SCF Domain
stringclasses
34 values
SCF Control
stringlengths
7
85
SCF #
stringlengths
6
9
Secure Controls Framework (SCF) Control Description
stringlengths
49
657
Methods To Comply With SCF Controls
stringlengths
6
863
Evidence Request List (ERL) #
stringclasses
181 values
SCF Control Question
stringlengths
51
659
Relative Control Weighting
int64
1
10
Function Grouping
stringclasses
5 values
SCRM Tier 1 Strategic
stringclasses
2 values
SCRM Tier 2 Operational
stringclasses
2 values
SCRM Tier 3 Tactical
stringclasses
2 values
SP-CMM 0 Not Performed
stringlengths
69
677
SP-CMM 1 Performed Informally
stringlengths
43
2.02k
SP-CMM 2 Planned & Tracked
stringlengths
43
3.33k
SP-CMM 3 Well Defined
stringlengths
43
5.16k
SP-CMM 4 Quantitatively Controlled
stringlengths
43
1.35k
SP-CMM 5 Continuously Improving
stringlengths
43
725
AICPA TSC 2017 (Controls)
stringclasses
116 values
AICPA TSC 2017 (Points of Focus)
stringclasses
171 values
BSI Standard 200-1
stringclasses
18 values
CIS CSC v8.0
stringclasses
158 values
CIS CSC v8.0 IG1
stringclasses
57 values
CIS CSC v8.0 IG2
stringclasses
136 values
CIS CSC v8.0 IG3
stringclasses
154 values
COBIT 2019
stringclasses
101 values
COSO v2017
stringclasses
45 values
CSA CCM v4
stringclasses
229 values
CSA IoT SCF v2
stringclasses
168 values
ENISA v2.0
stringclasses
33 values
GAPP
stringclasses
36 values
IEC 62443-4-2
stringclasses
104 values
ISO/SAE 21434 v2021
stringclasses
69 values
ISO 22301 v2019
stringclasses
25 values
ISO 27001 v2013
stringclasses
30 values
ISO 27001 v2022
stringclasses
35 values
ISO 27002 v2013
stringclasses
142 values
ISO 27002 v2022
stringclasses
166 values
ISO 27017 v2015
stringclasses
158 values
ISO 27018 v2014
stringclasses
16 values
ISO 27701 v2019
stringclasses
161 values
ISO 29100 v2011
stringclasses
15 values
ISO 31000 v2009
stringclasses
7 values
ISO 31010 v2009
stringclasses
16 values
MITRE ATT&CK 10
stringclasses
100 values
MPA Content Security Program v5.1
stringclasses
98 values
NIAC Insurance Data Security Model Law (MDL-668)
stringclasses
41 values
NIST AI RMF AI 100-1 v1.0
stringclasses
114 values
NIST Privacy Framework v1.0
stringclasses
114 values
NIST SSDF
stringclasses
29 values
NIST 800-37 rev 2
stringclasses
32 values
NIST 800-39
stringclasses
9 values
NIST 800-53 rev4
stringlengths
4
47
NIST 800-53 rev4 (low)
stringclasses
121 values
NIST 800-53 rev4 (moderate)
stringlengths
4
22
NIST 800-53 rev4 (high)
stringlengths
4
23
NIST 800-53 rev5
stringlengths
4
99
NIST 800-53B rev5 (privacy)
stringclasses
85 values
NIST 800-53B rev5 (low)
stringclasses
151 values
NIST 800-53B rev5 (moderate)
stringlengths
4
40
NIST 800-53B rev5 (high)
stringlengths
4
40
NIST 800-53 rev5 (NOC)
stringlengths
4
41
NIST 800-63B (partial mapping)
stringclasses
5 values
NIST 800-82 rev3 LOW OT Overlay
stringclasses
162 values
NIST 800-82 rev3 MODERATE OT Overlay
stringlengths
4
40
NIST 800-82 rev3 HIGH OT Overlay
stringlengths
4
40
NIST 800-160
stringclasses
23 values
NIST 800-161 rev 1
stringlengths
4
34
NIST 800-161 rev 1 C-SCRM Baseline
stringclasses
95 values
NIST 800-161 rev 1 Flow Down
stringclasses
71 values
NIST 800-161 rev 1 Level 1
stringclasses
69 values
NIST 800-161 rev 1 Level 2
stringclasses
218 values
NIST 800-161 rev 1 Level 3
stringclasses
234 values
NIST 800-171 rev 2
stringclasses
172 values
NIST 800-171 rev 3 FPD
stringlengths
5
141
NIST 800-171A
stringclasses
114 values
NIST 800-171A rev 3 IPD
stringclasses
167 values
NIST 800-172
stringclasses
46 values
NIST 800-218 v1.1
stringclasses
29 values
NIST CSF v1.1
stringclasses
97 values
NIST CSF v2.0 IPD
stringclasses
127 values
OWASP Top 10 v2021
stringclasses
20 values
PCIDSS v3.2
stringclasses
135 values
PCIDSS v4.0
stringlengths
3
156
PCIDSS v4.0 SAQ A
stringclasses
30 values
PCIDSS v4.0 SAQ A-EP
stringclasses
141 values
PCIDSS v4.0 SAQ B
stringclasses
26 values
PCIDSS v4.0 SAQ B-IP
stringclasses
55 values
PCIDSS v4.0 SAQ C
stringclasses
132 values
PCIDSS v4.0 SAQ C-VT
stringclasses
53 values
PCIDSS v4.0 SAQ D Merchant
stringclasses
213 values
PCIDSS v4.0 SAQ D Service Provider
stringclasses
231 values
PCIDSS v4.0 SAQ P2PE
stringclasses
24 values
Shared Assessments SIG 2023
stringlengths
3
43
SWIFT CSF v2023
stringclasses
55 values
TISAX ISA v5.1.0
stringclasses
88 values
UL 2900-1
stringclasses
36 values
UN R155
stringclasses
19 values
UN ECE WP.29
stringclasses
19 values
US C2M2 v2.1
stringclasses
152 values
US CERT RMM v1.2
stringclasses
212 values
US CISA CPG v2022
stringclasses
44 values
US CJIS Security Policy 5.9
stringclasses
99 values
US CMMC 2.0 Level 1
stringclasses
17 values
US CMMC 2.0 Level 2
stringclasses
110 values
US CMMC 2.0 Level 3
stringclasses
139 values
US CMMC 2.1 (draft) Level 1
stringclasses
18 values
US CMMC 2.1 (draft) Level 2
stringclasses
110 values
US CMMC 2.1 (draft) Level 3
stringclasses
141 values
US CMS MARS-E v2.0
stringlengths
4
28
US COPPA
float64
6.5k
6.5k
US DFARS Cybersecurity 252.204-70xx
stringclasses
19 values
US FACTA
stringclasses
2 values
US FAR 52.204-21
stringclasses
22 values
US FAR 52.204-27
stringclasses
2 values
US FAR Section 889
stringclasses
1 value
US FDA 21 CFR Part 11
stringclasses
27 values
US FedRAMP R4
stringlengths
4
24
US FedRAMP R4 (low)
stringclasses
130 values
US FedRAMP R4 (moderate)
stringlengths
4
23
US FedRAMP R4 (high)
stringlengths
4
24
US FedRAMP R4 (LI-SaaS)
stringclasses
131 values
US FedRAMP R5
stringlengths
4
24
US FedRAMP R5 (low)
stringclasses
151 values
US FedRAMP R5 (moderate)
stringlengths
4
23
US FedRAMP R5 (high)
stringlengths
4
24
US FedRAMP R5 (LI-SaaS)
stringclasses
151 values
US FERPA
stringclasses
3 values
US FFIEC
stringclasses
68 values
US FINRA
stringclasses
3 values
US FTC Act
stringclasses
1 value
US GLBA CFR 314
stringclasses
41 values
US HIPAA
stringclasses
54 values
HIPAA - HICP Small Practice
stringclasses
31 values
HIPAA - HICP Medium Practice
stringclasses
59 values
HIPAA - HICP Large Practice
stringclasses
112 values
US IRS 1075
stringlengths
3
165
US ITAR Part 120 (limited)
stringclasses
9 values
US NERC CIP
stringclasses
35 values
US NISPOM
stringclasses
72 values
US NNPI (unclass)
stringclasses
61 values
US NSTC NSPM-33
stringclasses
15 values
US Privacy Shield
stringclasses
7 values
US SEC Cybersecurity Rule
stringclasses
12 values
US SOX
stringclasses
1 value
US SSA EIESR v8.0
stringclasses
22 values
US StateRAMP Low Category 1
stringclasses
107 values
US StateRAMP Low+ Category 2
stringclasses
167 values
US StateRAMP Moderate Category 3
stringlengths
4
24
US TSA / DHS 1580/82-2022-01
stringclasses
43 values
US - AK PIPA
stringclasses
8 values
US - CA SB327
stringclasses
4 values
US-CA CPRA (Nov 2022)
stringclasses
36 values
US - CA SB1386
stringclasses
1 value
US - CO Colorado Privacy Act
stringclasses
36 values
US - IL BIPA
stringclasses
9 values
US - IL IPA
stringclasses
4 values
US - IL PIPA
stringclasses
6 values
US-MA 201 CMR 17.00
stringclasses
27 values
US - NV SB220
stringclasses
3 values
US - NY DFS 23 NYCRR500
float64
500
500
US - NY SHIELD Act S5575B
stringclasses
15 values
US - OR 646A
stringclasses
21 values
US - SC Insurance Data Security Act
stringclasses
41 values
US - TX BC521
stringclasses
3 values
US-TX Cybersecurity Act
stringclasses
13 values
US-TX DIR Control Standards 2.0
stringclasses
155 values
US-TX TX-RAMP Level 1
stringclasses
120 values
US-TX TX-RAMP Level 2
stringlengths
4
23
US-TX SB820
stringclasses
5 values
US-VA CDPA 2023
stringclasses
24 values
US-VT Act 171 of 2018
stringclasses
32 values
EMEA EU EBA GL/2019/04
stringclasses
93 values
EMEA EU DORA
stringclasses
60 values
EMEA EU ePrivacy (draft)
stringclasses
15 values
EMEA EU GDPR
stringclasses
57 values
EMEA EU NIS2
stringclasses
21 values
EMEA EU PSD2
stringclasses
10 values
EMEA EU EU-US Data Privacy Framework
stringclasses
23 values
EMEA Austria
stringclasses
10 values
EMEA Belgium
stringclasses
9 values
EMEA Czech Republic
stringclasses
14 values
EMEA Denmark
stringclasses
11 values
EMEA Finland
stringclasses
7 values
EMEA France
stringclasses
9 values
EMEA Germany
stringclasses
11 values
EMEA Germany Banking Supervisory Requirements for IT (BAIT)
stringclasses
57 values
EMEA Germany C5-2020
stringclasses
152 values
EMEA Greece
stringclasses
9 values
EMEA Hungary
stringclasses
12 values
EMEA Ireland
stringclasses
3 values
EMEA Israel CDMO v1.0
stringlengths
3
89
EMEA Israel
stringclasses
6 values
EMEA Italy
stringclasses
15 values
EMEA Kenya DPA 2019
stringclasses
38 values
EMEA Luxembourg
stringclasses
4 values
EMEA Netherlands
stringclasses
12 values
EMEA Nigeria DPR 2019
stringclasses
24 values
EMEA Norway
stringclasses
12 values
EMEA Poland
stringclasses
11 values
EMEA Portugal
stringclasses
11 values
EMEA Qatar PDPPL
stringclasses
37 values
EMEA Russia
stringclasses
13 values
EMEA Saudi Arabia Critical Security Controls
stringclasses
105 values
EMEA Saudi Arabia SACS-002
stringclasses
96 values
EMEA Saudi Arabia SAMA CSFv1.0
stringclasses
36 values
EMEA Saudi Arabia ECC-12018
stringclasses
148 values
EMEA Saudi Arabia OTCC-1 2022
stringclasses
133 values
EMEA Serbia 87/2018
stringclasses
46 values
EMEA Slovak Republic
stringclasses
2 values
EMEA South Africa
stringclasses
45 values
EMEA Spain
stringclasses
10 values
EMEA Spain CCN-STIC 825
stringclasses
71 values
EMEA Sweden
stringclasses
11 values
EMEA Switzerland
stringclasses
8 values
EMEA Turkey
stringclasses
8 values
EMEA UAE
stringclasses
9 values
EMEA UK CAF v3.1
stringclasses
75 values
EMEA UK CAP 1850
stringclasses
16 values
EMEA UK Cyber Essentials
float64
1
5
EMEA UK DPA
stringclasses
7 values
EMEA UK GDPR
stringclasses
38 values
APAC Australia Essential 8 ML 1
stringclasses
21 values
APAC Australia Essential 8 ML 2
stringclasses
30 values
APAC Australia Essential 8 ML 3
stringclasses
40 values
APAC Australia Privacy Act
stringclasses
11 values
APAC Australian Privacy Principles
stringclasses
18 values
APAC Australia ISM 2022
stringlengths
4
214
APAC Australia IoT Code of Practice
stringclasses
11 values
APAC Australia Prudential Standard CPS230
stringclasses
32 values
APAC Australia Prudential Standard CPS234
stringclasses
34 values
APAC China Data Security Law (DSL)
stringclasses
6 values
APAC China DNSIP
stringclasses
3 values
APAC China Privacy Law
stringclasses
57 values
APAC Hong Kong
stringclasses
8 values
APAC India ITR
stringclasses
4 values
APAC Indonesia
stringclasses
7 values
APAC Japan APPI
stringclasses
31 values
APAC Japan ISMAP
stringclasses
188 values
APAC Malaysia
stringclasses
8 values
APAC New Zealand Health ISF
stringclasses
22 values
APAC New Zealand NZISM 3.6
stringlengths
10
1.15k
APAC New Zealand Privacy Act of 2020
stringclasses
12 values
APAC Philippines
stringclasses
12 values
APAC Singapore
stringclasses
15 values
APAC Singapore Cyber Hygiene Practice
stringclasses
12 values
APAC Singapore MAS TRM 2021
stringclasses
166 values
APAC South Korea
stringclasses
22 values
APAC Taiwan
stringclasses
7 values
Americas Argentina
stringclasses
14 values
Americas Argentina Reg 132-2018
stringclasses
24 values
Americas Bahamas
stringclasses
6 values
Americas Bermuda BMACCC
stringclasses
36 values
Americas Brazil LGPD
stringclasses
27 values
