability & Patch Management (VPM) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Attack Surface Management (ASM) is decentralized. • IT personnel apply software patches through an informal process. • Occasional vulnerability scanning is conducted on High Value Assets (HVAs).
Vulnerability & Patch Management (VPM) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Attack Surface Management (ASM) is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel: o Identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for ASM. o Apply software patches and other vulnerability remediation efforts. • Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed. • Administrative processes exist and technologies are configured update vulnerability scanning tools.
Vulnerability & Patch Management (VPM) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • An IT Asset Management (ITAM) function, or similar function, categorizes devices according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data. • A Governance, Risk & Compliance (GRC) function, or similar function: o Defines the scope of ASM activities. o Provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data with regards to ASM. o Provides oversight of ASM activities to centrally manage the flaw remediation process as part of the organization’s overall Patch& Vulnerability & Patch Management Program (VPMP). • A Security Operations Center (SOC), or similar function: o Manages the identification, tracking and remediation of vulnerabilities. o Utilizes a Security Incident Event monitor (SIEM), or similar automated tool, to monitor for unauthorized activities, accounts, connections, devices and software according to organization-specific Indicators of Compromise (IoC), including feeds from applications, hosts, network devices and vulnerability scanners. • Asset custodians install the latest stable version of security-related updates on all systems within the organization-defined time requirements. • Administrative processes exist and technologies are configured update vulnerability scanning tools.
Vulnerability & Patch Management (VPM) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to update vulnerability scanning tools.
null
null
null
null
null
null
null
null
null
TVM-04 TVM-05
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
RA-5(1) RA-5(2)
null
RA-5(1) RA-5(2)
RA-5(1) RA-5(2)
RA-5 RA-5(2)
null
RA-5 RA-5(2)
RA-5 RA-5(2)
RA-5 RA-5(2)
null
null
RA-5 RA-5(2)
RA-5 RA-5(2)
RA-5 RA-5(2)
null
RA-5
RA-5
RA-5
null
RA-5
RA-5
NFO - RA-5(1) NFO - RA-5(2)
3.11.2.c
null
A.03.11.02.c[01] A.03.11.02.c[02] A.03.11.02.c[03]
null
null
null
null
null
null
11.3.1
null
null
null
null
11.3.1
null
11.3.1
11.3.1
null
T.3.1 T.4
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
RA-5(1) RA-5(2)
null
null
null
null
null
null
null
RA-5(1) RA-5(2)
null
RA-5(1) RA-5(2)
RA-5(1) RA-5(2)
null
RA-5(2)
RA-5(2)
RA-5(2)
RA-5(2)
RA-5(2)
null
null
null
null
null
null
null
null
null
RA-5 RA-5(2)
null
null
null
null
null
null
null
null
null
null
null
RA-5(1) RA-5(2)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
RA-5
null
RA-5(1) RA-5(2)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
PSS-03
null
null
null
22.7
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Principle 2.2 Principle 6.2
Principle 2.2 Principle 6.2
Principle 2.2 Principle 6.2
null
null
1808
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
x
x
R-AC-2 R-AC-3 R-AC-4 R-AM-3 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1
null
R-AC-2
R-AC-3
R-AC-4
null
null
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
null
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
null
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Vulnerability & Patch Management
Breadth / Depth of Coverage
VPM-06.2
Mechanisms exist to identify the breadth and depth of coverage for vulnerability scanning that define the system components scanned and types of vulnerabilities that are checked for.
- CimTrak Integrity Suite (https://www.cimcor.com/cimtrak/) - NNT Change Tracker (https://www.newnettechnologies.com)
null
Does the organization identify the breadth and depth of coverage for vulnerability scanning that define the system components scanned and types of vulnerabilities that are checked for?
8
Protect
null
X
X
There is no evidence of a capability to identify the breadth and depth of coverage for vulnerability scanning that define the system components scanned and types of vulnerabilities that are checked for.
Vulnerability & Patch Management (VPM) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Attack Surface Management (ASM) is decentralized. • IT personnel apply software patches through an informal process. • Occasional vulnerability scanning is conducted on High Value Assets (HVAs).
Vulnerability & Patch Management (VPM) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Attack Surface Management (ASM) is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel: o Identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for ASM. o Apply software patches and other vulnerability remediation efforts. • Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed. • Administrative processes exist to identify the breadth and depth of coverage for vulnerability scanning that define the system components scanned and types of vulnerabilities that are checked for.
Vulnerability & Patch Management (VPM) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • An IT Asset Management (ITAM) function, or similar function, categorizes devices according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data. • A Governance, Risk & Compliance (GRC) function, or similar function: o Defines the scope of ASM activities. o Provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data with regards to ASM. o Provides oversight of ASM activities to centrally manage the flaw remediation process as part of the organization’s overall Patch& Vulnerability & Patch Management Program (VPMP). • A Security Operations Center (SOC), or similar function: o Manages the identification, tracking and remediation of vulnerabilities. o Utilizes a Security Incident Event monitor (SIEM), or similar automated tool, to monitor for unauthorized activities, accounts, connections, devices and software according to organization-specific Indicators of Compromise (IoC), including feeds from applications, hosts, network devices and vulnerability scanners. • Asset custodians install the latest stable version of security-related updates on all systems within the organization-defined time requirements. • Administrative processes exist to identify the breadth and depth of coverage for vulnerability scanning that define the system components scanned and types of vulnerabilities that are checked for.
Vulnerability & Patch Management (VPM) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to identify the breadth and depth of coverage for vulnerability scanning that define the system components scanned and types of vulnerabilities that are checked for.
null
null
null
null
null
null
null
null
null
null
VLN-04
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
RA-5(3)
null
null
null
RA-5(3)
null
null
null
null
RA-5(3)
null
null
null
null
null
RA-5(3)
null
null
null
RA-5(3)
RA-5(3)
null
null
null
null
null
null
null
null
null
null
11.3.1
null
null
null
null
11.3.1
null
11.3.1
11.3.1
null
G.3.2
null
null
null
null
null
THREAT-1.B.MIL1 THREAT-1.C.MIL1 THREAT-1.D.MIL1 THREAT-1.F.MIL2 THREAT-1.K.MIL3
null
null
null
null
null
null
null
null
null
RA-5(3)
null
null
null
null
null
null
null
RA-5(3)
null
RA-5(3)
RA-5(3)
null
RA-5(3)
null
RA-5(3)
RA-5(3)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
RA-5(3)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
RA-5(3)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
22.6
null
null
null
null
null
null
null
null
null
null
null
2-9-2-1
null
null
2-11-3-1
null
null
null
null
null
null
null
null
null
null
B4.d
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
x
x
R-AC-2 R-AC-3 R-AC-4 R-AM-3 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1
null
R-AC-2
R-AC-3
R-AC-4
null
null
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
null
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
null
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Vulnerability & Patch Management
Privileged Access
VPM-06.3
Mechanisms exist to implement privileged access authorization for selected vulnerability scanning activities.
- Authenticated scans
null
Does the organization implement privileged access authorization for selected vulnerability scanning activities?
9
Protect
null
null
X
There is no evidence of a capability to implement privileged access authorization for selected vulnerability scanning activities.
Vulnerability & Patch Management (VPM) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Attack Surface Management (ASM) is decentralized. • IT personnel apply software patches through an informal process. • Occasional vulnerability scanning is conducted on High Value Assets (HVAs).
Vulnerability & Patch Management (VPM) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Attack Surface Management (ASM) is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel: o Identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for ASM. o Apply software patches and other vulnerability remediation efforts. • Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
Vulnerability & Patch Management (VPM) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • An IT Asset Management (ITAM) function, or similar function, categorizes devices according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data. • A Governance, Risk & Compliance (GRC) function, or similar function: o Defines the scope of ASM activities. o Provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data with regards to ASM. o Provides oversight of ASM activities to centrally manage the flaw remediation process as part of the organization’s overall Patch& Vulnerability & Patch Management Program (VPMP). • A Security Operations Center (SOC), or similar function: o Manages the identification, tracking and remediation of vulnerabilities. o Utilizes a Security Incident Event monitor (SIEM), or similar automated tool, to monitor for unauthorized activities, accounts, connections, devices and software according to organization-specific Indicators of Compromise (IoC), including feeds from applications, hosts, network devices and vulnerability scanners. • Asset custodians install the latest stable version of security-related updates on all systems within the organization-defined time requirements.
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to implement privileged access authorization for selected vulnerability scanning activities.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to implement privileged access authorization for selected vulnerability scanning activities.
null
null
null
null
null
null
null
null
null
IAM-09
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
RA-5(5)
null
RA-5(5)
RA-5(5)
RA-5(5)
null
null
RA-5(5)
RA-5(5)
null
null
null
RA-5(5)
RA-5(5)
null
null
null
null
null
null
null
3.11.2
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
T.1
null
null
null
null
null
null
null
null
null
null
RA.L2-3.11.2
null
null
RA.L2-3.11.2
RA.L2-3.11.2
RA-5(5)
null
null
null
null
null
null
null
RA-5(5)
null
RA-5(5)
RA-5(5)
null
RA-5(5)
null
RA-5(5)
RA-5(5)
null
null
null
null
null
null
null
null
null
null
RA-5(5)
null
null
null
null
null
null
null
null
null
null
null
RA-5(5)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
RA-5(5)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
22.9
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
x
null
null
x
R-AC-2 R-AC-3 R-AC-4 R-AM-3 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1
null
R-AC-2
R-AC-3
R-AC-4
null
null
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
null
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
null
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Vulnerability & Patch Management
Trend Analysis
VPM-06.4
Automated mechanisms exist to compare the results of vulnerability scans over time to determine trends in system vulnerabilities.
- CimTrak Integrity Suite (https://www.cimcor.com/cimtrak/)
null
Does the organization use automated mechanisms to compare the results of vulnerability scans over time to determine trends in system vulnerabilities?
9
Identify
null
X
X
There is no evidence of a capability to compare the results of vulnerability scans over time to determine trends in system vulnerabilities.
SP-CMM1 is N/A, since a structured process is required to compare the results of vulnerability scans over time to determine trends in system vulnerabilities.
Vulnerability & Patch Management (VPM) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Attack Surface Management (ASM) is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel: o Identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for ASM. o Apply software patches and other vulnerability remediation efforts. • Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed. • Administrative processes exist and technologies are configured to compare the results of vulnerability scans over time to determine trends in system vulnerabilities.
Vulnerability & Patch Management (VPM) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • An IT Asset Management (ITAM) function, or similar function, categorizes devices according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data. • A Governance, Risk & Compliance (GRC) function, or similar function: o Defines the scope of ASM activities. o Provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data with regards to ASM. o Provides oversight of ASM activities to centrally manage the flaw remediation process as part of the organization’s overall Patch& Vulnerability & Patch Management Program (VPMP). • A Security Operations Center (SOC), or similar function: o Manages the identification, tracking and remediation of vulnerabilities. o Utilizes a Security Incident Event monitor (SIEM), or similar automated tool, to monitor for unauthorized activities, accounts, connections, devices and software according to organization-specific Indicators of Compromise (IoC), including feeds from applications, hosts, network devices and vulnerability scanners. • Asset custodians install the latest stable version of security-related updates on all systems within the organization-defined time requirements. • Administrative processes exist and technologies are configured to compare the results of vulnerability scans over time to determine trends in system vulnerabilities.
Vulnerability & Patch Management (VPM) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to compare the results of vulnerability scans over time to determine trends in system vulnerabilities.
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
RA-5(6)
null
null
null
RA-5(6)
null
null
null
null
RA-5(6)
null
null
null
null
null
RA-5(6)
null
null
null
RA-5(6)
RA-5(6)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
I.4.2
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
RA-5(6)
null
RA-5(6)
RA-5(6)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
5.6
null
null
RA-5(6)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
RA-5(6)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
OPS-20
null
null
null
22.10
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
x
null
null
x
R-AC-2 R-AC-3 R-AC-4 R-AM-3 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1
null
R-AC-2
R-AC-3
R-AC-4
null
null
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
null
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
null
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
null
null
null
Vulnerability & Patch Management
Review Historical Event Logs
VPM-06.5
Mechanisms exist to review historical event logs to determine if identified vulnerabilities have been previously exploited.
null
null
Does the organization review historical event logs to determine if identified vulnerabilities have been previously exploited?
9
Detect
null
X
X
There is no evidence of a capability to review historical event logs to determine if identified vulnerabilities have been previously exploited.
SP-CMM1 is N/A, since a structured process is required to review historical event logs to determine if identified vulnerabilities have been previously exploited.
Vulnerability & Patch Management (VPM) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Attack Surface Management (ASM) is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel: o Identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for ASM. o Apply software patches and other vulnerability remediation efforts. • Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
Vulnerability & Patch Management (VPM) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • An IT Asset Management (ITAM) function, or similar function, categorizes devices according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data. • A Governance, Risk & Compliance (GRC) function, or similar function: o Defines the scope of ASM activities. o Provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data with regards to ASM. o Provides oversight of ASM activities to centrally manage the flaw remediation process as part of the organization’s overall Patch& Vulnerability & Patch Management Program (VPMP). • A Security Operations Center (SOC), or similar function: o Manages the identification, tracking and remediation of vulnerabilities. o Utilizes a Security Incident Event monitor (SIEM), or similar automated tool, to monitor for unauthorized activities, accounts, connections, devices and software according to organization-specific Indicators of Compromise (IoC), including feeds from applications, hosts, network devices and vulnerability scanners. • Asset custodians install the latest stable version of security-related updates on all systems within the organization-defined time requirements.
Vulnerability & Patch Management (VPM) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
Vulnerability & Patch Management (VPM) efforts are “world-class” capabilities that leverage predictive analysis (e.g., machine learning, AI, etc.). In addition to CMM Level 4 criteria, CMM Level 5 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Stakeholders make time-sensitive decisions to support operational efficiency, which may include automated remediation actions. ▪ Based on predictive analysis, process improvements are implemented according to “continuous improvement” practices that affect process changes.
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
RA-5(8)
null
null
null
RA-5(8)
null
null
null
null
RA-5(8)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
J.3.2
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
RA-5(8)
null
RA-5(8)
RA-5(8)
null
RA-5(8)
null
null
RA-5(8)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
RA-5(8)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
RA-5(8)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
OPS-20
null
null
null
22.10
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
x
null
null
x
R-AC-2 R-AC-3 R-AC-4 R-AM-3 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1
null
R-AC-2
R-AC-3
R-AC-4
null
null
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
null
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
null
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
null
- wordsmithed control
Vulnerability & Patch Management
External Vulnerability Assessment Scans
VPM-06.6
Mechanisms exist to perform quarterly external vulnerability scans (outside the organization's network looking inward) via a reputable vulnerability service provider, which include rescans until passing results are obtained or all “high” vulnerabilities are resolved, as defined by the Common Vulnerability Scoring System (CVSS).
null
E-VPM-05
Does the organization perform quarterly external vulnerability scans (outside the organization's network looking inward) via a reputable vulnerability service provider, which include rescans until passing results are obtained or all “high” vulnerabilities are resolved, as defined by the Common Vulnerability Scoring System (CVSS)?
9
Detect
null
X
X
There is no evidence of a capability to perform quarterly external vulnerability scans (outside the organization's network looking inward) via a reputable vulnerability service provider, which include rescans until passing results are obtained or all “high” vulnerabilities are resolved, as defined by the Comm on Vulnerability Scoring System (CVSS).
Vulnerability & Patch Management (VPM) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Attack Surface Management (ASM) is decentralized. • IT personnel apply software patches through an informal process. • Occasional vulnerability scanning is conducted on High Value Assets (HVAs).
Vulnerability & Patch Management (VPM) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Attack Surface Management (ASM) is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel: o Identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for ASM. o Apply software patches and other vulnerability remediation efforts. • Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
Vulnerability & Patch Management (VPM) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • An IT Asset Management (ITAM) function, or similar function, categorizes devices according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data. • A Governance, Risk & Compliance (GRC) function, or similar function: o Defines the scope of ASM activities. o Provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data with regards to ASM. o Provides oversight of ASM activities to centrally manage the flaw remediation process as part of the organization’s overall Patch& Vulnerability & Patch Management Program (VPMP). • A Security Operations Center (SOC), or similar function: o Manages the identification, tracking and remediation of vulnerabilities. o Utilizes a Security Incident Event monitor (SIEM), or similar automated tool, to monitor for unauthorized activities, accounts, connections, devices and software according to organization-specific Indicators of Compromise (IoC), including feeds from applications, hosts, network devices and vulnerability scanners. • Asset custodians install the latest stable version of security-related updates on all systems within the organization-defined time requirements.
Vulnerability & Patch Management (VPM) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to perform quarterly external vulnerability scans (outside the organization's network looking inward) via a reputable vulnerability service provider, which include rescans until passing results are obtained or all “high” vulnerabilities are resolved, as defined by the Comm on Vulnerability Scoring System (CVSS).
null
null
null
7.5
null
7.5
7.5
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
11.2 11.2.2 11.2.3
6.4.1 11.3.2 11.3.2.1
null
6.4.1
null
null
null
null
6.4.1
6.4.1
null
T.1.2 T.1.2.1 T.1.2.2 T.1.3 T.1.3 T.1.6
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
PSS-02
null
null
null
22.3
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
R-AC-2 R-AC-3 R-AC-4 R-AM-3 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1
null
R-AC-2
R-AC-3
R-AC-4
null
null
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
null
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
null
NT-2 NT-3 NT-4 NT-5 NT-6 NT-7 NT-8 NT-9 NT-10 NT-11 NT-12 NT-13 NT-14 MT-1 MT-2 MT-3 MT-4 MT-5 MT-6 MT-7 MT-8 MT-9 MT-10 MT-11 MT-12 MT-13 MT-14 MT-15
null
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Vulnerability & Patch Management
Internal Vulnerability Assessment Scans
VPM-06.7
Mechanisms exist to perform quarterly internal vulnerability scans, which includes all segments of the organization's internal network, as well as rescans until passing results are obtained or all “high” vulnerabilities are resolved, as defined by the Common Vulnerability Scoring System (CVSS).
null
E-VPM-05
Does the organization perform quarterly internal vulnerability scans, which includes all segments of the organization's internal network, as well as rescans until passing results are obtained or all “high” vulnerabilities are resolved, as defined by the Common Vulnerability Scoring System (CVSS)?
9
Detect
null
X
X
There is no evidence of a capability to perform quarterly internal vulnerability scans, which includes all segments of the organization's internal network, as well as rescans until passing results are obtained or all “high” vulnerabilities are resolved, as defined by the Comm on Vulnerability Scoring System (CVSS).
Vulnerability & Patch Management (VPM) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Attack Surface Management (ASM) is decentralized. • IT personnel apply software patches through an informal process. • Occasional vulnerability scanning is conducted on High Value Assets (HVAs).
Vulnerability & Patch Management (VPM) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Attack Surface Management (ASM) is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel: o Identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for ASM. o Apply software patches and other vulnerability remediation efforts. • Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
Vulnerability & Patch Management (VPM) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • An IT Asset Management (ITAM) function, or similar function, categorizes devices according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data. • A Governance, Risk & Compliance (GRC) function, or similar function: o Defines the scope of ASM activities. o Provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data with regards to ASM. o Provides oversight of ASM activities to centrally manage the flaw remediation process as part of the organization’s overall Patch& Vulnerability & Patch Management Program (VPMP). • A Security Operations Center (SOC), or similar function: o Manages the identification, tracking and remediation of vulnerabilities. o Utilizes a Security Incident Event monitor (SIEM), or similar automated tool, to monitor for unauthorized activities, accounts, connections, devices and software according to organization-specific Indicators of Compromise (IoC), including feeds from applications, hosts, network devices and vulnerability scanners. • Asset custodians install the latest stable version of security-related updates on all systems within the organization-defined time requirements.
Vulnerability & Patch Management (VPM) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to perform quarterly internal vulnerability scans, which includes all segments of the organization's internal network, as well as rescans until passing results are obtained or all “high” vulnerabilities are resolved, as defined by the Comm on Vulnerability Scoring System (CVSS).
null
null
null
7.6
null
7.6
7.6
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
11.2 11.2.1 11.2.3
11.3.1.2 11.3.1.3
null
null
null
null
11.3.1.3
null
11.3.1.2 11.3.1.3
11.3.1.2 11.3.1.3
null
T.1.1 T.1.1.1 U.1.12.2 T.1.1.2 T.1.3
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
PSS-02
null
null
null
22.3
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
R-AC-2 R-AC-3 R-AC-4 R-AM-3 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1
null
R-AC-2
R-AC-3
R-AC-4
null
null
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
null
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
null
NT-2 NT-3 NT-4 NT-5 NT-6 NT-7 NT-8 NT-9 NT-10 NT-11 NT-12 NT-13 NT-14 MT-1 MT-2 MT-3 MT-4 MT-5 MT-6 MT-7 MT-8 MT-9 MT-10 MT-11 MT-12 MT-13 MT-14 MT-15
null
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Vulnerability & Patch Management
Acceptable Discoverable Information
VPM-06.8
Mechanisms exist to define what information is allowed to be discoverable by adversaries and take corrective actions to remediated non-compliant systems.
null
null
Does the organization define what information is allowed to be discoverable by adversaries and take corrective actions to remediated non-compliant systems?
5
Protect
null
X
null
There is no evidence of a capability to define what information is allowed to be discoverable by adversaries and take corrective actions to remediated non-compliant systems.
Vulnerability & Patch Management (VPM) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Attack Surface Management (ASM) is decentralized. • IT personnel apply software patches through an informal process. • Occasional vulnerability scanning is conducted on High Value Assets (HVAs).
Vulnerability & Patch Management (VPM) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Attack Surface Management (ASM) is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel: o Identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for ASM. o Apply software patches and other vulnerability remediation efforts. • Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed. • Administrative processes and technologies prevent the public disclosure of internal address information.