Americas Canada CSAG
stringclasses
75 values
Americas Canada OSFI B-13
stringclasses
60 values
Americas Canada PIPEDA
stringclasses
14 values
Americas Chile
stringclasses
9 values
Americas Colombia
stringclasses
10 values
Americas Costa Rica
stringclasses
8 values
Americas Mexico
stringclasses
14 values
Americas Peru
stringclasses
14 values
Americas Uruguay
stringclasses
17 values
Minimum Security Requirements MCR + DSR
float64
Identify Minimum Compliance Requirements (MCR)
float64
Identify Discretionary Security Requirements (DSR)
float64
SCF-B Business Mergers & Acquisitions
stringclasses
1 value
SCF-I Cyber Insurance Duty of Care
stringclasses
23 values
SCF-E Embedded Technology
stringclasses
1 value
SCF-R Ransomware Protection
stringclasses
1 value
Risk Threat Summary
stringlengths
13
230
Risk R-AC-1
stringclasses
1 value
Risk R-AC-2
stringclasses
1 value
Risk R-AC-3
stringclasses
1 value
Risk R-AC-4
stringclasses
1 value
Risk R-AM-1
stringclasses
1 value
Risk R-AM-2
stringclasses
2 values
Risk R-AM-3
stringclasses
1 value
Risk R-BC-1
stringclasses
2 values
Risk R-BC-2
stringclasses
2 values
Risk R-BC-3
stringclasses
2 values
Risk R-BC-4
stringclasses
2 values
Risk R-BC-5
stringclasses
2 values
Risk R-EX-1
stringclasses
2 values
Risk R-EX-2
stringclasses
2 values
Risk R-EX-3
stringclasses
2 values
Risk R-EX-4
stringclasses
2 values
Risk R-EX-5
stringclasses
2 values
Risk R-EX-6
stringclasses
2 values
Risk R-EX-7
stringclasses
2 values
Risk R-GV-1
stringclasses
2 values
Risk R-GV-2
stringclasses
2 values
Risk R-GV-3
stringclasses
2 values
Risk R-GV-4
stringclasses
2 values
Risk R-GV-5
stringclasses
2 values
Risk R-GV-6
stringclasses
2 values
Risk R-GV-7
stringclasses
2 values
Risk R-GV-8
stringclasses
2 values
Risk R-IR-1
stringclasses
2 values
Risk R-IR-2
stringclasses
2 values
Risk R-IR-3
stringclasses
2 values
Risk R-IR-4
stringclasses
1 value
Risk R-SA-1
stringclasses
2 values
Risk R-SA-2
stringclasses
2 values
Control Threat Summary
stringclasses
69 values
Threat NT-1
stringclasses
1 value
Threat NT-2
stringclasses
1 value
Threat NT-3
stringclasses
1 value
Threat NT-4
stringclasses
1 value
Threat NT-5
stringclasses
1 value
Threat NT-6
stringclasses
1 value
Threat NT-7
stringclasses
1 value
Threat NT-8
stringclasses
1 value
Threat NT-9
stringclasses
1 value
Threat NT-10
stringclasses
1 value
Threat NT-11
stringclasses
1 value
Threat NT-12
stringclasses
1 value
Threat NT-13
stringclasses
1 value
Threat NT-14
stringclasses
1 value
Threat MT-1
stringclasses
1 value
Threat MT-2
stringclasses
1 value
Threat MT-3
stringclasses
1 value
Threat MT-4
stringclasses
1 value
Threat MT-5
stringclasses
1 value
Threat MT-6
stringclasses
1 value
Threat MT-7
stringclasses
1 value
Threat MT-8
stringclasses
1 value
Threat MT-9
stringclasses
1 value
Threat MT-10
stringclasses
1 value
Threat MT-11
stringclasses
1 value
Threat MT-12
stringclasses
1 value
Threat MT-13
stringclasses
1 value
Threat MT-14
stringclasses
1 value
Threat MT-15
stringclasses
1 value
Threat MT-16
stringclasses
1 value
Errata 2023.4
stringclasses
30 values
Business Continuity & Disaster Recovery
Isolated Recovery Environment
BCD-14
Mechanisms exist to utilize an isolated, non-production environment to perform data backup and recovery operations through offline, cloud or off-site capabilities.
null
null
Does the organization utilize an isolated, non-production environment to perform data backup and recovery operations through offline, cloud or off-site capabilities?
5
Recover
X
X
X
There is no evidence of a capability to utilize an isolated, non-production environment to perform data backup and recovery operations through offline, cloud or off-site capabilities.
SP-CMM1 is N/A, since a structured process is required to utilize an isolated, non-production environment to perform data backup and recovery operations through offline, cloud or off-site capabilities.
Business Continuity & Disaster Recovery (BCD) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Business Continuity / Disaster Recovery (BC/DR) management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for BC/DR management. • BC/DR roles are formally assigned as an additional duty to existing IT/cybersecurity personnel. • Recovery Time Objectives (RTOs) identify business-critical systems and services, which are given priority of service in alternate processing and storage sites. • IT personnel develop Disaster Recovery Plans (DRP) to recover business-critical systems and services. • Data/process owners conduct a Business Impact Analysis (BIA) at least annually, or after any major technology or process change, to identify assets critical to the business in need of protection, as well as single points of failure. • IT/cybersecurity personnel work with business stakeholders to develop Business Continuity Plans (BCPs) to ensure business functions are sustainable both during and after an incident within Recovery Time Objectives (RTOs). • IT personnel use a backup methodology (e.g., grandfather, father & s on rotation) to store backups in a secondary location, separate from the primary storage site. • IT personnel configure business-critical systems to transfer backup data to the alternate storage site at a rate that is capable of meeting Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs). • IT personnel maintain technologies that are compatible with existing network and infrastructure configuration.
Business Continuity & Disaster Recovery (BCD) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • A formal Business Continuity & Disaster Recovery (BC/DR) program exists with defined roles and responsibilities to restore functionality in the event of a catastrophe, emergency, or significant disruptive incident that is handled in accordance with the Continuity of Operations Plan (COOP). • BC/DR personnel work with business stakeholders to identify business-critical systems, services, internal teams and third-party service providers. • Application/system/process owners conduct a Business Impact Analysis (BIA) at least annually, or after any major technology or process change, to identify assets critical to the business in need of protection, as well as single points of failure. • Recovery Time Objectives (RTOs) are defined. • Recovery Point Objectives (RPOs) are defined. • Controls are assigned to sensitive/regulated assets to comply with specific BC/DR requirements to facilitate recovery operations in accordance with RTOs and RPOs. • IT personnel work with business stakeholders to develop Disaster Recovery Plans (DRP) to recover business-critical systems and services within RPOs. • Business stakeholders work with IT personnel to develop Business Continuity Plans (BCPs) to ensure business functions are sustainable both during and after an incident within RTOs. • The data backup function is formally assigned with defined roles and responsibilities. • Recoveries are performed into an isolated, non-production environment. • Logical and physical access controls restricts access to backup and restoration hardware. • IT personnel maintain technologies that are compatible with existing network and infrastructure configuration.
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to utilize an isolated, non-production environment to perform data backup and recovery operations through offline, cloud or off-site capabilities.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to utilize an isolated, non-production environment to perform data backup and recovery operations through offline, cloud or off-site capabilities.
null
null
null
11.4
11.4
11.4
11.4
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
RC.RP-03
null
null
null
null
null
null
null
null
null
null
null
null
K.1
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
R-AM-3 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-IR-1 R-IR-2 R-IR-3 R-IR-4
null
null
null
null
null
null
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
null
null
null
null
null
null
null
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
R-IR-1
R-IR-2
R-IR-3
R-IR-4
null
null
MT-8 MT-9 MT-10 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Business Continuity & Disaster Recovery
Reserve Hardware
BCD-15
Mechanisms exist to purchase and maintain a sufficient reserve of spare hardware to ensure essential missions and business functions can be maintained in the event of a supply chain disruption.
null
null
Does the organization purchase and maintain a sufficient reserve of spare hardware to ensure essential missions and business functions can be maintained in the event of a supply chain disruption?
7
Recover
X
X
null
There is no evidence of a capability to purchase and maintain a sufficient reserve of spare hardware to ensure essential missions and business functions can be maintained in the event of a supply chain disruption.
SP-CMM1 is N/A, since a structured process is required to purchase and maintain a sufficient reserve of spare hardware to ensure essential missions and business functions can be maintained in the event of a supply chain disruption.
SP-CMM2 is N/A, since a well-defined process is required to purchase and maintain a sufficient reserve of spare hardware to ensure essential missions and business functions can be maintained in the event of a supply chain disruption.
Business Continuity & Disaster Recovery (BCD) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • A formal Business Continuity & Disaster Recovery (BC/DR) program exists with defined roles and responsibilities to restore functionality in the event of a catastrophe, emergency, or significant disruptive incident that is handled in accordance with the Continuity of Operations Plan (COOP). • BC/DR personnel work with business stakeholders to identify business-critical systems, services, internal teams and third-party service providers. • Application/system/process owners conduct a Business Impact Analysis (BIA) at least annually, or after any major technology or process change, to identify assets critical to the business in need of protection, as well as single points of failure. • Recovery Time Objectives (RTOs) are defined. • Recovery Point Objectives (RPOs) are defined. • Controls are assigned to sensitive/regulated assets to comply with specific BC/DR requirements to facilitate recovery operations in accordance with RTOs and RPOs. • IT personnel work with business stakeholders to develop Disaster Recovery Plans (DRP) to recover business-critical systems and services within RPOs. • Business stakeholders work with IT personnel to develop Business Continuity Plans (BCPs) to ensure business functions are sustainable both during and after an incident within RTOs. • The data backup function is formally assigned with defined roles and responsibilities. • Based on the criticality of the asset, the organization purchases and maintains a sufficient reserve of spare hardware to ensure essential equipment can be maintained in the event of supply chain disruptions. • Within the BCPs, alternate communications channels have been defined and alternative decision-makers are designated if primary decision-makers are unavailable.
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to purchase and maintain a sufficient reserve of spare hardware to ensure essential missions and business functions can be maintained in the event of a supply chain disruption.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to purchase and maintain a sufficient reserve of spare hardware to ensure essential missions and business functions can be maintained in the event of a supply chain disruption.
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
B5.b
null
null
null
null
null
null
null
null
null
1789
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
R-AC-3 R-AC-4 R-AM-1 R-AM-2 R-AM-3 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-IR-1 R-IR-2 R-IR-3 R-IR-4
null
null
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
null
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
R-IR-1
R-IR-2
R-IR-3
R-IR-4
null
null
NT-2 NT-3 NT-4 NT-5 NT-6 NT-7 NT-8 NT-9 NT-10 NT-11 NT-12 NT-13 NT-14 MT-1 MT-2 MT-3 MT-4 MT-5 MT-6 MT-7 MT-8 MT-9 MT-10 MT-11 MT-12 MT-13 MT-14 MT-15
null
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Business Continuity & Disaster Recovery
AI & Autonomous Technologies Incidents
BCD-16
Mechanisms exist to handle failures or incidents with Artificial Intelligence (AI) and Autonomous Technologies (AAT) deemed to be high-risk.
null
null
Does the organization handle failures or incidents with Artificial Intelligence (AI) and Autonomous Technologies (AAT) deemed to be high-risk?
10
Respond
X
X
X
There is no evidence of a capability to handle failures or incidents with Artificial Intelligence (AI) and Autonomous Technologies (AAT) deemed to be high-risk.
SP-CMM1 is N/A, since a structured process is required to handle failures or incidents with Artificial Intelligence (AI) and Autonomous Technologies (AAT) deemed to be high-risk.
SP-CMM2 is N/A, since a well-defined process is required to handle failures or incidents with Artificial Intelligence (AI) and Autonomous Technologies (AAT) deemed to be high-risk.
Business Continuity & Disaster Recovery (BCD) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • A formal Business Continuity & Disaster Recovery (BC/DR) program exists with defined roles and responsibilities to restore functionality in the event of a catastrophe, emergency, or significant disruptive incident that is handled in accordance with the Continuity of Operations Plan (COOP). • BC/DR personnel work with business stakeholders to identify business-critical systems, services, internal teams and third-party service providers. • Application/system/process owners conduct a Business Impact Analysis (BIA) at least annually, or after any major technology or process change, to identify assets critical to the business in need of protection, as well as single points of failure. • Recovery Time Objectives (RTOs) are defined. • Recovery Point Objectives (RPOs) are defined. • Controls are assigned to sensitive/regulated assets to comply with specific BC/DR requirements to facilitate recovery operations in accordance with RTOs and RPOs. • IT personnel work with business stakeholders to develop Disaster Recovery Plans (DRP) to recover business-critical systems and services within RPOs. • Business stakeholders work with IT personnel to develop Business Continuity Plans (BCPs) to ensure business functions are sustainable both during and after an incident within RTOs. • The data backup function is formally assigned with defined roles and responsibilities.
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to handle failures or incidents with Artificial Intelligence (AI) and Autonomous Technologies (AAT) deemed to be high-risk.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to handle failures or incidents with Artificial Intelligence (AI) and Autonomous Technologies (AAT) deemed to be high-risk.
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
GOVERN 6.2
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-1 R-AM-2 R-AM-3 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-GV-8 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1 R-SA-2
R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
R-SA-2
NT-2 NT-3 NT-4 NT-5 NT-6 NT-7 NT-8 NT-9 NT-10 NT-11 NT-12 NT-13 NT-14 MT-1 MT-2 MT-3 MT-4 MT-5 MT-6 MT-7 MT-8 MT-9 MT-10 MT-11 MT-12 MT-13 MT-14 MT-15
null
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Capacity & Performance Planning
Capacity & Performance Management
CAP-01
Mechanisms exist to facilitate the implementation of capacity management controls to ensure optimal system performance to meet expected and anticipated future capacity requirements.
- Splunk - Resource monitoring
null
Does the organization facilitate the implementation of capacity management controls to ensure optimal system performance to meet expected and anticipated future capacity requirements?
8
Protect
null
X
null
There is no evidence of a capability to facilitate the implementation of capacity management controls to ensure optimal system performance to meet expected and anticipated future capacity requirements.
Capability & Performance Planning (CAP) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist: • IT personnel work with business stakeholders to identify business-critical systems and services. • IT personnel work with business stakeholders to identify growth requirements and add capacity accordingly.
Capability & Performance Planning (CAP) are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Capacity management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for capability management. • IT personnel work with: o Business stakeholders to identify business-critical systems and services. o Business stakeholders to identify single points of failure from a system/applications/services perspective. • IT infrastructure personnel: o Create and maintain infrastructure performance metrics to understand current resource needs. o Deploy preventative technologies to minimize the effect of Denial of Service (DoS) attacks against business-critical services.
Capability & Performance Planning (CAP) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • The Chief Information Security Officer (CISO), or similar function, analyzes the organization’s business strategy to provide guidance for capacity and performance planning practices. • The CISO, or similar function, develops a security-focused Concept of Operations (CONOPS) that documents management, operational and technical measures to apply defense-in-depth techniques across the organization. This CONOPS for capacity and performance planning may be incorporated as part of a broader operational plan for the cybersecurity & data privacy program. • A Governance, Risk & Compliance (GRC) team, or similar function, provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data. • A steering committee is formally established to provide executive oversight of the cybersecurity & data privacy program and establishes a clear and authoritative accountability structure for capacity and performance planning operations. • IT personnel work with business stakeholders to identify business-critical systems and services, as part of the organization’s IT Asset Management (ITAM) program. • Automated tools continuously monitor the operating state and health status of systems/applications/services. • Business stakeholders conduct a Business Impact Analysis (BIA) to determine acceptable downtime constraints and any dependencies between applications or systems, to objectively determine the criticality of systems, applications or services, as well as the order is which systems need to be restored. • Demand is managed for computing resources based on BIA-defined prioritization. • Based on BIA results, IT infrastructure personnel deploy preventative technologies to minimize the effect of Denial of Service (DoS) attacks. • IT architects identify appropriate solutions to make sure service levels can be met. • IT infrastructure personnel: o Create an annual infrastructure growth plan with input from both technology and business stakeholders. o Create and maintain infrastructure performance metrics to understand current resource needs. o Produce a capacity plan that covers current use, forecasted needs and support costs for new systems, applications and services. • Automated tools continuously monitor the operating state and health status of systems, applications and services. • IT personnel work with business stakeholders to identify single points of failure from a system/applications/services perspective.
Capability & Performance Planning (CAP) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to facilitate the implementation of capacity management controls to ensure optimal system performance to meet expected and anticipated future capacity requirements.
A1.1
A1.1-POF1 A1.1-POF3
null
null
null
null
null
null
null
IVS-02
SNT-03
null
null
CR 7.2 (11.4.1)
null
null
null
null
12.1.3
8.6
12.1.3
null
6.9.1.3
null
null
null
T1564.009
null
null
null
PR.DS-P4
null
null
null
SC-5 SC-5(3)
SC-5
SC-5
SC-5
SC-5 SC-5(3)
null
SC-5
SC-5
SC-5
SC-5(3)
null
SC-5
SC-5
SC-5
null
null
null
null
null
null
null
null
null
null
null
null
null
PR.DS-4
PR.IR-03 PR.IR-04
null
null
null
null
null
null
null
null
null
null
null
null
K.1
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
SC-5
null
null
null
null
null
null
null
SC-5
SC-5
SC-5
SC-5
SC-5
SC-5
SC-5
SC-5
SC-5
SC-5
null
D5.IR.Pl.B.5 D5.IR.Pl.B.6 D5.IR.Pl.E.3 D3.PC.Im.E.4
null
null
null
null
null
null
null
null
null
null
8-701
null
null
null
null
null
null
SC-5
SC-5
SC-5
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
SC-5
SC-5
SC-5
null
null
null
3.5(56)
null
null
Art 32.1 Art 32.2
null
null
null
Sec 14 Sec 15
Art 16
null
null
null
null
null
8.8
OPS-01 OPS-02 OPS-03
null
null
null
25.2
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Sec 19.1 Sec 19.2
null
7.1.4 [OP.PL.4]
null
null
null
null
null
null
null
null
null
null
null
null
null
null
1579 1580 1581
null
null
null
null
null
null
null
null
null
null
12.1.3 12.1.3.9.PB
null
null
null
null
null
null
null
8.1.1
null
null
null
null
null
6.1
null
null
null
null
null
null
null
null
null
null
null
null
null
x
null
x
x
R-AM-3 R-BC-1 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-GV-1 R-GV-2 R-GV-4 R-GV-5 R-SA-1
null
null
null
null
null
null
R-AM-3
R-BC-1
null
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
null
null
R-GV-1
R-GV-2
null
R-GV-4
R-GV-5
null
null
null
null
null
null
null
R-SA-1
null
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-10 MT-11 MT-12 MT-13 MT-14 MT-15 MT-16
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15
MT-16
null
Capacity & Performance Planning
Resource Priority
CAP-02
Mechanisms exist to control resource utilization of systems that are susceptible to Denial of Service (DoS) attacks to limit and prioritize the use of resources.
- Splunk - Resource monitoring
null
Does the organization control resource utilization of systems that are susceptible to Denial of Service (DoS) attacks to limit and prioritize the use of resources?
8
Protect
null
X
null
There is no evidence of a capability to control resource utilization of systems that are susceptible to Denial of Service (DoS) attacks to limit and prioritize the use of resources.
SP-CMM1 is N/A, since a structured process is required to control resource utilization of systems that are susceptible to Denial of Service (DoS) attacks to limit and prioritize the use of resources.
Capability & Performance Planning (CAP) are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Capacity management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for capability management. • IT personnel work with: o Business stakeholders to identify business-critical systems and services. o Business stakeholders to identify single points of failure from a system/applications/services perspective. • IT infrastructure personnel: o Create and maintain infrastructure performance metrics to understand current resource needs. o Deploy preventative technologies to minimize the effect of Denial of Service (DoS) attacks against business-critical services.
Capability & Performance Planning (CAP) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • IT personnel work with business stakeholders to identify business-critical systems and services, as part of the organization’s IT Asset Management (ITAM) program. • Automated tools continuously monitor the operating state and health status of systems/applications/services. • Business stakeholders conduct a Business Impact Analysis (BIA) to determine acceptable downtime constraints and any dependencies between applications or systems, to objectively determine the criticality of systems, applications or services, as well as the order is which systems need to be restored. • Demand is managed for computing resources based on BIA-defined prioritization. • Based on BIA results, IT infrastructure personnel deploy preventative technologies to minimize the effect of Denial of Service (DoS) attacks. • IT architects identify appropriate solutions to make sure service levels can be met. • IT infrastructure personnel: o Create an annual infrastructure growth plan with input from both technology and business stakeholders. o Create and maintain infrastructure performance metrics to understand current resource needs. o Produce a capacity plan that covers current use, forecasted needs and support costs for new systems, applications and services. • Automated tools continuously monitor the operating state and health status of systems, applications and services.
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to control resource utilization of systems that are susceptible to Denial of Service (DoS) attacks to limit and prioritize the use of resources.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to control resource utilization of systems that are susceptible to Denial of Service (DoS) attacks to limit and prioritize the use of resources.
A1.1
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
T1564.009
null
null
null
null
null
null
null
SC-5 SC-5(1) SC-5(2) SC-6
SC-5
SC-5
SC-5
SC-5 SC-5(1) SC-5(2) SC-6
null
SC-5
SC-5
SC-5
SC-5(1) SC-5(2) SC-6
null
SC-5
SC-5
SC-5
null
SC-5(2)
null
null
null
SC-5(2)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
N.1
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
SC-5 SC-6
null
null
null
null
null
null
null
SC-5 SC-6
SC-5
SC-5 SC-6
SC-5 SC-6
SC-5
SC-5
SC-5
SC-5
SC-5
SC-5
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
SC-5
SC-5
SC-5 SC-6
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
SC-5
SC-5
SC-5 SC-6
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
1579 1580 1581
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
x
R-AM-3 R-BC-1 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-GV-1 R-GV-2 R-GV-4 R-GV-5 R-SA-1
null
null
null
null
null
null
R-AM-3
R-BC-1
null
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
null
null
R-GV-1
R-GV-2
null
R-GV-4
R-GV-5
null
null
null
null
null
null
null
R-SA-1
null
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-10 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Capacity & Performance Planning
Capacity Planning
CAP-03
Mechanisms exist to conduct capacity planning so that necessary capacity for information processing, telecommunications and environmental support will exist during contingency operations.
null
null
Does the organization conduct capacity planning so that necessary capacity for information processing, telecommunications and environmental support will exist during contingency operations?