Vulnerability & Patch Management (VPM) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • An IT Asset Management (ITAM) function, or similar function, categorizes devices according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data. • A Governance, Risk & Compliance (GRC) function, or similar function: o Defines the scope of ASM activities. o Provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data with regards to ASM. o Provides oversight of ASM activities to centrally manage the flaw remediation process as part of the organization’s overall Patch& Vulnerability & Patch Management Program (VPMP). • A Security Operations Center (SOC), or similar function: o Manages the identification, tracking and remediation of vulnerabilities. o Utilizes a Security Incident Event monitor (SIEM), or similar automated tool, to monitor for unauthorized activities, accounts, connections, devices and software according to organization-specific Indicators of Compromise (IoC), including feeds from applications, hosts, network devices and vulnerability scanners. • Asset custodians install the latest stable version of security-related updates on all systems within the organization-defined time requirements. • Administrative processes and technologies prevent the public disclosure of internal address information.
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to define what information is allowed to be discoverable by adversaries and take corrective actions to remediated non-compliant systems.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to define what information is allowed to be discoverable by adversaries and take corrective actions to remediated non-compliant systems.
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
RA-5(4)
null
null
RA-5(4)
RA-5(4)
null
null
null
RA-5(4)
null
null
null
null
RA-5(4)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
1.4.5
null
1.4.5
null
null
null
null
1.4.5
1.4.5
null
P.9.6 T.1.5.6
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
RA-5(4)
null
null
RA-5(4)
null
RA-5(4)
null
null
RA-5(4)
null
null
null
null
null
null
null
null
null
null
RA-5(4)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
14.1.14.C.01
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
x
R-AM-3 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-7 R-GV-1 R-SA-1
null
null
null
null
null
null
R-AM-3
null
null
null
null
null
R-EX-1
R-EX-2
R-EX-3
R-EX-4
null
null
R-EX-7
R-GV-1
null
null
null
null
null
null
null
null
null
null
null
R-SA-1
null
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Vulnerability & Patch Management
Correlate Scanning Information
VPM-06.9
Automated mechanisms exist to correlate the output from vulnerability scanning tools to determine the presence of multi-vulnerability/multi-hop attack vectors.
null
null
Does the organization use automated mechanisms to correlate the output from vulnerability scanning tools to determine the presence of multi-vulnerability/multi-hop attack vectors?
5
Detect
null
X
X
There is no evidence of a capability to correlate the output from vulnerability scanning tools to determine the presence of multi-vulnerability/multi-hop attack vectors.
SP-CMM1 is N/A, since a structured process is required to correlate the output from vulnerability scanning tools to determine the presence of multi-vulnerability/multi-hop attack vectors.
Vulnerability & Patch Management (VPM) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Attack Surface Management (ASM) is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel: o Identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for ASM. o Apply software patches and other vulnerability remediation efforts. • Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
Vulnerability & Patch Management (VPM) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • An IT Asset Management (ITAM) function, or similar function, categorizes devices according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data. • A Governance, Risk & Compliance (GRC) function, or similar function: o Defines the scope of ASM activities. o Provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data with regards to ASM. o Provides oversight of ASM activities to centrally manage the flaw remediation process as part of the organization’s overall Patch& Vulnerability & Patch Management Program (VPMP). • A Security Operations Center (SOC), or similar function: o Manages the identification, tracking and remediation of vulnerabilities. o Utilizes a Security Incident Event monitor (SIEM), or similar automated tool, to monitor for unauthorized activities, accounts, connections, devices and software according to organization-specific Indicators of Compromise (IoC), including feeds from applications, hosts, network devices and vulnerability scanners. • Asset custodians install the latest stable version of security-related updates on all systems within the organization-defined time requirements.
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to correlate the output from vulnerability scanning tools to determine the presence of multi-vulnerability/multi-hop attack vectors.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to correlate the output from vulnerability scanning tools to determine the presence of multi-vulnerability/multi-hop attack vectors.
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
RA-5(10)
null
null
null
RA-5(10)
null
null
null
null
RA-5(10)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
RA-5(10)
null
null
RA-5(10)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
x
R-AM-3 R-EX-6 R-EX-7 R-GV-1 R-SA-1
null
null
null
null
null
null
R-AM-3
null
null
null
null
null
null
null
null
null
null
R-EX-6
R-EX-7
R-GV-1
null
null
null
null
null
null
null
null
null
null
null
R-SA-1
null
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-10 MT-11 MT-12 MT-13 MT-14
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
null
null
null
Vulnerability & Patch Management
Penetration Testing
VPM-07
Mechanisms exist to conduct penetration testing on systems and web applications.
null
E-VPM-02 E-VPM-03
Does the organization conduct penetration testing on systems and web applications?
9
Detect
null
X
null
There is no evidence of a capability to conduct penetration testing on systems and web applications.
Vulnerability & Patch Management (VPM) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Attack Surface Management (ASM) is decentralized. • IT personnel apply software patches through an informal process. • Occasional vulnerability scanning is conducted on High Value Assets (HVAs). • Penetration testing services may not be internal competencies and have to be outsourced.
Vulnerability & Patch Management (VPM) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Attack Surface Management (ASM) is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel: o Identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for ASM. o Apply software patches and other vulnerability remediation efforts. • Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed. • IT/cybersecurity personnel conduct annual penetration testing on network segments hosting High Value Assets (HVAs).
Vulnerability & Patch Management (VPM) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • An IT Asset Management (ITAM) function, or similar function, categorizes devices according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data. • A Governance, Risk & Compliance (GRC) function, or similar function: o Defines the scope of ASM activities. o Provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data with regards to ASM. o Provides oversight of ASM activities to centrally manage the flaw remediation process as part of the organization’s overall Patch& Vulnerability & Patch Management Program (VPMP). • A Security Operations Center (SOC), or similar function: o Manages the identification, tracking and remediation of vulnerabilities. o Utilizes a Security Incident Event monitor (SIEM), or similar automated tool, to monitor for unauthorized activities, accounts, connections, devices and software according to organization-specific Indicators of Compromise (IoC), including feeds from applications, hosts, network devices and vulnerability scanners. • Asset custodians install the latest stable version of security-related updates on all systems within the organization-defined time requirements. • Cybersecurity personnel conduct annual penetration testing on network segments hosting High Value Assets (HVAs).
Vulnerability & Patch Management (VPM) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to conduct penetration testing on systems and web applications.
null
null
null
18.0 18.1 18.2 18.4 18.5
null
18.1 18.2
18.1 18.2 18.4 18.5
null
null
TVM-06
SET-02 SET-04
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
T1021.001, T1021.005, T1053, T1053.001, T1053.002, T1053.003, T1053.005, T1059, T1068, T1078, T1176, T1195.003, T1204.003, T1210, T1211, T1212, T1213, T1213.001, T1213.002, T1482, T1484, T1495, T1505, T1505.001, T1505.002, T1505.004, T1525, T1528, T1530, T1542, T1542.001, T1542.003, T1542.004, T1542.005, T1543, T1548, T1548.002, T1550.001, T1552, T1552.001, T1552.002, T1552.004, T1552.006, T1553, T1553.006, T1554, T1558.004, T1560, T1560.001, T1562, T1563, T1574, T1574.001, T1574.005, T1574.007, T1574.008, T1574.009, T1574.010, T1578, T1578.001, T1578.002, T1578.003, T1601, T1601.001, T1601.002, T1612
TS-4.1
null
null
null
null
null
null
CA-8
null
null
CA-8
CA-8 SA-11(5)
null
null
null
CA-8
SA-11(5)
null
null
null
CA-8
null
null
null
null
null
null
null
null
null
null
null
3.12.1e
null
null
null
null
11.3 11.3.1 11.3.2 11.3.3 11.3.4
11.4 11.4.1 11.4.2 11.4.3 11.4.4 11.4.5 11.4.6 11.4.7 A3.2.4
null
11.4.1 11.4.3 11.4.4 11.4.5
null
11.4.5
11.4.5
null
11.4.1 11.4.2 11.4.3 11.4.4 11.4.5
11.4.1 11.4.2 11.4.3 11.4.4 11.4.5 11.4.6 11.4.7
null
T.1.5.4 T.1.5.5 T.1.5.12
7.3A
null
null
null
null
null
VAR:SG2.SP1 VAR:SG2.SP2
5.6
null
null
null
TBD - 3.12.1e
null
null
CA.L3-3.12.1e
null
null
null
null
null
null
null
null
CA-8
null
CA-8
CA-8
null
CA-8
CA-8
CA-8
CA-8
CA-8
null
null
null
null
314.4(d)(2) 314.4(d)(2)(i)
null
null
null
7.L.A
CA-8 SA-11(5)
null
null
8-610 8-614
null
null
null
null
null
null
null
CA-8
CA-8
III.F.2.c
null
null
null
null
null
null
null
null
null
null
500.05
null
null
null
null
null
CA-8
null
CA-8
null
null
null
null
Art 26.1 Art 26.2 Art 26.3 Art 26.4 Art 26.5 Art 26.6 Art 26.7 Art 26.8 Art 26.8(a) Art 26.8(b) Art 26.8(c)
null
null
null
null
null
null
null
null
null
null
null
null
5.6
OPS-19 PSS-02
null
null
null
3.4 12.30 17.17 22.4 22.5
null
null
null
null
null
null
null
null
null
null
null
2-10 2-10-1-1 2-10-1-2 2-10-2
TPC-27 TPC-28 TPC-29
null
2-11-3-1
2-10 2-10-1 2-10-1-1 2-10-1-2 2-10-1-3 2-10-1-4 2-10-2
null
null
null
null
null
null
null
null
null
B4.d
null
null
null
null
null
null
null
null
null
1163
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
13.2.1 13.2.3 13.2.4
null
null
null
null
null
6.15
null
2.6
null
null
null
null
null
null
null
null
null
null
null
x
null
x
x
R-AC-2 R-AC-3 R-AC-4 R-AM-3 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1
null
R-AC-2
R-AC-3
R-AC-4
null
null
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
null
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
null
NT-1 NT-2 NT-3 NT-4 NT-5 NT-6 NT-7 NT-8 NT-9 NT-10 NT-11 NT-12 NT-13 NT-14 MT-1 MT-2 MT-3 MT-4 MT-5 MT-6 MT-7 MT-8 MT-9 MT-10 MT-11 MT-12 MT-13 MT-14 MT-15
NT-1
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Vulnerability & Patch Management
Independent Penetration Agent or Team
VPM-07.1
Mechanisms exist to utilize an independent assessor or penetration team to perform penetration testing.
null
E-VPM-04
Does the organization utilize an independent assessor or penetration team to perform penetration testing?
6
Detect
null
X
null
There is no evidence of a capability to utilize an independent assessor or penetration team to perform penetration testing.
SP-CMM1 is N/A, since a structured process is required to utilize an independent assessor or penetration team to perform penetration testing.
Vulnerability & Patch Management (VPM) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Attack Surface Management (ASM) is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel: o Identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for ASM. o Apply software patches and other vulnerability remediation efforts. • Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed. • Administrative processes exist to use an independent assessor or penetration team to perform penetration testing.