8
Protect
null
X
X
There is no evidence of a capability to conduct capacity planning so that necessary capacity for information processing, telecommunications and environmental support will exist during contingency operations.
Capability & Performance Planning (CAP) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist: • IT personnel work with business stakeholders to identify business-critical systems and services. • IT personnel work with business stakeholders to identify growth requirements and add capacity accordingly.
Capability & Performance Planning (CAP) are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Capacity management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for capability management. • IT personnel work with: o Business stakeholders to identify business-critical systems and services. o Business stakeholders to identify single points of failure from a system/applications/services perspective. • IT infrastructure personnel: o Create and maintain infrastructure performance metrics to understand current resource needs. o Deploy preventative technologies to minimize the effect of Denial of Service (DoS) attacks against business-critical services.
Capability & Performance Planning (CAP) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • IT personnel work with business stakeholders to identify business-critical systems and services, as part of the organization’s IT Asset Management (ITAM) program. • Automated tools continuously monitor the operating state and health status of systems/applications/services. • Business stakeholders conduct a Business Impact Analysis (BIA) to determine acceptable downtime constraints and any dependencies between applications or systems, to objectively determine the criticality of systems, applications or services, as well as the order is which systems need to be restored. • Demand is managed for computing resources based on BIA-defined prioritization. • Based on BIA results, IT infrastructure personnel deploy preventative technologies to minimize the effect of Denial of Service (DoS) attacks. • IT architects identify appropriate solutions to make sure service levels can be met. • IT infrastructure personnel: o Create an annual infrastructure growth plan with input from both technology and business stakeholders. o Create and maintain infrastructure performance metrics to understand current resource needs. o Produce a capacity plan that covers current use, forecasted needs and support costs for new systems, applications and services. • Automated tools continuously monitor the operating state and health status of systems, applications and services.
Capability & Performance Planning (CAP) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to conduct capacity planning so that necessary capacity for information processing, telecommunications and environmental support will exist during contingency operations.
A1.1
A1.1-POF2
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
12.1.3
8.6
12.1.3
null
null
null
null
null
null
null
null
null
PR.DS-P4
null
null
null
SC-5 SC-5(2) CP-2(2)
SC-5
SC-5
SC-5 CP-2(2)
CP-2(2) SC-5 SC-5(2)
null
SC-5
SC-5
SC-5 CP-2(2)
SC-5(2)
null
SC-5
SC-5
SC-5 CP-2(2)
null
SC-5(2) CP-2(2)
null
null
null
SC-5(2) CP-2(2)
CP-2(2)
null
null
null
null
null
null
PR.DS-4
null
null
null
null
null
null
null
null
null
null
null
null
null
N.1
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
CP-2(2) SC-5
null
null
null
null
null
null
null
CP-2(2) SC-5
SC-5
CP-2(2) SC-5
CP-2(2) SC-5
SC-5
CP-2(2) SC-5
SC-5
SC-5
CP-2(2) SC-5
SC-5
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
CP-2(2)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
SC-5
SC-5
CP-2(2) SC-5
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
8.8
OPS-01 OPS-02 OPS-03
null
null
null
25.2
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
1579 1580 1581
null
null
null
null
null
null
null
null
null
null
12.1.3 12.1.3.9.PB
null
null
null
null
null
null
null
8.1.3
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
x
R-AM-3 R-BC-1 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-GV-1 R-GV-2 R-GV-4 R-GV-5 R-SA-1
null
null
null
null
null
null
R-AM-3
R-BC-1
null
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
null
null
R-GV-1
R-GV-2
null
R-GV-4
R-GV-5
null
null
null
null
null
null
null
R-SA-1
null
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-10 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Capacity & Performance Planning
Performance Monitoring
CAP-04
Automated mechanisms exist to centrally-monitor and alert on the operating state and health status of critical systems, applications and services.
null
null
Does the organization use automated mechanisms to centrally-monitor and alert on the operating state and health status of critical systems, applications and services?
7
Detect
null
X
X
There is no evidence of a capability to centrally-monitor and alert on the operating state and health status of critical systems, applications and services.
SP-CMM1 is N/A, since a structured process is required to centrally-monitor and alert on the operating state and health status of critical systems, applications and services.
Capability & Performance Planning (CAP) are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Capacity management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for capability management. • IT personnel work with: o Business stakeholders to identify business-critical systems and services. o Business stakeholders to identify single points of failure from a system/applications/services perspective. • IT infrastructure personnel: o Create and maintain infrastructure performance metrics to understand current resource needs. o Deploy preventative technologies to minimize the effect of Denial of Service (DoS) attacks against business-critical services.
Capability & Performance Planning (CAP) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • IT personnel work with business stakeholders to identify business-critical systems and services, as part of the organization’s IT Asset Management (ITAM) program. • Automated tools continuously monitor the operating state and health status of systems/applications/services. • Business stakeholders conduct a Business Impact Analysis (BIA) to determine acceptable downtime constraints and any dependencies between applications or systems, to objectively determine the criticality of systems, applications or services, as well as the order is which systems need to be restored. • Demand is managed for computing resources based on BIA-defined prioritization. • IT architects identify appropriate solutions to make sure service levels can be met. • IT infrastructure personnel: o Create an annual infrastructure growth plan with input from both technology and business stakeholders. o Create and maintain infrastructure performance metrics to understand current resource needs. o Produce a capacity plan that covers current use, forecasted needs and support costs for new systems, applications and services. • Automated tools continuously monitor the operating state and health status of systems, applications and services.
Capability & Performance Planning (CAP) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to centrally-monitor and alert on the operating state and health status of critical systems, applications and services.
null
A1.1-POF1
null
null
null
null
null
null
null
null
SNT-03
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
N.1
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
8.8
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
3.1
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
R-AM-3 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-EX-6 R-GV-1 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1
null
null
null
null
null
null
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
null
null
null
null
null
null
R-EX-6
null
R-GV-1
null
null
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
null
NT-2 NT-3 NT-4 NT-5 NT-6 NT-7 NT-11 NT-12 NT-13 MT-1 MT-2 MT-5 MT-6 MT-7 MT-8 MT-9 MT-10 MT-11 MT-12 MT-13 MT-14
null
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
null
null
null
NT-11
NT-12
NT-13
null
MT-1
MT-2
null
null
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
null
null
null
Change Management
Change Management Program
CHG-01
Mechanisms exist to facilitate the implementation of a change management program.
- CimTrak Integrity Suite (https://www.cimcor.com/cimtrak/) - VisibleOps methodology - ITIL infrastructure library - NNT Change Tracker (https://www.newnettechnologies.com) - ServiceNow (https://www.servicenow.com/) - Remedy - Tripwire Enterprise (https://www.tripwire.com/products/tripwire-enterprise/) - Chef (https://www.chef.io/) (https://www.chef.io/) - Puppet (https://puppet.com/)
E-CHG-02
Does the organization facilitate the implementation of a change management program?
10
Protect
null
X
X
There is no evidence of a capability to facilitate the implementation of a change management program.
Change Management (CHG) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist: • IT personnel use an informal process to: o Govern changes to systems, applications and services to ensure their stability, reliability and predictability. o Notify stakeholders about proposed changes. • Logical Access Control (LAC) limits the ability of non-administrators from making unauthorized configuration changes to systems, applications and services. • Requests for Change (RFC) are submitted to IT personnel. • prior to changes being made, RFCs are informally reviewed for cybersecurity & data privacy ramifications. • Whenever possible, IT personnel test changes to business-critical systems/services/applications on a similarly configured IT environment as that of Production, prior to widespread production release of the change.
Change Management (CHG) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Change management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for change management. • Changes are tracked through a centralized technology solution to submit, review, approve and assign Requests for Change (RFC). • A Change Advisory Board (CAB), or similar function, exists to govern changes to systems, applications and services to ensure their stability, reliability and predictability. • A CAB, or similar function, reviews RFCs for cybersecurity & data privacy ramifications. • A CAB, or similar function, notifies stakeholders to ensure awareness of the impact of proposed changes. • Logical Access Control (LAC) limits the ability of non-administrators from making unauthorized configuration changes to systems, applications and services. • Cybersecurity controls are tested after a change is implemented to ensure cybersecurity controls are operating properly.
Change Management (CHG) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • The Chief Information Security Officer (CISO), or similar function, analyzes the organization’s business strategy to determine prioritized and authoritative guidance for Change Management (CM) practices. • The CISO, or similar function, develops a security-focused Concept of Operations (CONOPS) that documents management, operational and technical measures to apply defense-in-depth techniques across the organization, including CM as part of a broader operational plan. • A Governance, Risk & Compliance (GRC) team, or similar function, provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data with regards to CM. • A steering committee is formally established, to provide executive oversight of the cybersecurity & data privacy program, including CM, which establishes a clear and authoritative accountability structure for CM operations. • An IT Asset Management (ITAM) function, or similar function, ensures compliance with requirements for asset management. • ITAM leverages a Configuration Management Database (CMDB), or similar tool, as the authoritative source of IT assets. • Logical Access Control (LAC) is governed to limit the ability of non-administrators from making configuration changes to systems, applications and services. • A formal Change Management (CM) program ensures that no unauthorized changes are made, that all changes are documented, that services are not disrupted and that resources are used efficiently. • The CM function has formally defined roles and associated responsibilities. • Changes are tracked through a centralized technology solution to submit, review, approve and assign Requests for Change (RFC). • A Change Advisory Board (CAB), or similar function: o Exists to govern changes to systems, applications and services to ensure their stability, reliability and predictability. o Reviews RFC for cybersecurity & data privacy ramifications. o Notifies stakeholders to ensure awareness of the impact of proposed changes. • IT personnel use dedicated development/test/staging environments to deploy and evaluate changes, wherever technically possible.
Change Management (CHG) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to facilitate the implementation of a change management program.