Vulnerability & Patch Management (VPM) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • An IT Asset Management (ITAM) function, or similar function, categorizes devices according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data. • A Governance, Risk & Compliance (GRC) function, or similar function: o Defines the scope of ASM activities. o Provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data with regards to ASM. o Provides oversight of ASM activities to centrally manage the flaw remediation process as part of the organization’s overall Patch& Vulnerability & Patch Management Program (VPMP). • A Security Operations Center (SOC), or similar function: o Manages the identification, tracking and remediation of vulnerabilities. o Utilizes a Security Incident Event monitor (SIEM), or similar automated tool, to monitor for unauthorized activities, accounts, connections, devices and software according to organization-specific Indicators of Compromise (IoC), including feeds from applications, hosts, network devices and vulnerability scanners. • Asset custodians install the latest stable version of security-related updates on all systems within the organization-defined time requirements. • Administrative processes exist to use an independent assessor or penetration team to perform penetration testing.
Vulnerability & Patch Management (VPM) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to utilize an independent assessor or penetration team to perform penetration testing.
null
null
null
null
null
null
null
null
null
null
SET-02 SET-03 SET-04
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
CA-8(1)
null
null
null
CA-8(1)
null
null
null
CA-8(1)
null
null
null
null
CA-8(1)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
11.4.1 11.4.2 11.4.3 11.4.5 11.4.6
null
11.4.5
null
11.4.5
11.4.5
null
11.4.1 11.4.2 11.4.3 11.4.5
11.4.1 11.4.2 11.4.3 11.4.5 11.4.6
null
T.1.5.2
null
null
null
null
null
null
null
5.6
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
CA-8(1)
null
CA-8(1)
CA-8(1)
null
CA-8(1)
null
CA-8(1)
CA-8(1)
null
null
null
null
null
null
null
null
null
7.L.A
null
null
null
null
null
null
null
null
null
null
null
CA-8(1)
CA-8(1)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
CA-8(1)
null
null
null
null
Art 27.1(a) Art 27.1(b) Art 27.1(c) Art 27.1(d) Art 27.1(e) Art 27.2(a) Art 27.2(b) Art 27.2(c) Art 27.3
null
null
null
null
null
null
null
null
null
null
null
null
null
OPS-19 PSS-02
null
null
null
17.16 17.17 22.4 22.5
null
null
null
null
null
null
null
null
null
null
null
2-10-1-2
null
null
null
null
null
null
null
null
null
null
null
null
null
B4.d
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
R-AC-2 R-AC-3 R-AC-4 R-AM-3 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1
null
R-AC-2
R-AC-3
R-AC-4
null
null
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
null
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
null
NT-1 NT-2 NT-3 NT-4 NT-5 NT-6 NT-7 NT-8 NT-9 NT-10 NT-11 NT-12 NT-13 NT-14 MT-1 MT-2 MT-3 MT-4 MT-5 MT-6 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15
NT-1
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Vulnerability & Patch Management
Technical Surveillance Countermeasures Security
VPM-08
Mechanisms exist to utilize a technical surveillance countermeasures survey.
- Facility sweeping for "bugs" or other unauthorized surveillance technologies.
null
Does the organization utilize a technical surveillance countermeasures survey?
1
Detect
null
X
null
There is no evidence of a capability to utilize a technical surveillance countermeasures survey.
SP-CMM1 is N/A, since a structured process is required to utilize a technical surveillance countermeasures survey.
Vulnerability & Patch Management (VPM) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Attack Surface Management (ASM) is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel: o Identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for ASM. o Apply software patches and other vulnerability remediation efforts. • Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed. • Administrative processes exist to use a technical surveillance countermeasures survey.
Vulnerability & Patch Management (VPM) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • An IT Asset Management (ITAM) function, or similar function, categorizes devices according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data. • A Governance, Risk & Compliance (GRC) function, or similar function: o Defines the scope of ASM activities. o Provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data with regards to ASM. o Provides oversight of ASM activities to centrally manage the flaw remediation process as part of the organization’s overall Patch& Vulnerability & Patch Management Program (VPMP). • A Security Operations Center (SOC), or similar function: o Manages the identification, tracking and remediation of vulnerabilities. o Utilizes a Security Incident Event monitor (SIEM), or similar automated tool, to monitor for unauthorized activities, accounts, connections, devices and software according to organization-specific Indicators of Compromise (IoC), including feeds from applications, hosts, network devices and vulnerability scanners. • Asset custodians install the latest stable version of security-related updates on all systems within the organization-defined time requirements. • Administrative processes exist to use a technical surveillance countermeasures survey.
Vulnerability & Patch Management (VPM) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to utilize a technical surveillance countermeasures survey.
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
RA-6
null
null
null
RA-6
null
null
null
null
RA-6
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
E.1.5
null
null
null
null
null
null
IMC:SG2.SP1 VAR:SG2.SP1
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
8.1.13.C.01 8.1.13.C.02
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
R-EX-6 R-EX-7 R-GV-1 R-SA-1
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
R-EX-6
R-EX-7
R-GV-1
null
null
null
null
null
null
null
null
null
null
null
R-SA-1
null
NT-1 NT-2 NT-3 NT-4 NT-5 NT-6 NT-7 NT-8 NT-9 NT-10 NT-11 NT-12 NT-13 NT-14 MT-1 MT-2 MT-3 MT-4 MT-5 MT-6 MT-7 MT-8 MT-9 MT-10 MT-11 MT-12 MT-13 MT-14 MT-15
NT-1
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Vulnerability & Patch Management
Reviewing Vulnerability Scanner Usage
VPM-09
Mechanisms exist to monitor logs associated with scanning activities and associated administrator accounts to ensure that those activities are limited to the timeframes of legitimate scans.
- Security Incident Event Manager (SIEM)
null
Does the organization monitor logs associated with scanning activities and associated administrator accounts to ensure that those activities are limited to the timeframes of legitimate scans?
3
Detect
null
X
X
There is no evidence of a capability to monitor logs associated with scanning activities and associated administrator accounts to ensure that those activities are limited to the timeframes of legitimate scans.
SP-CMM1 is N/A, since a structured process is required to monitor logs associated with scanning activities and associated administrator accounts to ensure that those activities are limited to the timeframes of legitimate scans.
Vulnerability & Patch Management (VPM) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Attack Surface Management (ASM) is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel: o Identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for ASM. o Apply software patches and other vulnerability remediation efforts. • Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed. • Logs of vulnerability scanning activities and associated administrator accounts are reviewed to ensure that those activities are limited to the timeframes of legitimate scans.
Vulnerability & Patch Management (VPM) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • An IT Asset Management (ITAM) function, or similar function, categorizes devices according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data. • A Governance, Risk & Compliance (GRC) function, or similar function: o Defines the scope of ASM activities. o Provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data with regards to ASM. o Provides oversight of ASM activities to centrally manage the flaw remediation process as part of the organization’s overall Patch& Vulnerability & Patch Management Program (VPMP). • A Security Operations Center (SOC), or similar function: o Manages the identification, tracking and remediation of vulnerabilities. o Utilizes a Security Incident Event monitor (SIEM), or similar automated tool, to monitor for unauthorized activities, accounts, connections, devices and software according to organization-specific Indicators of Compromise (IoC), including feeds from applications, hosts, network devices and vulnerability scanners. • Asset custodians install the latest stable version of security-related updates on all systems within the organization-defined time requirements. • Logs of vulnerability scanning activities and associated administrator accounts are reviewed to ensure that those activities are limited to the timeframes of legitimate scans.
Vulnerability & Patch Management (VPM) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
Vulnerability & Patch Management (VPM) efforts are “world-class” capabilities that leverage predictive analysis (e.g., machine learning, AI, etc.). In addition to CMM Level 4 criteria, CMM Level 5 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Stakeholders make time-sensitive decisions to support operational efficiency, which may include automated remediation actions. ▪ Based on predictive analysis, process improvements are implemented according to “continuous improvement” practices that affect process changes.
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
J.3.2
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
x
null
null
null
R-AM-3 R-BC-1 R-BC-2 R-GV-1 R-GV-6 R-GV-7 R-GV-8 R-IR-1 R-SA-1
null
null
null
null
null
null
R-AM-3
R-BC-1
R-BC-2
null
null
null
null
null
null
null
null
null
null
R-GV-1
null
null
null
null
R-GV-6
R-GV-7
R-GV-8
R-IR-1
null
null
null
R-SA-1
null
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Vulnerability & Patch Management
Red Team Exercises
VPM-10
Mechanisms exist to utilize "red team" exercises to simulate attempts by adversaries to compromise systems and applications in accordance with organization-defined rules of engagement.
- "red team" exercises
null
Does the organization utilize "red team" exercises to simulate attempts by adversaries to compromise systems and applications in accordance with organization-defined rules of engagement?
3
Detect
null
X
null
There is no evidence of a capability to utilize "red team" exercises to simulate attempts by adversaries to compromise systems and applications in accordance with organization-defined rules of engagement.
SP-CMM1 is N/A, since a structured process is required to utilize "red team" exercises to simulate attempts by adversaries to compromise systems and applications in accordance with organization-defined rules of engagement.
Vulnerability & Patch Management (VPM) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Attack Surface Management (ASM) is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel: o Identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for ASM. o Apply software patches and other vulnerability remediation efforts. • Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed. • Administrative processes exist to use red team exercises to simulate attempts by adversaries to compromise systems and applications in accordance with organization-defined rules of engagement.
Vulnerability & Patch Management (VPM) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • An IT Asset Management (ITAM) function, or similar function, categorizes devices according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data. • A Governance, Risk & Compliance (GRC) function, or similar function: o Defines the scope of ASM activities. o Provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data with regards to ASM. o Provides oversight of ASM activities to centrally manage the flaw remediation process as part of the organization’s overall Patch& Vulnerability & Patch Management Program (VPMP). • A Security Operations Center (SOC), or similar function: o Manages the identification, tracking and remediation of vulnerabilities. o Utilizes a Security Incident Event monitor (SIEM), or similar automated tool, to monitor for unauthorized activities, accounts, connections, devices and software according to organization-specific Indicators of Compromise (IoC), including feeds from applications, hosts, network devices and vulnerability scanners. • Asset custodians install the latest stable version of security-related updates on all systems within the organization-defined time requirements. • Administrative processes exist to use red team exercises to simulate attempts by adversaries to compromise systems and applications in accordance with organization-defined rules of engagement.
Vulnerability & Patch Management (VPM) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to utilize "red team" exercises to simulate attempts by adversaries to compromise systems and applications in accordance with organization-defined rules of engagement.
null
null
null
null
null
null
null
null
null
null
SET-03
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
CA-8(2)
null
null
null
CA-8(2)
null
null
null
null
CA-8(2)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
DE.DP-3
null
null
null
null
null
null
null
null
null
null
null
null
null
T.1.5.13 T.1.5.14
null
null
null
null
null
null
null
5.6
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
CA-8(2)
null
CA-8(2)
CA-8(2)
null
null
D3.DC.Ev.Int.2
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
III.F.2.c
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
5.6
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
2-13-1-9
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
13.3.1 13.3.2 13.4.1 13.4.2
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
x
null
null
x
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-1 R-AM-2 R-AM-3 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-GV-8 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1 R-SA-2
R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
R-SA-2
NT-1 NT-2 NT-3 NT-4 NT-5 NT-6 NT-7 NT-8 NT-9 NT-10 NT-11 NT-12 NT-13 NT-14 MT-1 MT-2 MT-3 MT-4 MT-5 MT-6 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15
NT-1
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Web Security
Web Security
WEB-01
Mechanisms exist to facilitate the implementation of an enterprise-wide web management policy, as well as associated standards, controls and procedures.
null
null
Does the organization facilitate the implementation of an enterprise-wide web management policy, as well as associated standards, controls and procedures?