CC3.4 CC8.1
CC2.2-POF11 CC6.8-POF3 CC8.1-POF1 CC8.1-POF2 CC8.1-POF3 CC8.1-POF4 CC8.1-POF5 CC8.1-POF6 CC8.1-POF7 CC8.1-POF8 CC8.1-POF9 CC8.1-POF10 CC8.1-POF11 CC8.1-POF12 CC8.1-POF13 CC8.1-POF14 CC8.1-POF15
null
null
null
null
null
null
Principle 9 Principle 15
CCC-01 CEK-06 CEK-06
CCM-02 CCM-08
SO14
null
null
null
null
null
6.3
12.1.2
8.19 8.32
12.1.2
null
6.9.1.2
null
null
null
T1021.005, T1059.006, T1176, T1195.003, T1213, T1213.001, T1213.002, T1495, T1542, T1542.001, T1542.003, T1542.004, T1542.005, T1543, T1543.002, T1547.007, T1547.011, T1547.013, T1553, T1553.006, T1564.008, T1601, T1601.001, T1601.002
TS-2.6 TS-5.0
Sec 4(D)(2)(f)
null
PR.PO-P2
null
null
null
CM-3
null
CM-3
CM-3
CM-3
null
null
CM-3
CM-3
null
null
null
CM-3
CM-3
3.4.10 3.4.13
CM-3
null
CM-3
null
CM-3
CM-3
3.4.3
3.4.2.b 3.4.3.a 3.4.3.b 3.4.3.c 3.4.3.d
null
A.03.04.03.b[01] A.03.04.03.b[02]
3.4.1e 3.4.2e
null
PR.IP-3
null
null
null
1.2.2 6.5 6.5.1 6.5.2 6.5.3
null
1.2.2 6.5.1 6.5.2
null
null
6.5.1 6.5.2
null
1.2.2 6.5.1 6.5.2 6.5.3
1.2.2 6.5.1 6.5.2 6.5.3
null
G.1
null
5.2 5.2.1
null
null
null
ASSET-4.A.MIL1 ASSET-4.G.MIL2 ARCHITECTURE-5.H.MIL3
ADM:SG3.SP2 TM:SG4.SP2 TM:SG4.SP3
null
null
null
CM.L2-3.4.3
TBD - 3.4.1e TBD - 3.4.2e
null
CM.L2-3.4.3
CM.L2-3.4.3 CM.L3-3.4.1e CM.L3-3.4.2e
CM-3
null
null
null
null
null
null
§ 11.10 § 11.10(k) § 11.10(k)(1) § 11.10(k)(2)
CM-3
null
CM-3
CM-3
null
CM-3
null
CM-3
CM-3
null
null
null
null
null
314.4(c)(7)
null
null
null
null
CM-3
null
CIP-010-2 R1
8-103 8-104 8-311 8-610
4.3
null
null
null
null
null
null
CM-3
CM-3
null
null
null
null
null
null
null
null
null
null
null
null
null
null
38-99-20(D)(2)(f)
null
null
null
null
CM-3
null
null
null
3.4.4(37) 3.6.3(75) 3.6.3(76)
Art 9.4(e)
null
Art 32.1 Art 32.2
null
null
null
Sec 14 Sec 15
Art 16
null
null
null
null
null
8.4
DEV-03 DEV-08
null
null
null
10.6 14.6 14.7
null
null
null
null
null
null
null
null
null
null
null
null
null
3.3.7
1-6-2
1-5 1-5-1 1-5-2
null
null
Sec 19.1 Sec 19.2
null
7.3.5 [OP.EXP.5]
null
null
null
null
null
null
null
null
null
null
null
null
null
null
1211
null
null
null
null
null
null
null
null
null
null
12.1.2 12.1.2.11.PB
null
null
6.3.6.C.01
null
null
null
null
7.5.1 7.5.2 7.5.3 7.5.4 7.5.5 7.5.6 7.5.7
null
null
null
null
null
6.1
null
4.17 4.20 6.11
2.5.1
null
null
null
null
null
null
null
null
null
null
x
NAIC
x
x
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-1 R-AM-2 R-AM-3 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1
R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
null
NT-1 NT-2 NT-3 NT-4 NT-5 NT-6 NT-7 NT-8 NT-9 NT-10 NT-11 NT-12 NT-13 NT-14 MT-1 MT-2 MT-7 MT-8 MT-9 MT-10 MT-11 MT-12 MT-13 MT-14 MT-15 MT-16
NT-1
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15
MT-16
null
Change Management
Configuration Change Control
CHG-02
Mechanisms exist to govern the technical configuration change control processes.
- CimTrak Integrity Suite (https://www.cimcor.com/cimtrak/) - Change Control Board (CCB) - Configuration Management Database (CMDB) - Tripwire Enterprise (https://www.tripwire.com/products/tripwire-enterprise/) Enterprise - Chef (https://www.chef.io/) (https://www.chef.io/) - Puppet (https://puppet.com/) - Solarwinds (https://www.solarwinds.com/) - Docker (https://www.docker.com/) - VisibleOps methodology - ITIL infrastructure library
E-CHG-02
Does the organization govern the technical configuration change control processes?
8
Protect
null
X
X
There is no evidence of a capability to govern the technical configuration change control processes.
Change Management (CHG) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist: • IT personnel use an informal process to: o Govern changes to systems, applications and services to ensure their stability, reliability and predictability. o Notify stakeholders about proposed changes. • Logical Access Control (LAC) limits the ability of non-administrators from making unauthorized configuration changes to systems, applications and services. • Requests for Change (RFC) are submitted to IT personnel. • prior to changes being made, RFCs are informally reviewed for cybersecurity & data privacy ramifications. • Whenever possible, IT personnel test changes to business-critical systems/services/applications on a similarly configured IT environment as that of Production, prior to widespread production release of the change.
Change Management (CHG) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Change management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for change management. • Changes are tracked through a centralized technology solution to submit, review, approve and assign Requests for Change (RFC). • A Change Advisory Board (CAB), or similar function, exists to govern changes to systems, applications and services to ensure their stability, reliability and predictability. • A CAB, or similar function, reviews RFCs for cybersecurity & data privacy ramifications. • A CAB, or similar function, notifies stakeholders to ensure awareness of the impact of proposed changes. • Logical Access Control (LAC) limits the ability of non-administrators from making unauthorized configuration changes to systems, applications and services. • Cybersecurity controls are tested after a change is implemented to ensure cybersecurity controls are operating properly. • Asset custodians are assigned responsibilities that cover change management duties, including privileged access to perform change management actions.
Change Management (CHG) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • An IT Asset Management (ITAM) function, or similar function, ensures compliance with requirements for asset management. • ITAM leverages a Configuration Management Database (CMDB), or similar tool, as the authoritative source of IT assets. • Logical Access Control (LAC) is governed to limit the ability of non-administrators from making configuration changes to systems, applications and services. • A formal Change Management (CM) program ensures that no unauthorized changes are made, that all changes are documented, that services are not disrupted and that resources are used efficiently. • The CM function has formally defined roles and associated responsibilities. • Changes are tracked through a centralized technology solution to submit, review, approve and assign Requests for Change (RFC). • A Change Advisory Board (CAB), or similar function: o Exists to govern changes to systems, applications and services to ensure their stability, reliability and predictability. o Reviews RFC for cybersecurity & data privacy ramifications. o Notifies stakeholders to ensure awareness of the impact of proposed changes. • IT personnel use dedicated development/test/staging environments to deploy and evaluate changes, wherever technically possible. • Asset custodians are assigned responsibilities that cover change management duties, including privileged access to perform change management actions.
Change Management (CHG) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to govern the technical configuration change control processes.
CC3.4 CC8.1
CC6.8-POF3 CC8.1-POF1 CC8.1-POF2 CC8.1-POF3 CC8.1-POF4 CC8.1-POF5 CC8.1-POF6 CC8.1-POF7 CC8.1-POF8 CC8.1-POF9 CC8.1-POF10 CC8.1-POF11 CC8.1-POF12 CC8.1-POF13 CC8.1-POF14 CC8.1-POF15
null
null
null
null
null
null
Principle 9
CCC-02 CCC-05 CEK-05
CCM-02 CCM-08 GVN-05
SO14
null
null
null
null
null
null
12.1.2 14.2.2
8.19 8.32
12.1.2 14.2.2
null
6.11.2.2
null
null
null
T1021.005, T1059.006, T1176, T1195.003, T1213, T1213.001, T1213.002, T1495, T1542, T1542.001, T1542.003, T1542.004, T1542.005, T1543, T1543.002, T1547.007, T1547.011, T1547.013, T1553, T1553.006, T1564.008, T1601, T1601.001, T1601.002
TS-2.6
Sec 4(D)(2)(f)
null
PR.PO-P2
null
null
null
CM-3
null
CM-3
CM-3
CM-3 SA-8(31)
null
null
CM-3
CM-3
SA-8(31)
null
null
CM-3
CM-3
3.4.10 3.4.13
CM-3
null
CM-3
null
CM-3
CM-3
3.4.3
3.4.2.b 3.4.3.a 3.4.3.b 3.4.3.c 3.4.3.d
3.4.3[a] 3.4.3[b] 3.4.3[c] 3.4.3[d]
null
3.4.1e 3.4.2e
null
PR.IP-3
null
null
6.4 6.4.1 6.4.2 6.4.3 6.4.4 6.4.5 6.4.5.1 6.4.5.2 6.4.5.3 6.4.5.4 6.4.6
1.2.2 6.5 6.5.1 6.5.6
null
6.5.1
null
null
6.5.1
null
6.5.1 6.5.6
6.5.1 6.5.6
null
G.1.3.7
null
5.2.1
null
null
null
ASSET-4.B.MIL1 ASSET-4.E.MIL2
ADM:SG3.SP2 TM:SG4.SP2 TM:SG4.SP3
2.1
null
null
CM.L2-3.4.3
CM.L2-3.4.3 TBD - 3.4.1e TBD - 3.4.2e
null
CM.L2-3.4.3
CM.L2-3.4.3 CM.L3-3.4.1e CM.L3-3.4.2e
CM-3
null
null
null
null
null
null
§ 11.10 § 11.10(k) § 11.10(k)(1) § 11.10(k)(2)
CM-3
null
CM-3
CM-3
null
CM-3
null
CM-3
CM-3
null
null
D1.G.IT.B.4
null
null
314.4(c)(7)
null
null
null
null
CM-3
null
null
8-103 8-104 8-311 8-610
null
null
null
null
null
null
null
CM-3
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
38-99-20(D)(2)(f)
null
null
null
null
CM-3
null
null
null
3.4.4(37) 3.6.3(75) 3.6.3(76)
Art 9.4(e)
null
null
null
null
null
null
null
null
null
null
null
null
8.5
DEV-08
null
null
null
10.6 14.7
null
null
null
null
null
null
null
null
null
null
null
null
TPC-73
null
1-6-3-5
1-5 1-5-1 1-5-2 1-5-3 1-5-3-1
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
1211
null
null
null
null
null
null
null
null
null
null
12.1.2 12.1.2.11.PB 14.2.2
null
null
6.3.6.C.02 6.3.7.C.01 6.3.7.C.02 6.3.7.C.03
null
null
null
null
null
null
null
null
null
null
null
null
4.18 4.20
2.5.1 2.5.3
null
null
null
null
null
null
null
null
null
null
x
NAIC
x
x
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-1 R-AM-2 R-AM-3 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1
R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
null
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-10 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Change Management
Prohibition Of Changes
CHG-02.1
Mechanisms exist to prohibit unauthorized changes, unless organization-approved change requests are received.
- CimTrak Integrity Suite (https://www.cimcor.com/cimtrak/) - VisibleOps methodology - ITIL infrastructure library - Manual processes/workflows - Application whitelisting
null
Does the organization prohibit unauthorized changes, unless organization-approved change requests are received?
10
Protect
null
X
X
There is no evidence of a capability to prohibit unauthorized changes, unless organization-approved change requests are received.
Change Management (CHG) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist: • IT personnel use an informal process to: o Govern changes to systems, applications and services to ensure their stability, reliability and predictability. o Notify stakeholders about proposed changes. • Logical Access Control (LAC) limits the ability of non-administrators from making unauthorized configuration changes to systems, applications and services. • Requests for Change (RFC) are submitted to IT personnel. • prior to changes being made, RFCs are informally reviewed for cybersecurity & data privacy ramifications. • Whenever possible, IT personnel test changes to business-critical systems/services/applications on a similarly configured IT environment as that of Production, prior to widespread production release of the change. • Copying, deleting, moving and renaming operations are version controlled.
Change Management (CHG) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Change management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for change management. • Changes are tracked through a centralized technology solution to submit, review, approve and assign Requests for Change (RFC). • A Change Advisory Board (CAB), or similar function, exists to govern changes to systems, applications and services to ensure their stability, reliability and predictability. • A CAB, or similar function, reviews RFCs for cybersecurity & data privacy ramifications. • A CAB, or similar function, notifies stakeholders to ensure awareness of the impact of proposed changes. • Logical Access Control (LAC) limits the ability of non-administrators from making unauthorized configuration changes to systems, applications and services. • Cybersecurity controls are tested after a change is implemented to ensure cybersecurity controls are operating properly. • Asset custodians are assigned responsibilities that cover change management duties, including privileged access to perform change management actions.
Change Management (CHG) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • An IT Asset Management (ITAM) function, or similar function, ensures compliance with requirements for asset management. • ITAM leverages a Configuration Management Database (CMDB), or similar tool, as the authoritative source of IT assets. • Logical Access Control (LAC) is governed to limit the ability of non-administrators from making configuration changes to systems, applications and services. • A formal Change Management (CM) program ensures that no unauthorized changes are made, that all changes are documented, that services are not disrupted and that resources are used efficiently. • The CM function has formally defined roles and associated responsibilities. • Changes are tracked through a centralized technology solution to submit, review, approve and assign Requests for Change (RFC). • A Change Advisory Board (CAB), or similar function: o Exists to govern changes to systems, applications and services to ensure their stability, reliability and predictability. o Reviews RFC for cybersecurity & data privacy ramifications. o Notifies stakeholders to ensure awareness of the impact of proposed changes. • IT personnel use dedicated development/test/staging environments to deploy and evaluate changes, wherever technically possible. • Asset custodians are assigned responsibilities that cover change management duties, including privileged access to perform change management actions. • File Integrity Monitoring (FIM) alerts are investigated for unauthorized changes. • FIM alerts are investigated for unauthorized changes and are configured to implement remediation actions up on the detection of unauthorized baseline configurations change(s). • FIM is deployed on systems that store, process or transmit sensitive/regulated/regulated data to monitor the integrity of business-critical files for tampering. • Endpoint technologies detect and report changes with a centralized Change Management (CM) service to discover unauthorized changes.
Change Management (CHG) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to prohibit unauthorized changes, unless organization-approved change requests are received.
CC6.8
null
null
null
null
null
null
null
null
CCC-03 CCC-04
GVN-05
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
TS-2.6
null
null
null
null
null
null
CM-3(1)
null
null
CM-3(1)
CM-3(1)
null
null
null
CM-3(1)
null
null
null
null
CM-3(1)
null
CM-3(1)
null
null
null
CM-3(1)
CM-3(1)
null
3.4.2.b
null
null
null
null
null
null
null
null
1.2.2 6.5 6.5.1
null
1.2.2 6.5.1
null
null
6.5.1
null
1.2.2 6.5.1
1.2.2 6.5.1
null
G.1.3.8
null
5.2.1
null
null
null
ASSET-4.E.MIL2 ARCHITECTURE-5.H.MIL3
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
CM-3(1)
null
null
CM-3(1)
null
CM-3(1)
null
null
CM-3(1)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
4.3
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
3.4.4(37) 3.6.3(75) 3.6.3(76)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
IDM-02
null
null
null
14.7
null
null
null
null
null
null
null
null
null
null
null
null
TPC-73
null
null
1-5-3-4
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
7.5.4
null
null
null
null
null
null
null
null
2.5.1 2.5.2
null
null
null
null
null
null
null
null
null
null
null
null
x
x
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-1 R-AM-2 R-AM-3 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1
R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
null
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-10 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Change Management
Test, Validate & Document Changes
CHG-02.2
Mechanisms exist to appropriately test and document proposed changes in a non-production environment before changes are implemented in a production environment.
- CimTrak Integrity Suite (https://www.cimcor.com/cimtrak/) - VisibleOps methodology - ITIL infrastructure library - NNT Change Tracker (https://www.newnettechnologies.com) - VMware - Docker (https://www.docker.com/)
E-CHG-03
Does the organization appropriately test and document proposed changes in a non-production environment before changes are implemented in a production environment?
9
Protect
null
X
X
There is no evidence of a capability to appropriately test and document proposed changes in a non-production environment before changes are implemented in a production environment.
Change Management (CHG) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist: • IT personnel use an informal process to: o Govern changes to systems, applications and services to ensure their stability, reliability and predictability. o Notify stakeholders about proposed changes. • Logical Access Control (LAC) limits the ability of non-administrators from making unauthorized configuration changes to systems, applications and services. • Requests for Change (RFC) are submitted to IT personnel. • prior to changes being made, RFCs are informally reviewed for cybersecurity & data privacy ramifications. • Whenever possible, IT personnel test changes to business-critical systems/services/applications on a similarly configured IT environment as that of Production, prior to widespread production release of the change. • IT personnel use an informal process to verify the functionality of security controls when anomalies or misconfigurations are discovered.
Change Management (CHG) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Change management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for change management. • Changes are tracked through a centralized technology solution to submit, review, approve and assign Requests for Change (RFC). • A Change Advisory Board (CAB), or similar function, exists to govern changes to systems, applications and services to ensure their stability, reliability and predictability. • A CAB, or similar function, reviews RFCs for cybersecurity & data privacy ramifications. • A CAB, or similar function, notifies stakeholders to ensure awareness of the impact of proposed changes. • Logical Access Control (LAC) limits the ability of non-administrators from making unauthorized configuration changes to systems, applications and services. • Cybersecurity controls are tested after a change is implemented to ensure cybersecurity controls are operating properly. • Up on implementing the RFC, the technician implementing a change tests to ensure anti-malware, logging and other cybersecurity & data privacy controls are still implemented and operating properly. • Results from testing changes are documented. • Up on completing the RFC, the CAB reports the results of cybersecurity & data privacy function verification to senior management.
Change Management (CHG) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • An IT Asset Management (ITAM) function, or similar function, ensures compliance with requirements for asset management. • ITAM leverages a Configuration Management Database (CMDB), or similar tool, as the authoritative source of IT assets. • Logical Access Control (LAC) is governed to limit the ability of non-administrators from making configuration changes to systems, applications and services. • A formal Change Management (CM) program ensures that no unauthorized changes are made, that all changes are documented, that services are not disrupted and that resources are used efficiently. • The CM function has formally defined roles and associated responsibilities. • Changes are tracked through a centralized technology solution to submit, review, approve and assign Requests for Change (RFC). • A Change Advisory Board (CAB), or similar function: o Exists to govern changes to systems, applications and services to ensure their stability, reliability and predictability. o Reviews RFC for cybersecurity & data privacy ramifications. o Notifies stakeholders to ensure awareness of the impact of proposed changes. • IT personnel use dedicated development/test/staging environments to deploy and evaluate changes, wherever technically possible. • Up on implementing the RFC, the technician implementing a change tests to ensure anti-malware, logging and other cybersecurity & data privacy controls are still implemented and operating properly. • Results from testing changes are documented. • A structured set of controls are tested after a change is implemented to ensure cybersecurity controls are operating properly. • Results from testing changes are documented. • CM leverages Information Technology Infrastructure Library (ITIL) Service Management practices to govern CM operations (includes SecDevOps considerations). • Up on completing the RFC, the CAB reports the results of cybersecurity & data privacy function verification to senior management. • Up on implementing the RFC, the technician implementing a change tests to ensure anti-malware, logging and other cybersecurity & data privacy controls are still implemented and operating properly. • A vulnerability assessment is conducted on systems/applications/services to detect any new vulnerabilities that a change may have introduced.
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to appropriately test and document proposed changes in a non-production environment before changes are implemented in a production environment.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to appropriately test and document proposed changes in a non-production environment before changes are implemented in a production environment.
CC3.4 CC8.1
null
null
null
null
null
null
null
Principle 9
CCC-02
CCM-08
null
1.2.6
null
null
null
null
null
14.2.3
8.19 8.32
14.2.3
null
6.11.2.3
null
null
null
null
TS-5.0
null
null
null
null
null
null
CM-3(2) CM-5(2)
null
null
CM-3(2) CM-5(2)
CM-3(2) CM-3(7) SA-8(31)
null
null
CM-3(2)
CM-3(2)
CM-3(7) SA-8(31)
null
null
CM-3(2)
CM-3(2)
null
CM-3(2)
null
null
null
CM-3(2)
CM-3(2)
NFO - CM-3(2)
null
null
A.03.04.03.c[01] A.03.04.03.c[02]
null
null
null
null
null
null
6.5 6.5.1 6.5.2 A3.2.2.1
null
6.5.1 6.5.2
null
null
6.5.1 6.5.2
null
6.5.1 6.5.2
6.5.1 6.5.2
null
G.1.5
null
null
null
null
null
ASSET-4.B.MIL1 ASSET-4.C.MIL2 ASSET-4.D.MIL2 ASSET-4.E.MIL2 ASSET-4.F.MIL2 ASSET-4.G.MIL2 ASSET-4.H.MIL3 ASSET-4.I.MIL3
null
null
null
null
null
null
null
null
null
CM-3(2)
null
null
null
null
null
null
null
CM-3(2) CM-5(2)
null
null
CM-3(2) CM-5(2)
null
CM-3(2)
null
CM-3(2)
CM-3(2)
null
null
null
null
null
null
null
null
null
null
CM-3(2)
null
null
null
null
null
null
null
null
null
null
CM-3(2)
CM-3(2)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
CM-3(2)
null
null
null
3.4.4(37) 3.6.3(75) 3.6.3(76)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
DEV-06 DEV-08 DEV-09
null
null
null
10.6 12.21 12.30 14.6 14.8 14.9 14.10
null
null
null
null
null
null
null
null
null
null
null
1-3-1-2
TPC-73
null
1-6-2-1 1-6-3-5
1-5-3-2
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
14.2.3
null
null
6.3.8.C.01
null
null
null
null
7.4.2 7.5.3 7.5.5 7.5.7
null
null
null
null
null
null
null
6.11
2.5.3
null
null
null
null
null
null
null
null
null
null
x
null
x
x
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-1 R-AM-2 R-AM-3 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1
R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
null
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-10 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Change Management
Cybersecurity & Data Privacy Representative for Asset Lifecycle Changes
CHG-02.3
Mechanisms exist to include a cybersecurity and/or data privacy representative in the configuration change control review process.
- Change Control Board (CCB) - Change Advisory Board (CAB) - VisibleOps methodology - ITIL infrastructure library
E-CHG-04
Does the organization include a cybersecurity and/or data privacy representative in the configuration change control review process?
7
Protect
null
X
X
There is no evidence of a capability to include a cybersecurity and/ or data privacy representative in the configuration change control review process.
Change Management (CHG) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist: • IT personnel use an informal process to: o Govern changes to systems, applications and services to ensure their stability, reliability and predictability. o Notify stakeholders about proposed changes. • Logical Access Control (LAC) limits the ability of non-administrators from making unauthorized configuration changes to systems, applications and services. • Requests for Change (RFC) are submitted to IT personnel. • prior to changes being made, RFCs are informally reviewed for cybersecurity & data privacy ramifications. • Whenever possible, IT personnel test changes to business-critical systems/services/applications on a similarly configured IT environment as that of Production, prior to widespread production release of the change.
Change Management (CHG) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Change management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for change management. • Changes are tracked through a centralized technology solution to submit, review, approve and assign Requests for Change (RFC). • A Change Advisory Board (CAB), or similar function, exists to govern changes to systems, applications and services to ensure their stability, reliability and predictability. • A CAB, or similar function, reviews RFCs for cybersecurity & data privacy ramifications. • A CAB, or similar function, notifies stakeholders to ensure awareness of the impact of proposed changes. • Logical Access Control (LAC) limits the ability of non-administrators from making unauthorized configuration changes to systems, applications and services. • Cybersecurity controls are tested after a change is implemented to ensure cybersecurity controls are operating properly.
Change Management (CHG) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • An IT Asset Management (ITAM) function, or similar function, ensures compliance with requirements for asset management. • ITAM leverages a Configuration Management Database (CMDB), or similar tool, as the authoritative source of IT assets. • Logical Access Control (LAC) is governed to limit the ability of non-administrators from making configuration changes to systems, applications and services. • A formal Change Management (CM) program ensures that no unauthorized changes are made, that all changes are documented, that services are not disrupted and that resources are used efficiently. • The CM function has formally defined roles and associated responsibilities. • Changes are tracked through a centralized technology solution to submit, review, approve and assign Requests for Change (RFC). • A Change Advisory Board (CAB), or similar function: o Exists to govern changes to systems, applications and services to ensure their stability, reliability and predictability. o Reviews RFC for cybersecurity & data privacy ramifications. o Notifies stakeholders to ensure awareness of the impact of proposed changes. • IT personnel use dedicated development/test/staging environments to deploy and evaluate changes, wherever technically possible.
Change Management (CHG) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to include a cybersecurity and/ or data privacy representative in the configuration change control review process.
CC3.4
null
null
null
null
null
null
null
Principle 9
null
CCM-08
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
CM-3(4)
null
null
null
CM-3(4)
null
null
CM-3(4)
CM-3(4)
null
null
null
CM-3(4)
CM-3(4)
null
CM-3(4)
null
null
null
CM-3(4)
CM-3(4)
null
3.4.4
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
G.1.10
null
null
null
null
null
ASSET-4.E.MIL2
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
CM-3(4)
null
null
CM-3(4)
null
CM-3(4)
null
CM-3(4)
CM-3(4)
null
null
null
null
null
null
null
null
null
null
CM-3(4)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
3.4.4(37) 3.6.3(75) 3.6.3(76)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
DEV-05 DEV-09
null
null
null
14.8
null
null
null
null
null
null
null
null
null
null
null
null
null
null
1-6-2-2
1-5-2
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
7.5.4
null
null
null
null
null
null
null
2.4 6.11
1.3.1
null
null
null
null
null
null
null
null
null
null
x
null
x
x
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-1 R-AM-2 R-AM-3 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1
R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
null
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-10 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Change Management
Automated Security Response
CHG-02.4
Automated mechanisms exist to implement remediation actions upon the detection of unauthorized baseline configurations change(s).