8
Protect
X
X
X
There is no evidence of a capability to facilitate the implementation of an enterprise-wide web management policy, as well as associated standards, controls and procedures.
Web Security (WEB) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist: • The management of Internet-facing technologies are decentralized. • Internet-facing technologies are governed no differently from internal network assets.
Web Security (WEB) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Internet-facing technologies management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for Internet-facing technologies management. • Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed (e.g., Demilitarized Zones (DMZs)). • Internet-facing technologies are configured to protect data with the strength and integrity commensurate with the classification or sensitivity of the information and mostly conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides), including cryptographic protections for sensitive/regulated data.
Web Security (WEB) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • A Validated Architecture Design Review (VADR) evaluates Internet-facing design criteria for secure practices and conformance with requirements for applicable statutory, regulatory and contractual controls to determine if the system/application/service is designed, built and operated in a secure and resilient manner. • A change notification capability exists to scan web pages for changes, which are reviewed by appropriate personnel to determine if changes are authorized or unuathorized. • Ongoing content reviews are performed to ensure web pages do not contain non-public information. • Security engineering, or a similar function, ensures that Internet-facing devices conform to industry-recognized standards for configuration hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides) for test, development, staging and production environments. This includes creating special hardening requirements for High-Value Assets (HVAs). • An Identity & Access Management (IAM) function, or similar function, enables the implementation of identification and access management controls for Internet-facing technologies. • Technologies are configured to implement Strong Customer Authentication (SCA) for consumers to prove their identity. • Administrative processes exist and technologies are configured to provide Internet-facing individuals (e.g., customers, users, clients, etc.) with clear and precise information about cookies, in accordance with regulatory requirements for cookie management. • An IT Asset Management (ITAM) function, or similar function, categorizes network devices according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data. • Boundary protections: o Utilize Web Application Firewalls (WAFs) to provide defense-in-depth protection for application-specific threats. o Restrict inbound traffic to authorized devices on certain services, protocols and ports.
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to facilitate the implementation of an enterprise-wide web management policy, as well as associated standards, controls and procedures.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to facilitate the implementation of an enterprise-wide web management policy, as well as associated standards, controls and procedures.
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
6.10.1.3
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
A.03.13.01.a[01] A.03.13.01.a[02] A.03.13.01.b A.03.13.01.c
null
null
null
null
null
1.3.1 1.3.2 1.3.4
6.4 6.4.1 6.4.2
null
6.4.1 6.4.2
null
null
null
null
6.4.1 6.4.2
6.4.1 6.4.2
null
P.6.1
null
null
null
null
null
null
null
5.4
null
null
null
null
AC.L1-b.1.iv
null
null
null
null
null
null
52.204-21(b)(1)(iv)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
6.M.A
6.M.A
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Art 32.1 Art 32.2
null
null
null
Sec 14 Sec 15
Art 16
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
2-12 2-12-1-1 2-12-1-2
null
null
2-15-1 2-15-2 2-15-3 2-15-4
null
null
null
null
null
8.8.2 [MP.S.2]
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
14.5.6.C.01 14.5.7.C.01 14.5.8.C.01
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
x
FAR 52.204-21
x
null
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-1 R-AM-2 R-AM-3 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-GV-8 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1
R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
null
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15 MT-16
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
MT-16
null
Web Security
Unauthorized Code
WEB-01.1
Mechanisms exist to prevent unauthorized code from being present in a secure page as it is rendered in a client’s browser.
null
null
Does the organization prevent unauthorized code from being present in a secure page as it is rendered in a client’s browser?
9
Protect
null
X
X
There is no evidence of a capability to prevent unauthorized code from being present in a secure page as it is rendered in a client’s browser.
SP-CMM1 is N/A, since a structured process is required to prevent unauthorized code from being present in a secure page as it is rendered in a client’s browser.
Web Security (WEB) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Internet-facing technologies management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for Internet-facing technologies management. • Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed (e.g., Demilitarized Zones (DMZs)). • Internet-facing technologies are configured to protect data with the strength and integrity commensurate with the classification or sensitivity of the information and mostly conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides), including cryptographic protections for sensitive/regulated data.
Web Security (WEB) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • A Validated Architecture Design Review (VADR) evaluates Internet-facing design criteria for secure practices and conformance with requirements for applicable statutory, regulatory and contractual controls to determine if the system/application/service is designed, built and operated in a secure and resilient manner. • A change notification capability exists to scan web pages for changes, which are reviewed by appropriate personnel to determine if changes are authorized or unuathorized. • Ongoing content reviews are performed to ensure web pages do not contain non-public information. • Security engineering, or a similar function, ensures that Internet-facing devices conform to industry-recognized standards for configuration hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides) for test, development, staging and production environments. This includes creating special hardening requirements for High-Value Assets (HVAs). • An Identity & Access Management (IAM) function, or similar function, enables the implementation of identification and access management controls for Internet-facing technologies. • Technologies are configured to implement Strong Customer Authentication (SCA) for consumers to prove their identity. • Administrative processes exist and technologies are configured to provide Internet-facing individuals (e.g., customers, users, clients, etc.) with clear and precise information about cookies, in accordance with regulatory requirements for cookie management. • An IT Asset Management (ITAM) function, or similar function, categorizes network devices according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data. • Boundary protections: o Utilize Web Application Firewalls (WAFs) to provide defense-in-depth protection for application-specific threats. o Restrict inbound traffic to authorized devices on certain services, protocols and ports.
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to prevent unauthorized code from being present in a secure page as it is rendered in a client’s browser.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to prevent unauthorized code from being present in a secure page as it is rendered in a client’s browser.
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
6.4.3
6.4.3
6.4.3
null
null
null
null
6.4.3
6.4.3
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-1 R-AM-2 R-AM-3 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1
R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
null
MT-8 MT-9 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
MT-8
MT-9
null
null
MT-12
MT-13
MT-14
MT-15
null
null
Web Security
Use of Demilitarized Zones (DMZ)
WEB-02
Mechanisms exist to utilize a Demilitarized Zone (DMZ) to restrict inbound traffic to authorized devices on certain services, protocols and ports.
null
null
Does the organization utilize a Demilitarized Zone (DMZ) to restrict inbound traffic to authorized devices on certain services, protocols and ports?
9
Protect
null
X
X
There is no evidence of a capability to utilize a Demilitarized Zone (DMZ) to restrict inbound traffic to authorized devices on certain services, protocols and ports.
SP-CMM1 is N/A, since a structured process is required to utilize a Demilitarized Zone (DMZ) to restrict inbound traffic to authorized devices on certain services, protocols and ports.
Web Security (WEB) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Internet-facing technologies management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for Internet-facing technologies management. • Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed (e.g., Demilitarized Zones (DMZs)). • Internet-facing technologies are configured to protect data with the strength and integrity commensurate with the classification or sensitivity of the information and mostly conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides), including cryptographic protections for sensitive/regulated data.
Web Security (WEB) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • A Validated Architecture Design Review (VADR) evaluates Internet-facing design criteria for secure practices and conformance with requirements for applicable statutory, regulatory and contractual controls to determine if the system/application/service is designed, built and operated in a secure and resilient manner. • A change notification capability exists to scan web pages for changes, which are reviewed by appropriate personnel to determine if changes are authorized or unuathorized. • Ongoing content reviews are performed to ensure web pages do not contain non-public information. • Security engineering, or a similar function, ensures that Internet-facing devices conform to industry-recognized standards for configuration hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides) for test, development, staging and production environments. This includes creating special hardening requirements for High-Value Assets (HVAs). • An Identity & Access Management (IAM) function, or similar function, enables the implementation of identification and access management controls for Internet-facing technologies. • Technologies are configured to implement Strong Customer Authentication (SCA) for consumers to prove their identity. • Administrative processes exist and technologies are configured to provide Internet-facing individuals (e.g., customers, users, clients, etc.) with clear and precise information about cookies, in accordance with regulatory requirements for cookie management. • An IT Asset Management (ITAM) function, or similar function, categorizes network devices according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data. • Boundary protections: o Utilize Web Application Firewalls (WAFs) to provide defense-in-depth protection for application-specific threats. o Restrict inbound traffic to authorized devices on certain services, protocols and ports.
Web Security (WEB) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to utilize a Demilitarized Zone (DMZ) to restrict inbound traffic to authorized devices on certain services, protocols and ports.
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
13.1.3
8.22
null
null
6.10.1.3
null
null
null
null
TS-1.9 TS-1.15 TS-2.0
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
A.03.13.01.b
null
null
null
null
null
1.3.1 1.3.2 1.3.4
null
null
null
null
null
null
null
null
null
null
N.7 N.7.1 N.7.3
1.1
null
null
null
null
null
null
5.4
null
null
null
null
SC.L1-b.1.xi
null
null
null
null
null
null
52.204-21(b)(1)(xi)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
6.M.A 6.M.B
6.M.A 6.M.B
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Art 32.1 Art 32.2
null
null
null
Sec 14 Sec 15
Art 16
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
TPC-41
null
null
2-4-1-10 2-4-1-13
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
x
FAR 52.204-21
x
null
R-AC-2 R-AC-3 R-AC-4 R-AM-1 R-AM-2 R-AM-3 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-GV-8 R-IR-4 R-SA-1
null
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
null
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
null
null
null
R-IR-4
R-SA-1
null
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Web Security
Web Application Firewall (WAF)
WEB-03
Mechanisms exist to deploy Web Application Firewalls (WAFs) to provide defense-in-depth protection for application-specific threats.
- Web Application Firewall (WAF)
null
Does the organization deploy Web Application Firewalls (WAFs) to provide defense-in-depth protection for application-specific threats?
8
Protect
null
X
X
There is no evidence of a capability to deploy Web Application Firewalls (WAFs) to provide defense-in-depth protection for application-specific threats.
SP-CMM1 is N/A, since a structured process is required to deploy Web Application Firewalls (WAFs) to provide defense-in-depth protection for application-specific threats.
Web Security (WEB) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Internet-facing technologies management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for Internet-facing technologies management. • Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed (e.g., Demilitarized Zones (DMZs)). • Internet-facing technologies are configured to protect data with the strength and integrity commensurate with the classification or sensitivity of the information and mostly conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides), including cryptographic protections for sensitive/regulated data.