- CimTrak Integrity Suite (https://www.cimcor.com/cimtrak/)
null
Does the organization use automated mechanisms to implement remediation actions upon the detection of unauthorized baseline configurations change(s)?
5
Protect
null
X
X
There is no evidence of a capability to implement remediation actions up on the detection of unauthorized baseline configurations change(s).
SP-CMM1 is N/A, since a structured process is required to implement remediation actions up on the detection of unauthorized baseline configurations change(s).
SP-CMM2 is N/A, since a well-defined process is required to implement remediation actions up on the detection of unauthorized baseline configurations change(s).
Change Management (CHG) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • An IT Asset Management (ITAM) function, or similar function, ensures compliance with requirements for asset management. • ITAM leverages a Configuration Management Database (CMDB), or similar tool, as the authoritative source of IT assets. • Logical Access Control (LAC) is governed to limit the ability of non-administrators from making configuration changes to systems, applications and services. • A formal Change Management (CM) program ensures that no unauthorized changes are made, that all changes are documented, that services are not disrupted and that resources are used efficiently. • The CM function has formally defined roles and associated responsibilities. • Changes are tracked through a centralized technology solution to submit, review, approve and assign Requests for Change (RFC). • A Change Advisory Board (CAB), or similar function: o Exists to govern changes to systems, applications and services to ensure their stability, reliability and predictability. o Reviews RFC for cybersecurity & data privacy ramifications. o Notifies stakeholders to ensure awareness of the impact of proposed changes. • IT personnel use dedicated development/test/staging environments to deploy and evaluate changes, wherever technically possible. • File Integrity Monitoring (FIM) alerts are investigated for unauthorized changes. • FIM alerts are investigated for unauthorized changes and are configured to implement remediation actions up on the detection of unauthorized baseline configurations change(s). • FIM is deployed on systems that store, process or transmit sensitive/regulated/regulated data to monitor the integrity of business-critical files for tampering. • Endpoint technologies detect and report changes with a centralized Change Management (CM) service to discover unauthorized changes.
Change Management (CHG) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to implement remediation actions up on the detection of unauthorized baseline configurations change(s).
null
null
null
null
null
null
null
null
null
CCC-04 CCC-06 CCC-09
GVN-05
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
CM-3(5)
null
null
null
CM-3(5)
null
null
null
null
CM-3(5)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
3.4.2e
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
G.1.8
null
null
null
null
null
null
null
null
null
null
null
TBD - 3.4.2e
null
null
CM.L3-3.4.2e
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
1-5-4
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
x
R-AC-4 R-AM-2 R-AM-3 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-IR-1 R-IR-2 R-IR-4 R-SA-1
null
null
null
R-AC-4
null
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
null
null
null
null
null
null
R-EX-6
R-EX-7
R-GV-1
R-GV-2
null
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
R-IR-1
R-IR-2
null
R-IR-4
R-SA-1
null
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-10 MT-11 MT-12 MT-13 MT-14
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
null
null
null
Change Management
Cryptographic Management
CHG-02.5
Mechanisms exist to govern assets involved in providing cryptographic protections according to the organization's configuration management processes.
null
null
Does the organization govern assets involved in providing cryptographic protections according to the organization's configuration management processes?
5
Protect
null
X
X
There is no evidence of a capability to govern assets involved in providing cryptographic protections according to the organization's configuration management processes.
SP-CMM1 is N/A, since a structured process is required to govern assets involved in providing cryptographic protections according to the organization's configuration management processes.
Change Management (CHG) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Change management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for change management. • Changes are tracked through a centralized technology solution to submit, review, approve and assign Requests for Change (RFC). • A Change Advisory Board (CAB), or similar function, exists to govern changes to systems, applications and services to ensure their stability, reliability and predictability. • A CAB, or similar function, reviews RFCs for cybersecurity & data privacy ramifications. • A CAB, or similar function, notifies stakeholders to ensure awareness of the impact of proposed changes. • Logical Access Control (LAC) limits the ability of non-administrators from making unauthorized configuration changes to systems, applications and services. • Cybersecurity controls are tested after a change is implemented to ensure cybersecurity controls are operating properly.
Change Management (CHG) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • An IT Asset Management (ITAM) function, or similar function, ensures compliance with requirements for asset management. • ITAM leverages a Configuration Management Database (CMDB), or similar tool, as the authoritative source of IT assets. • Logical Access Control (LAC) is governed to limit the ability of non-administrators from making configuration changes to systems, applications and services. • A formal Change Management (CM) program ensures that no unauthorized changes are made, that all changes are documented, that services are not disrupted and that resources are used efficiently. • The CM function has formally defined roles and associated responsibilities. • Changes are tracked through a centralized technology solution to submit, review, approve and assign Requests for Change (RFC). • A Change Advisory Board (CAB), or similar function: o Exists to govern changes to systems, applications and services to ensure their stability, reliability and predictability. o Reviews RFC for cybersecurity & data privacy ramifications. o Notifies stakeholders to ensure awareness of the impact of proposed changes. • IT personnel use dedicated development/test/staging environments to deploy and evaluate changes, wherever technically possible. • Cryptographic primitives are employed to track file revisions and authentications.
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to govern assets involved in providing cryptographic protections according to the organization's configuration management processes.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to govern assets involved in providing cryptographic protections according to the organization's configuration management processes.
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
CM-3(6)
null
null
null
CM-3(6)
null
null
null
CM-3(6)
null
null
null
null
CM-3(6)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
U.1.19
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
CM-3(6)
null
null
CM-3(6)
null
CM-3(6)
null
null
CM-3(6)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
x
R-AC-1 R-AM-2 R-AM-3
R-AC-1
null
null
null
null
R-AM-2
R-AM-3
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-10 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Change Management
Security Impact Analysis for Changes
CHG-03
Mechanisms exist to analyze proposed changes for potential security impacts, prior to the implementation of the change.
- VisibleOps methodology - ITIL infrastructure library - Change management software
null
Does the organization analyze proposed changes for potential security impacts, prior to the implementation of the change?
9
Protect
null
null
X
There is no evidence of a capability to analyze proposed changes for potential security impacts, prior to the implementation of the change.
Change Management (CHG) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist: • IT personnel use an informal process to: o Govern changes to systems, applications and services to ensure their stability, reliability and predictability. o Notify stakeholders about proposed changes. • Logical Access Control (LAC) limits the ability of non-administrators from making unauthorized configuration changes to systems, applications and services. • Requests for Change (RFC) are submitted to IT personnel. • prior to changes being made, RFCs are informally reviewed for cybersecurity & data privacy ramifications. • Whenever possible, IT personnel test changes to business-critical systems/services/applications on a similarly configured IT environment as that of Production, prior to widespread production release of the change.
Change Management (CHG) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Change management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for change management. • Changes are tracked through a centralized technology solution to submit, review, approve and assign Requests for Change (RFC). • A Change Advisory Board (CAB), or similar function, exists to govern changes to systems, applications and services to ensure their stability, reliability and predictability. • A CAB, or similar function, reviews RFCs for cybersecurity & data privacy ramifications. • A CAB, or similar function, notifies stakeholders to ensure awareness of the impact of proposed changes. • Logical Access Control (LAC) limits the ability of non-administrators from making unauthorized configuration changes to systems, applications and services. • Cybersecurity controls are tested after a change is implemented to ensure cybersecurity controls are operating properly.
Change Management (CHG) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • An IT Asset Management (ITAM) function, or similar function, ensures compliance with requirements for asset management. • ITAM leverages a Configuration Management Database (CMDB), or similar tool, as the authoritative source of IT assets. • Logical Access Control (LAC) is governed to limit the ability of non-administrators from making configuration changes to systems, applications and services. • A formal Change Management (CM) program ensures that no unauthorized changes are made, that all changes are documented, that services are not disrupted and that resources are used efficiently. • The CM function has formally defined roles and associated responsibilities. • Changes are tracked through a centralized technology solution to submit, review, approve and assign Requests for Change (RFC). • A Change Advisory Board (CAB), or similar function: o Exists to govern changes to systems, applications and services to ensure their stability, reliability and predictability. o Reviews RFC for cybersecurity & data privacy ramifications. o Notifies stakeholders to ensure awareness of the impact of proposed changes. • IT personnel use dedicated development/test/staging environments to deploy and evaluate changes, wherever technically possible. • Up on implementing the RFC, the technician implementing a change tests to ensure anti-malware, logging and other cybersecurity & data privacy controls are still implemented and operating properly. • Results from testing changes are documented.
Change Management (CHG) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to analyze proposed changes for potential security impacts, prior to the implementation of the change.
CC3.4
CC3.4-POF4
null
null
null
null
null
null
Principle 9
CCC-03 CCC-05
null
null
1.2.6
null
null
null
null
null
null
null
null
null
null
null
null
null
null
TS-5.0
null
null
null
null
null
null
CM-4
CM-4
CM-4
CM-4
CM-4
CM-4
CM-4
CM-4
CM-4
null
null
CM-4
CM-4
CM-4
3.4.10 3.4.13
CM-4
CM-4
null
null
null
CM-4
3.4.4
3.4.4
3.4.4
A.03.04.04
null
null
null
null
null
6.4 6.4.1 6.4.2 6.4.3 6.4.4 6.4.5 6.4.5.1 6.4.5.2 6.4.5.3 6.4.5.4
6.5.2 6.5.6 A3.2.2 A3.2.3
null
6.5.2
null
null
6.5.2
null
6.5.2 6.5.6
6.5.2 6.5.6
null
G.1.7
null
null
null
null
null
ASSET-4.E.MIL2
TM:SG3.SP1 TM:SG4.SP3
null
null
null
CM.L2-3.4.4
CM.L2-3.4.4
null
CM.L2-3.4.4
CM.L2-3.4.4
CM-4
null
null
null
null
null
null
null
CM-4
CM-4
CM-4
CM-4
CM-4
CM-4
CM-4
CM-4
CM-4
CM-4
null
null
null
null
null
null
null
null
null
CM-4
null
null
8-103 8-104 8-311 8-610
null
null
null
null
null
null
CM-4
CM-4
CM-4
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
CM-4
CM-4
CM-4
null
null
null
3.4.4(37) 3.6.3(75) 3.6.3(76)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
DEV-05 BCM-02
null
null
null
10.6 14.8
null
null
null
null
null
null
null
null
null
null
null
1-3-1-2
null
null
null
1-5-2 1-5-4
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
21(d)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
7.5.2
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
x
null
x
x
R-AC-4 R-AM-2 R-AM-3 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-IR-1 R-IR-2 R-IR-4 R-SA-1
null
null
null
R-AC-4
null
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
null
null
null
null
null
null
R-EX-6
R-EX-7
R-GV-1
R-GV-2
null
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
R-IR-1
R-IR-2
null
R-IR-4
R-SA-1
null
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-10 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Change Management
Access Restriction For Change
CHG-04
Mechanisms exist to enforce configuration restrictions in an effort to restrict the ability of users to conduct unauthorized changes.
- CimTrak Integrity Suite (https://www.cimcor.com/cimtrak/) - VisibleOps methodology - ITIL infrastructure library - Role-based permissions - Mandatory Access Control (MAC) - Application whitelisting
null
Does the organization enforce configuration restrictions in an effort to restrict the ability of users to conduct unauthorized changes?
8
Protect
null
X
X
There is no evidence of a capability to enforce configuration restrictions in an effort to restrict the ability of users to conduct unauthorized changes.
Change Management (CHG) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist: • IT personnel use an informal process to: o Govern changes to systems, applications and services to ensure their stability, reliability and predictability. o Notify stakeholders about proposed changes. • Logical Access Control (LAC) limits the ability of non-administrators from making unauthorized configuration changes to systems, applications and services. • Requests for Change (RFC) are submitted to IT personnel. • prior to changes being made, RFCs are informally reviewed for cybersecurity & data privacy ramifications. • Whenever possible, IT personnel test changes to business-critical systems/services/applications on a similarly configured IT environment as that of Production, prior to widespread production release of the change.