Web Security (WEB) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • A Validated Architecture Design Review (VADR) evaluates Internet-facing design criteria for secure practices and conformance with requirements for applicable statutory, regulatory and contractual controls to determine if the system/application/service is designed, built and operated in a secure and resilient manner. • A change notification capability exists to scan web pages for changes, which are reviewed by appropriate personnel to determine if changes are authorized or unuathorized. • Ongoing content reviews are performed to ensure web pages do not contain non-public information. • Security engineering, or a similar function, ensures that Internet-facing devices conform to industry-recognized standards for configuration hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides) for test, development, staging and production environments. This includes creating special hardening requirements for High-Value Assets (HVAs). • An Identity & Access Management (IAM) function, or similar function, enables the implementation of identification and access management controls for Internet-facing technologies. • Technologies are configured to implement Strong Customer Authentication (SCA) for consumers to prove their identity. • Administrative processes exist and technologies are configured to provide Internet-facing individuals (e.g., customers, users, clients, etc.) with clear and precise information about cookies, in accordance with regulatory requirements for cookie management. • An IT Asset Management (ITAM) function, or similar function, categorizes network devices according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data. • Boundary protections: o Utilize Web Application Firewalls (WAFs) to provide defense-in-depth protection for application-specific threats. o Restrict inbound traffic to authorized devices on certain services, protocols and ports.
Web Security (WEB) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to deploy Web Application Firewalls (WAFs) to provide defense-in-depth protection for application-specific threats.
null
null
null
4.4 13.10
null
4.4
4.4 13.10
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
TS-2.4
null
null
null
null
null
null
SC-7(17)
null
null
null
SC-7(17)
null
null
null
null
SC-7(17)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
6.4 6.4.1 6.4.2
null
6.4.1 6.4.2
null
null
null
null
6.4.1 6.4.2
6.4.1 6.4.2
null
I.3.19
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
6.M.A
6.M.A
SC-7(17)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
TPC-79
null
2-15-3-1
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
4.3 4.4
null
null
null
null
null
null
null
null
null
null
null
x
null
null
null
R-AM-1 R-AM-3 R-BC-1 R-BC-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-4 R-GV-5 R-IR-4 R-SA-1
null
null
null
null
R-AM-1
null
R-AM-3
R-BC-1
null
null
R-BC-4
null
null
null
null
null
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
null
R-GV-4
R-GV-5
null
null
null
null
null
null
R-IR-4
R-SA-1
null
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-10 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Web Security
Client-Facing Web Services
WEB-04
Mechanisms exist to deploy reasonably-expected security controls to protect the confidentiality and availability of client data that is stored, transmitted or processed by the Internet-based service.
- OWASP
null
Does the organization deploy reasonably-expected security controls to protect the confidentiality and availability of client data that is stored, transmitted or processed by the Internet-based service?
10
Protect
null
X
X
There is no evidence of a capability to deploy reasonably-expected security controls to protect the confidentiality and availability of client data that is stored, transmitted or processed by the Internet-based service.
SP-CMM1 is N/A, since a structured process is required to deploy reasonably-expected security controls to protect the confidentiality and availability of client data that is stored, transmitted or processed by the Internet-based service.
Web Security (WEB) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Internet-facing technologies management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for Internet-facing technologies management. • Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed (e.g., Demilitarized Zones (DMZs)). • Internet-facing technologies are configured to protect data with the strength and integrity commensurate with the classification or sensitivity of the information and mostly conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides), including cryptographic protections for sensitive/regulated data.
Web Security (WEB) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • A Validated Architecture Design Review (VADR) evaluates Internet-facing design criteria for secure practices and conformance with requirements for applicable statutory, regulatory and contractual controls to determine if the system/application/service is designed, built and operated in a secure and resilient manner. • A change notification capability exists to scan web pages for changes, which are reviewed by appropriate personnel to determine if changes are authorized or unuathorized. • Ongoing content reviews are performed to ensure web pages do not contain non-public information. • Security engineering, or a similar function, ensures that Internet-facing devices conform to industry-recognized standards for configuration hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides) for test, development, staging and production environments. This includes creating special hardening requirements for High-Value Assets (HVAs). • An Identity & Access Management (IAM) function, or similar function, enables the implementation of identification and access management controls for Internet-facing technologies. • Technologies are configured to implement Strong Customer Authentication (SCA) for consumers to prove their identity. • Administrative processes exist and technologies are configured to provide Internet-facing individuals (e.g., customers, users, clients, etc.) with clear and precise information about cookies, in accordance with regulatory requirements for cookie management. • An IT Asset Management (ITAM) function, or similar function, categorizes network devices according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data. • Boundary protections: o Utilize Web Application Firewalls (WAFs) to provide defense-in-depth protection for application-specific threats. o Restrict inbound traffic to authorized devices on certain services, protocols and ports.
Web Security (WEB) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to deploy reasonably-expected security controls to protect the confidentiality and availability of client data that is stored, transmitted or processed by the Internet-based service.
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
C.1.2
null
null
8.2
null
null
null
null
null
null
null
null
null
AC.L1-b.1.iv
null
null
null
null
null
null
52.204-21(b)(1)(iv)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
2-12 2-12-1-1 2-12-1-2
null
null
null
null
null
null
Sec 19
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
x
FAR 52.204-21
x
null
R-AC-4 R-AM-2 R-AM-3 R-BC-2 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-7 R-GV-1 R-GV-2 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-IR-1 R-IR-4
null
null
null
R-AC-4
null
R-AM-2
R-AM-3
null
R-BC-2
null
null
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
null
R-EX-7
R-GV-1
R-GV-2
null
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
R-IR-1
null
null
R-IR-4
null
null
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Web Security
Cookie Management
WEB-05
Mechanisms exist to provide individuals with clear and precise information about cookies, in accordance with applicable legal requirements for cookie management.
null
null
Does the organization provide individuals with clear and precise information about cookies, in accordance with applicable legal requirements for cookie management?
5
Identify
null
X
X
There is no evidence of a capability to provide individuals with clear and precise information about cookies, in accordance with applicable legal requirements for cookie management.
SP-CMM1 is N/A, since a structured process is required to provide individuals with clear and precise information about cookies, in accordance with applicable legal requirements for cookie management.
Web Security (WEB) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Internet-facing technologies management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for Internet-facing technologies management. • Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed (e.g., Demilitarized Zones (DMZs)). • Internet-facing technologies are configured to protect data with the strength and integrity commensurate with the classification or sensitivity of the information and mostly conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides), including cryptographic protections for sensitive/regulated data.
Web Security (WEB) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • A Validated Architecture Design Review (VADR) evaluates Internet-facing design criteria for secure practices and conformance with requirements for applicable statutory, regulatory and contractual controls to determine if the system/application/service is designed, built and operated in a secure and resilient manner. • A change notification capability exists to scan web pages for changes, which are reviewed by appropriate personnel to determine if changes are authorized or unuathorized. • Ongoing content reviews are performed to ensure web pages do not contain non-public information. • Security engineering, or a similar function, ensures that Internet-facing devices conform to industry-recognized standards for configuration hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides) for test, development, staging and production environments. This includes creating special hardening requirements for High-Value Assets (HVAs). • An Identity & Access Management (IAM) function, or similar function, enables the implementation of identification and access management controls for Internet-facing technologies. • Technologies are configured to implement Strong Customer Authentication (SCA) for consumers to prove their identity. • Administrative processes exist and technologies are configured to provide Internet-facing individuals (e.g., customers, users, clients, etc.) with clear and precise information about cookies, in accordance with regulatory requirements for cookie management. • An IT Asset Management (ITAM) function, or similar function, categorizes network devices according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data. • Boundary protections: o Utilize Web Application Firewalls (WAFs) to provide defense-in-depth protection for application-specific threats. o Restrict inbound traffic to authorized devices on certain services, protocols and ports.
Web Security (WEB) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to provide individuals with clear and precise information about cookies, in accordance with applicable legal requirements for cookie management.
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
7.1.1
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
P.6.1.6
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
(25)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
x
null
R-AM-3 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-GV-1 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7
null
null
null
null
null
null
R-AM-3
null
null
null
null
null
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
null
null
R-GV-1
null
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
null
null
null
null
null
null
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Web Security
Strong Customer Authentication (SCA)
WEB-06
Mechanisms exist to implement Strong Customer Authentication (SCA) for consumers to reasonably prove their identity.
null
null
Does the organization implement Strong Customer Authentication (SCA) for consumers to reasonably prove their identity?
8
Protect
null
X
X
There is no evidence of a capability to implement Strong Customer Authentication (SCA) for consumers to reasonably prove their identity.
SP-CMM1 is N/A, since a structured process is required to implement Strong Customer Authentication (SCA) for consumers to reasonably prove their identity.
Web Security (WEB) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Internet-facing technologies management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for Internet-facing technologies management. • Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed (e.g., Demilitarized Zones (DMZs)). • Internet-facing technologies are configured to protect data with the strength and integrity commensurate with the classification or sensitivity of the information and mostly conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides), including cryptographic protections for sensitive/regulated data.
Web Security (WEB) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • A Validated Architecture Design Review (VADR) evaluates Internet-facing design criteria for secure practices and conformance with requirements for applicable statutory, regulatory and contractual controls to determine if the system/application/service is designed, built and operated in a secure and resilient manner. • A change notification capability exists to scan web pages for changes, which are reviewed by appropriate personnel to determine if changes are authorized or unuathorized. • Ongoing content reviews are performed to ensure web pages do not contain non-public information. • Security engineering, or a similar function, ensures that Internet-facing devices conform to industry-recognized standards for configuration hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides) for test, development, staging and production environments. This includes creating special hardening requirements for High-Value Assets (HVAs). • An Identity & Access Management (IAM) function, or similar function, enables the implementation of identification and access management controls for Internet-facing technologies. • Technologies are configured to implement Strong Customer Authentication (SCA) for consumers to prove their identity. • Administrative processes exist and technologies are configured to provide Internet-facing individuals (e.g., customers, users, clients, etc.) with clear and precise information about cookies, in accordance with regulatory requirements for cookie management. • An IT Asset Management (ITAM) function, or similar function, categorizes network devices according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data. • Boundary protections: o Utilize Web Application Firewalls (WAFs) to provide defense-in-depth protection for application-specific threats. o Restrict inbound traffic to authorized devices on certain services, protocols and ports.
Web Security (WEB) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
Web Security (WEB) efforts are “world-class” capabilities that leverage predictive analysis (e.g., machine learning, AI, etc.). In addition to CMM Level 4 criteria, CMM Level 5 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Stakeholders make time-sensitive decisions to support operational efficiency, which may include automated remediation actions. ▪ Based on predictive analysis, process improvements are implemented according to “continuous improvement” practices that affect process changes.
null
null
null
null
null
null
null
null
null
IAM-01 IAM-02 IAM-14
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
PR.AC-P1
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
8.3.10
null
null
null
null
null
null
null
8.3.10
null
P.5.5.6.6
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Art 4
null
null
null
null
null
null
null
null
null
PSS-05
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
2-12-1-1
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
x
null
R-AC-4 R-AM-2 R-AM-3 R-BC-2 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-7 R-GV-1 R-GV-2 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-IR-1 R-IR-4
null
null
null
R-AC-4
null
R-AM-2
R-AM-3
null
R-BC-2
null
null
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
null
R-EX-7
R-GV-1
R-GV-2
null
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
R-IR-1
null
null
R-IR-4
null
null
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-10 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Web Security
Web Security Standard
WEB-07
Mechanisms exist to ensure the Open Web Application Security Project (OWASP) Application Security Verification Standard is incorporated into the organization's Secure Systems Development Lifecycle (SSDLC) process.
null
null
Does the organization ensure the Open Web Application Security Project (OWASP) Application Security Verification Standard is incorporated into the organization's Secure Systems Development Lifecycle (SSDLC) process?
9
Protect
null
X
X
There is no evidence of a capability to ensure the Open Web Application Security Project (OWASP) Application Security Verification Standard is incorporated into the organization's Secure Systems Development Lifecycle (SSDLC) process.
SP-CMM1 is N/A, since a structured process is required to ensure the Open Web Application Security Project (OWASP) Application Security Verification Standard is incorporated into the organization's Secure Systems Development Lifecycle (SSDLC) process.
SP-CMM2 is N/A, since a well-defined process is required to ensure the open Web Application Security Project (OWASP) Application Security Verification Standard is incorporated into the organization's Secure Systems Development Lifecycle (SSDLC) process.
Web Security (WEB) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • A Validated Architecture Design Review (VADR) evaluates Internet-facing design criteria for secure practices and conformance with requirements for applicable statutory, regulatory and contractual controls to determine if the system/application/service is designed, built and operated in a secure and resilient manner. • A change notification capability exists to scan web pages for changes, which are reviewed by appropriate personnel to determine if changes are authorized or unuathorized. • Ongoing content reviews are performed to ensure web pages do not contain non-public information. • Security engineering, or a similar function, ensures that Internet-facing devices conform to industry-recognized standards for configuration hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides) for test, development, staging and production environments. This includes creating special hardening requirements for High-Value Assets (HVAs). • An Identity & Access Management (IAM) function, or similar function, enables the implementation of identification and access management controls for Internet-facing technologies. • Technologies are configured to implement Strong Customer Authentication (SCA) for consumers to prove their identity. • Administrative processes exist and technologies are configured to provide Internet-facing individuals (e.g., customers, users, clients, etc.) with clear and precise information about cookies, in accordance with regulatory requirements for cookie management. • An IT Asset Management (ITAM) function, or similar function, categorizes network devices according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data. • Boundary protections: o Utilize Web Application Firewalls (WAFs) to provide defense-in-depth protection for application-specific threats. o Restrict inbound traffic to authorized devices on certain services, protocols and ports.
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to ensure the Open Web Application Security Project (OWASP) Application Security Verification Standard is incorporated into the organization's Secure Systems Development Lifecycle (SSDLC) process.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to ensure the Open Web Application Security Project (OWASP) Application Security Verification Standard is incorporated into the organization's Secure Systems Development Lifecycle (SSDLC) process.
null
null
null
16.0 16.1 16.7
null
16.1 16.7
16.1 16.7
null
null
AIS-04
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
1.1.10 1.2.11.6 1.3.2.3.8
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
2-12-1-2
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
1239 0971
null
null
null
null
null
null
null
null
null
null
null
null
null
14.5.7.C.01 14.5.8.C.01
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
R-AC-4 R-AM-2 R-AM-3 R-BC-2 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-7 R-GV-1 R-GV-2 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-IR-1 R-IR-4
null
null
null
R-AC-4
null
R-AM-2
R-AM-3
null
R-BC-2
null
null
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
null
R-EX-7
R-GV-1
R-GV-2
null
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
R-IR-1
null
null
R-IR-4
null
null
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Web Security
Web Application Framework
WEB-08
Mechanisms exist to ensure a robust Web Application Framework is used to aid in the development of secure web applications, including web services, web resources and web APIs.
null
null
Does the organization ensure a robust Web Application Framework is used to aid in the development of secure web applications, including web services, web resources and web APIs?
9
Protect
null
X
X
There is no evidence of a capability to ensure a robust Web Application Framework is used to aid in the development of secure web applications, including web services, web resources and web APIs.
SP-CMM1 is N/A, since a structured process is required to ensure a robust Web Application Framework is used to aid in the development of secure web applications, including web services, web resources and web APIs.
SP-CMM2 is N/A, since a well-defined process is required to ensure a robust Web Application Framework is used to aid in the development of secure web applications, including web services, web resources and web APIs.
Web Security (WEB) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • A Validated Architecture Design Review (VADR) evaluates Internet-facing design criteria for secure practices and conformance with requirements for applicable statutory, regulatory and contractual controls to determine if the system/application/service is designed, built and operated in a secure and resilient manner. • A change notification capability exists to scan web pages for changes, which are reviewed by appropriate personnel to determine if changes are authorized or unuathorized. • Ongoing content reviews are performed to ensure web pages do not contain non-public information. • Security engineering, or a similar function, ensures that Internet-facing devices conform to industry-recognized standards for configuration hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides) for test, development, staging and production environments. This includes creating special hardening requirements for High-Value Assets (HVAs). • An Identity & Access Management (IAM) function, or similar function, enables the implementation of identification and access management controls for Internet-facing technologies. • Technologies are configured to implement Strong Customer Authentication (SCA) for consumers to prove their identity. • Administrative processes exist and technologies are configured to provide Internet-facing individuals (e.g., customers, users, clients, etc.) with clear and precise information about cookies, in accordance with regulatory requirements for cookie management. • An IT Asset Management (ITAM) function, or similar function, categorizes network devices according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data. • Boundary protections: o Utilize Web Application Firewalls (WAFs) to provide defense-in-depth protection for application-specific threats. o Restrict inbound traffic to authorized devices on certain services, protocols and ports.
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to ensure a robust Web Application Framework is used to aid in the development of secure web applications, including web services, web resources and web APIs.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to ensure a robust Web Application Framework is used to aid in the development of secure web applications, including web services, web resources and web APIs.
null
null
null
16.0 16.1
null
16.1
16.1
null
null
AIS-04
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
1.1.10 1.2.11.6 1.3.2.3.8
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
2-12-1-1
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
1239
null
null
null
null
null
null
null
null
null
null
null
null
null
14.5.7.C.01 14.5.8.C.01
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
R-AC-4 R-AM-2 R-AM-3 R-BC-2 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-7 R-GV-1 R-GV-2 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-IR-1 R-IR-4
null
null
null
R-AC-4
null
R-AM-2
R-AM-3
null
R-BC-2
null
null
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
null
R-EX-7
R-GV-1
R-GV-2
null
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
R-IR-1
null
null
R-IR-4
null
null
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Web Security
Validation & Sanitization
WEB-09
Mechanisms exist to ensure all input handled by a web application is validated and/or sanitized.
null
null
Does the organization ensure all input handled by a web application is validated and/or sanitized?
9
Protect
null
X
X
There is no evidence of a capability to ensure all input handled by a web application is validated and/ or sanitized.
SP-CMM1 is N/A, since a structured process is required to ensure all input handled by a web application is validated and/ or sanitized.
SP-CMM2 is N/A, since a well-defined process is required to ensure all input handled by a web application is validated and/ or sanitized.
Web Security (WEB) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • A Validated Architecture Design Review (VADR) evaluates Internet-facing design criteria for secure practices and conformance with requirements for applicable statutory, regulatory and contractual controls to determine if the system/application/service is designed, built and operated in a secure and resilient manner. • A change notification capability exists to scan web pages for changes, which are reviewed by appropriate personnel to determine if changes are authorized or unuathorized. • Ongoing content reviews are performed to ensure web pages do not contain non-public information. • Security engineering, or a similar function, ensures that Internet-facing devices conform to industry-recognized standards for configuration hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides) for test, development, staging and production environments. This includes creating special hardening requirements for High-Value Assets (HVAs). • An Identity & Access Management (IAM) function, or similar function, enables the implementation of identification and access management controls for Internet-facing technologies. • Technologies are configured to implement Strong Customer Authentication (SCA) for consumers to prove their identity. • Administrative processes exist and technologies are configured to provide Internet-facing individuals (e.g., customers, users, clients, etc.) with clear and precise information about cookies, in accordance with regulatory requirements for cookie management. • An IT Asset Management (ITAM) function, or similar function, categorizes network devices according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data. • Boundary protections: o Utilize Web Application Firewalls (WAFs) to provide defense-in-depth protection for application-specific threats. o Restrict inbound traffic to authorized devices on certain services, protocols and ports.
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to ensure all input handled by a web application is validated and/ or sanitized.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to ensure all input handled by a web application is validated and/ or sanitized.
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
I.1.16
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
1240
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
R-AC-4 R-AM-2 R-AM-3 R-BC-2 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-7 R-GV-1 R-GV-2 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-IR-1 R-IR-4
null
null
null
R-AC-4
null
R-AM-2
R-AM-3
null
R-BC-2
null
null
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
null
R-EX-7
R-GV-1
R-GV-2
null
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
R-IR-1
null
null
R-IR-4
null
null
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Web Security
Secure Web Traffic
WEB-10
Mechanisms exist to ensure all web application content is delivered using cryptographic mechanisms (e.g., TLS).
null
null
Does the organization ensure all web application content is delivered using cryptographic mechanisms (e?g?, TLS)?
9
Protect
null
X
X
There is no evidence of a capability to ensure all web application content is delivered using cryptographic mechanisms (e.g., TLS).
SP-CMM1 is N/A, since a structured process is required to ensure all web application content is delivered using cryptographic mechanisms (e.g., TLS).
SP-CMM2 is N/A, since a well-defined process is required to ensure all web application content is delivered using cryptographic mechanisms (e.g., TLS).
Web Security (WEB) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • A Validated Architecture Design Review (VADR) evaluates Internet-facing design criteria for secure practices and conformance with requirements for applicable statutory, regulatory and contractual controls to determine if the system/application/service is designed, built and operated in a secure and resilient manner. • A change notification capability exists to scan web pages for changes, which are reviewed by appropriate personnel to determine if changes are authorized or unuathorized. • Ongoing content reviews are performed to ensure web pages do not contain non-public information. • Security engineering, or a similar function, ensures that Internet-facing devices conform to industry-recognized standards for configuration hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides) for test, development, staging and production environments. This includes creating special hardening requirements for High-Value Assets (HVAs). • An Identity & Access Management (IAM) function, or similar function, enables the implementation of identification and access management controls for Internet-facing technologies. • Technologies are configured to implement Strong Customer Authentication (SCA) for consumers to prove their identity. • Administrative processes exist and technologies are configured to provide Internet-facing individuals (e.g., customers, users, clients, etc.) with clear and precise information about cookies, in accordance with regulatory requirements for cookie management. • An IT Asset Management (ITAM) function, or similar function, categorizes network devices according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data. • Boundary protections: o Utilize Web Application Firewalls (WAFs) to provide defense-in-depth protection for application-specific threats. o Restrict inbound traffic to authorized devices on certain services, protocols and ports.
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to ensure all web application content is delivered using cryptographic mechanisms (e.g., TLS).
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to ensure all web application content is delivered using cryptographic mechanisms (e.g., TLS).
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
I.3.6.1
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
2-12-1-1
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
1552
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
R-AC-4 R-AM-2 R-AM-3 R-BC-2 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-7 R-GV-1 R-GV-2 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-IR-1 R-IR-4
null
null
null
R-AC-4
null
R-AM-2
R-AM-3
null
R-BC-2
null
null
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
null
R-EX-7
R-GV-1
R-GV-2
null
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
R-IR-1
null
null
R-IR-4
null
null
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Web Security
Output Encoding
WEB-11
Mechanisms exist to ensure output encoding is performed on all content produced by a web application to reduce the likelihood of cross-site scripting and other injection attacks.
null
null
Does the organization ensure output encoding is performed on all content produced by a web application to reduce the likelihood of cross-site scripting and other injection attacks?
9
Protect
null
X
X
There is no evidence of a capability to ensure output encoding is performed on all content produced by a web application to reduce the likelihood of cross-site scripting and other injection attacks.
SP-CMM1 is N/A, since a structured process is required to ensure output encoding is performed on all content produced by a web application to reduce the likelihood of cross-site scripting and other injection attacks.
SP-CMM2 is N/A, since a well-defined process is required to ensure output encoding is performed on all content produced by a web application to reduce the likelihood of cross-site scripting and other injection attacks.
Web Security (WEB) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • A Validated Architecture Design Review (VADR) evaluates Internet-facing design criteria for secure practices and conformance with requirements for applicable statutory, regulatory and contractual controls to determine if the system/application/service is designed, built and operated in a secure and resilient manner. • A change notification capability exists to scan web pages for changes, which are reviewed by appropriate personnel to determine if changes are authorized or unuathorized. • Ongoing content reviews are performed to ensure web pages do not contain non-public information. • Security engineering, or a similar function, ensures that Internet-facing devices conform to industry-recognized standards for configuration hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides) for test, development, staging and production environments. This includes creating special hardening requirements for High-Value Assets (HVAs). • An Identity & Access Management (IAM) function, or similar function, enables the implementation of identification and access management controls for Internet-facing technologies. • Technologies are configured to implement Strong Customer Authentication (SCA) for consumers to prove their identity. • Administrative processes exist and technologies are configured to provide Internet-facing individuals (e.g., customers, users, clients, etc.) with clear and precise information about cookies, in accordance with regulatory requirements for cookie management. • An IT Asset Management (ITAM) function, or similar function, categorizes network devices according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data. • Boundary protections: o Utilize Web Application Firewalls (WAFs) to provide defense-in-depth protection for application-specific threats. o Restrict inbound traffic to authorized devices on certain services, protocols and ports.
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to ensure output encoding is performed on all content produced by a web application to reduce the likelihood of cross-site scripting and other injection attacks.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to ensure output encoding is performed on all content produced by a web application to reduce the likelihood of cross-site scripting and other injection attacks.
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
C.1.8
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
1241
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
R-AC-4 R-AM-2 R-AM-3 R-BC-2 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-7 R-GV-1 R-GV-2 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-IR-1 R-IR-4
null
null
null
R-AC-4
null
R-AM-2
R-AM-3
null
R-BC-2
null
null
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
null
R-EX-7
R-GV-1
R-GV-2
null
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
R-IR-1
null
null
R-IR-4
null
null
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Web Security
Web Browser Security
WEB-12
Mechanisms exist to ensure web applications implement Content-Security-Policy, HSTS and X-Frame-Options response headers to protect both the web application and its users.
null
null
Does the organization ensure web applications implement Content-Security-Policy, HSTS and X-Frame-Options response headers to protect both the web application and its users?
9
Protect
null
X
X
There is no evidence of a capability to ensure web applications implement Content-Security-Policy, HSTS and X-Frame-Options response headers to protect both the web application and its users.
SP-CMM1 is N/A, since a structured process is required to ensure web applications implement Content-Security-Policy, HSTS and X-Frame-Options response headers to protect both the web application and its users.
SP-CMM2 is N/A, since a well-defined process is required to ensure web applications implement Content-Security-Policy, HSTS and X-Frame-Options response headers to protect both the web application and its users.
Web Security (WEB) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • A Validated Architecture Design Review (VADR) evaluates Internet-facing design criteria for secure practices and conformance with requirements for applicable statutory, regulatory and contractual controls to determine if the system/application/service is designed, built and operated in a secure and resilient manner. • A change notification capability exists to scan web pages for changes, which are reviewed by appropriate personnel to determine if changes are authorized or unuathorized. • Ongoing content reviews are performed to ensure web pages do not contain non-public information. • Security engineering, or a similar function, ensures that Internet-facing devices conform to industry-recognized standards for configuration hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides) for test, development, staging and production environments. This includes creating special hardening requirements for High-Value Assets (HVAs). • An Identity & Access Management (IAM) function, or similar function, enables the implementation of identification and access management controls for Internet-facing technologies. • Technologies are configured to implement Strong Customer Authentication (SCA) for consumers to prove their identity. • Administrative processes exist and technologies are configured to provide Internet-facing individuals (e.g., customers, users, clients, etc.) with clear and precise information about cookies, in accordance with regulatory requirements for cookie management. • An IT Asset Management (ITAM) function, or similar function, categorizes network devices according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data. • Boundary protections: o Utilize Web Application Firewalls (WAFs) to provide defense-in-depth protection for application-specific threats. o Restrict inbound traffic to authorized devices on certain services, protocols and ports.
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to ensure web applications implement Content-Security-Policy, HSTS and X-Frame-Options response headers to protect both the web application and its users.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to ensure web applications implement Content-Security-Policy, HSTS and X-Frame-Options response headers to protect both the web application and its users.
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
2-12-1-1
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
1424
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
R-AC-4 R-AM-2 R-AM-3 R-BC-2 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-7 R-GV-1 R-GV-2 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-IR-1 R-IR-4
null
null
null
R-AC-4
null
R-AM-2
R-AM-3
null
R-BC-2
null
null
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
null
R-EX-7
R-GV-1
R-GV-2
null
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
R-IR-1
null
null
R-IR-4
null
null
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Web Security
Website Change Detection
WEB-13
Mechanisms exist to detect and respond to Indicators of Compromise (IoC) for unauthorized alterations, additions, deletions or changes on websites that store, process and/or transmit sensitive / regulated data.
null
null
Does the organization detect and respond to Indicators of Compromise (IoC) for unauthorized alterations, additions, deletions or changes on websites that store, process and/or transmit sensitive / regulated data?
8
Detect
null
null
X
There is no evidence of a capability to detect and respond to Indicators of Compromise (IoC) for unauthorized alterations, additions, deletions or changes on websites that store, process and/ or transmit sensitive / regulated data.
SP-CMM1 is N/A, since a structured process is required to detect and respond to Indicators of Compromise (IoC) for unauthorized alterations, additions, deletions or changes on websites that store, process and/ or transmit sensitive / regulated data.
SP-CMM2 is N/A, since a well-defined process is required to detect and respond to Indicators of Compromise (IoC) for unauthorized alterations, additions, deletions or changes on websites that store, process and/ or transmit sensitive / regulated data.
Web Security (WEB) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • A Validated Architecture Design Review (VADR) evaluates Internet-facing design criteria for secure practices and conformance with requirements for applicable statutory, regulatory and contractual controls to determine if the system/application/service is designed, built and operated in a secure and resilient manner. • A change notification capability exists to scan web pages for changes, which are reviewed by appropriate personnel to determine if changes are authorized or unuathorized. • Ongoing content reviews are performed to ensure web pages do not contain non-public information. • Security engineering, or a similar function, ensures that Internet-facing devices conform to industry-recognized standards for configuration hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides) for test, development, staging and production environments. This includes creating special hardening requirements for High-Value Assets (HVAs). • An Identity & Access Management (IAM) function, or similar function, enables the implementation of identification and access management controls for Internet-facing technologies. • Technologies are configured to implement Strong Customer Authentication (SCA) for consumers to prove their identity. • Administrative processes exist and technologies are configured to provide Internet-facing individuals (e.g., customers, users, clients, etc.) with clear and precise information about cookies, in accordance with regulatory requirements for cookie management. • An IT Asset Management (ITAM) function, or similar function, categorizes network devices according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data. • Boundary protections: o Utilize Web Application Firewalls (WAFs) to provide defense-in-depth protection for application-specific threats. o Restrict inbound traffic to authorized devices on certain services, protocols and ports.
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to detect and respond to Indicators of Compromise (IoC) for unauthorized alterations, additions, deletions or changes on websites that store, process and/ or transmit sensitive / regulated data.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to detect and respond to Indicators of Compromise (IoC) for unauthorized alterations, additions, deletions or changes on websites that store, process and/ or transmit sensitive / regulated data.
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
11.6 11.6.1
11.6.1
11.6.1
null
null
null
null
11.6.1
11.6.1
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-1 R-AM-2 R-AM-3 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1
R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
null
MT-8 MT-9 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
MT-8
MT-9
null
null
MT-12
MT-13
MT-14
MT-15
null
null
Web Security
Publicly Accessible Content Reviews
WEB-14
Mechanisms exist to routinely review the content on publicly accessible systems for sensitive/regulated data and remove such information, if discovered.
null
null
Does the organization routinely review the content on publicly accessible systems for sensitive/regulated data and remove such information, if discovered?
7
Identify
null
X
null
There is no evidence of a capability to routinely review the content on publicly accessible systems for sensitive/regulated data and remove such information, if discovered.
SP-CMM1 is N/A, since a structured process is required to routinely review the content on publicly accessible systems for sensitive/regulated data and remove such information, if discovered.
SP-CMM2 is N/A, since a well-defined process is required to routinely review the content on publicly accessible systems for sensitive/regulated data and remove such information, if discovered.
Web Security (WEB) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • A Validated Architecture Design Review (VADR) evaluates Internet-facing design criteria for secure practices and conformance with requirements for applicable statutory, regulatory and contractual controls to determine if the system/application/service is designed, built and operated in a secure and resilient manner. • A change notification capability exists to scan web pages for changes, which are reviewed by appropriate personnel to determine if changes are authorized or unuathorized. • Ongoing content reviews are performed to ensure web pages do not contain non-public information. • Security engineering, or a similar function, ensures that Internet-facing devices conform to industry-recognized standards for configuration hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides) for test, development, staging and production environments. This includes creating special hardening requirements for High-Value Assets (HVAs). • An Identity & Access Management (IAM) function, or similar function, enables the implementation of identification and access management controls for Internet-facing technologies. • Technologies are configured to implement Strong Customer Authentication (SCA) for consumers to prove their identity. • Administrative processes exist and technologies are configured to provide Internet-facing individuals (e.g., customers, users, clients, etc.) with clear and precise information about cookies, in accordance with regulatory requirements for cookie management. • An IT Asset Management (ITAM) function, or similar function, categorizes network devices according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data. • Boundary protections: o Utilize Web Application Firewalls (WAFs) to provide defense-in-depth protection for application-specific threats. o Restrict inbound traffic to authorized devices on certain services, protocols and ports.
Web Security (WEB) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to routinely review the content on publicly accessible systems for sensitive/regulated data and remove such information, if discovered.
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
3.1.22.b
null
A.03.01.22.b[01] A.03.01.22.b[02]
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
R-AC-4 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-4 R-GV-6 R-GV-8 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1
null
null
null
R-AC-4
null
null
null
null
null
null
null
null
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
null
null
R-GV-4
null
R-GV-6
null
R-GV-8
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
null
NT-7 MT-1 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
null
null
null
null
null
null
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
null
- New control