Change Management (CHG) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Change management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for change management. • Changes are tracked through a centralized technology solution to submit, review, approve and assign Requests for Change (RFC). • A Change Advisory Board (CAB), or similar function, exists to govern changes to systems, applications and services to ensure their stability, reliability and predictability. • A CAB, or similar function, reviews RFCs for cybersecurity & data privacy ramifications. • A CAB, or similar function, notifies stakeholders to ensure awareness of the impact of proposed changes. • Logical Access Control (LAC) limits the ability of non-administrators from making unauthorized configuration changes to systems, applications and services. • Cybersecurity controls are tested after a change is implemented to ensure cybersecurity controls are operating properly.
Change Management (CHG) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • An IT Asset Management (ITAM) function, or similar function, ensures compliance with requirements for asset management. • ITAM leverages a Configuration Management Database (CMDB), or similar tool, as the authoritative source of IT assets. • Logical Access Control (LAC) is governed to limit the ability of non-administrators from making configuration changes to systems, applications and services. • A formal Change Management (CM) program ensures that no unauthorized changes are made, that all changes are documented, that services are not disrupted and that resources are used efficiently. • The CM function has formally defined roles and associated responsibilities. • Changes are tracked through a centralized technology solution to submit, review, approve and assign Requests for Change (RFC). • A Change Advisory Board (CAB), or similar function: o Exists to govern changes to systems, applications and services to ensure their stability, reliability and predictability. o Reviews RFC for cybersecurity & data privacy ramifications. o Notifies stakeholders to ensure awareness of the impact of proposed changes. • IT personnel use dedicated development/test/staging environments to deploy and evaluate changes, wherever technically possible.
Change Management (CHG) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to enforce configuration restrictions in an effort to restrict the ability of users to conduct unauthorized changes.
null
null
null
null
null
null
null
null
null
CCC-04
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
T1003, T1003.001, T1003.002, T1003.003, T1003.004, T1003.005, T1003.006, T1003.007, T1003.008, T1021, T1021.001, T1021.002, T1021.003, T1021.004, T1021.005, T1021.006, T1047, T1053, T1053.001, T1053.002, T1053.003, T1053.005, T1053.006, T1053.007, T1055, T1055.008, T1056.003, T1059, T1059.001, T1059.006, T1059.008, T1072, T1078, T1078.002, T1078.003, T1078.004, T1098, T1098.001, T1098.002, T1098.003, T1134, T1134.001, T1134.002, T1134.003, T1136, T1136.001, T1136.002, T1136.003, T1137.002, T1176, T1185, T1190, T1195.003, T1197, T1210, T1213, T1213.001, T1213.002, T1218, T1218.007, T1222, T1222.001, T1222.002, T1484, T1489, T1495, T1505, T1505.002, T1525, T1528, T1530, T1537, T1542, T1542.001, T1542.003, T1542.004, T1542.005, T1543, T1543.001, T1543.002, T1543.003, T1543.004, T1546.003, T1547.003, T1547.004, T1547.006, T1547.007, T1547.009, T1547.011, T1547.012, T1547.013, T1548, T1548.002, T1548.003, T1550, T1550.002, T1550.003, T1552, T1552.002, T1552.007, T1553, T1553.006, T1556, T1556.001, T1556.003, T1556.004, T1558, T1558.001, T1558.002, T1558.003, T1559, T1559.001, T1562, T1562.001, T1562.002, T1562.004, T1562.006, T1562.007, T1562.008, T1562.009, T1563, T1563.001, T1563.002, T1564.008, T1569, T1569.001, T1569.002, T1574, T1574.005, T1574.010, T1574.011, T1574.012, T1578, T1578.001, T1578.002, T1578.003, T1599, T1599.001, T1601, T1601.001, T1601.002, T1611, T1619
null
null
null
null
null
null
null
CM-5
null
CM-5
CM-5
CM-5
null
CM-5
CM-5
CM-5
null
null
CM-5
CM-5
CM-5
3.4.10 3.4.13
CM-5
CM-5
null
null
CM-5
CM-5
3.4.5
3.4.2.b 3.4.5
3.4.5[a] 3.4.5[b] 3.4.5[c] 3.4.5[d] 3.4.5[e] 3.4.5[f] 3.4.5[g] 3.4.5[h]
A.03.04.05[01] A.03.04.05[02] A.03.04.05[03] A.03.04.05[04] A.03.04.05[05] A.03.04.05[06]
null
null
null
null
null
null
1.2.8
null
1.2.8
null
null
null
null
1.2.8
1.2.8
null
G.1.3.1
null
null
null
null
null
ASSET-4.E.MIL2 ARCHITECTURE-5.H.MIL3
TM:SG4.SP1
null
5.7.1
null
CM.L2-3.4.5
CM.L2-3.4.5
null
CM.L2-3.4.5
CM.L2-3.4.5
CM-5
null
null
null
null
null
null
null
CM-5
null
CM-5
CM-5
null
CM-5
CM-5
CM-5
CM-5
CM-5
null
null
null
null
null
null
null
null
null
CM-5
null
null
8-311 8-610
null
null
null
null
null
null
null
CM-5
CM-5
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
CM-5
null
CM-5
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
DEV-09
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
1-5-3-4
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
2.5.2
null
null
null
null
null
null
null
null
null
null
x
null
x
x
R-AC-1 R-AC-2 R-AC-4 R-AM-2 R-AM-3
R-AC-1
R-AC-2
null
R-AC-4
null
R-AM-2
R-AM-3
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-10 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Change Management
Automated Access Enforcement / Auditing
CHG-04.1
Mechanisms exist to perform after-the-fact reviews of configuration change logs to discover any unauthorized changes.
- CimTrak Integrity Suite (https://www.cimcor.com/cimtrak/) - VisibleOps methodology - ITIL infrastructure library - NNT Change Tracker (https://www.newnettechnologies.com) - Manual review processes - Tripwire Enterprise (https://www.tripwire.com/products/tripwire-enterprise/) - Puppet (https://puppet.com/) - Chef (https://www.chef.io/) (https://www.chef.io/)
null
Does the organization perform after-the-fact reviews of configuration change logs to discover any unauthorized changes?
3
Detect
null
null
X
There is no evidence of a capability to perform after-the-fact reviews of configuration change logs to discover any unauthorized changes.
SP-CMM1 is N/A, since a structured process is required to perform after-the-fact reviews of configuration change logs to discover any unauthorized changes.
SP-CMM2 is N/A, since a well-defined process is required to perform after-the-fact reviews of configuration change logs to discover any unauthorized changes.
Change Management (CHG) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • An IT Asset Management (ITAM) function, or similar function, ensures compliance with requirements for asset management. • ITAM leverages a Configuration Management Database (CMDB), or similar tool, as the authoritative source of IT assets. • Logical Access Control (LAC) is governed to limit the ability of non-administrators from making configuration changes to systems, applications and services. • A formal Change Management (CM) program ensures that no unauthorized changes are made, that all changes are documented, that services are not disrupted and that resources are used efficiently. • The CM function has formally defined roles and associated responsibilities. • Changes are tracked through a centralized technology solution to submit, review, approve and assign Requests for Change (RFC). • A Change Advisory Board (CAB), or similar function: o Exists to govern changes to systems, applications and services to ensure their stability, reliability and predictability. o Reviews RFC for cybersecurity & data privacy ramifications. o Notifies stakeholders to ensure awareness of the impact of proposed changes. • IT personnel use dedicated development/test/staging environments to deploy and evaluate changes, wherever technically possible.
Change Management (CHG) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to perform after-the-fact reviews of configuration change logs to discover any unauthorized changes.
null
null
null
null
null
null
null
null
null
CCC-04 CCC-09
null
null
null
CR 3.4 (7.6.3(2))
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
CM-5(1)
null
null
CM-5(1)
CM-5(1)
null
null
null
CM-5(1)
null
null
null
null
CM-5(1)
null
CM-5(1)
null
null
null
null
CM-5(1)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
M.1.20
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
CM-5(1)
null
null
null
null
null
null
null
CM-5(1)
null
CM-5(1)
CM-5(1)
null
CM-5(1)
null
CM-5(1)
CM-5(1)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
CM-5(1)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
CM-5(1)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
1-5-4
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
6.11
null
null
null
null
null
null
null
null
null
null
null
null
null
null
x
R-AC-4 R-AM-2 R-AM-3 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-IR-1 R-IR-2 R-IR-4 R-SA-1
null
null
null
R-AC-4
null
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
null
null
null
null
null
null
R-EX-6
R-EX-7
R-GV-1
R-GV-2
null
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
R-IR-1
R-IR-2
null
R-IR-4
R-SA-1
null
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-10 MT-11 MT-12 MT-13 MT-14
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
null
null
null
Change Management
Signed Components
CHG-04.2
Mechanisms exist to prevent the installation of software and firmware components without verification that the component has been digitally signed using an organization-approved certificate authority.
- Privileged Account Management (PAM) - Patch management tools - OS configuration standards
null
Does the organization prevent the installation of software and firmware components without verification that the component has been digitally signed using an organization-approved certificate authority?
3
Protect
null
null
X
There is no evidence of a capability to prevent the installation of software and firmware components without verification that the component has been digitally signed using an organization-approved certificate authority.
SP-CMM1 is N/A, since a structured process is required to prevent the installation of software and firmware components without verification that the component has been digitally signed using an organization-approved certificate authority.
SP-CMM2 is N/A, since a well-defined process is required to prevent the installation of software and firmware components without verification that the component has been digitally signed using an organization-approved certificate authority.
Change Management (CHG) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • An IT Asset Management (ITAM) function, or similar function, ensures compliance with requirements for asset management. • ITAM leverages a Configuration Management Database (CMDB), or similar tool, as the authoritative source of IT assets. • Logical Access Control (LAC) is governed to limit the ability of non-administrators from making configuration changes to systems, applications and services. • A formal Change Management (CM) program ensures that no unauthorized changes are made, that all changes are documented, that services are not disrupted and that resources are used efficiently. • The CM function has formally defined roles and associated responsibilities. • Changes are tracked through a centralized technology solution to submit, review, approve and assign Requests for Change (RFC). • A Change Advisory Board (CAB), or similar function: o Exists to govern changes to systems, applications and services to ensure their stability, reliability and predictability. o Reviews RFC for cybersecurity & data privacy ramifications. o Notifies stakeholders to ensure awareness of the impact of proposed changes. • IT personnel use dedicated development/test/staging environments to deploy and evaluate changes, wherever technically possible. • Administrative processes exist and technologies configured to prevent the installation of software and firmware components without verification that the component has been digitally signed using a certificate that is recognized and approved by the organization.
Change Management (CHG) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to prevent the installation of software and firmware components without verification that the component has been digitally signed using an organization-approved certificate authority.
null
null
null
null
null
null
null
null
null
null
null
null
null
CR 3.4 (7.6.1) CR 3.4 (7.6.3(1)) SAR 2.4 (12.2.3(1)) EDR 3.13 (13.8.1) HDR 3.10 (14.5.3(1))
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
CM-5(3)
null
null
CM-5(3)
CM-14 SI-7(15)
null
null
null
SI-7(15)
CM-14
null
null
null
SI-7(15)
null
CM-14 SI-7(15)
null
null
null
null
CM-14 SI-7(15)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
M.3.17
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
CM-5(3)
null
CM-5(3)
CM-5(3)
null
CM-14 SI-7(15)
null
null
CM-14 SI-7(15)
null
null
null
null
null
null
null
null
null
null
CM-14
null
null
null
null
null
null
null
null
null
null
null
CM-5(3)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
CM-5(3)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
x
R-AM-2 R-AM-3 R-BC-2 R-BC-4 R-EX-7
null
null
null
null
null
R-AM-2
R-AM-3
null
R-BC-2
null
R-BC-4
null
null
null
null
null
null
null
R-EX-7
null
null
null
null
null
null
null
null
null
null
null
null
null
null
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-10 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Change Management
Dual Authorization for Change
CHG-04.3
Mechanisms exist to enforce a two-person rule for implementing changes to critical assets.
- Separation of Duties (SoD)
null
Does the organization enforce a two-person rule for implementing changes to critical assets?
6
Protect
null
X
X
There is no evidence of a capability to enforce a two-pers on rule for implementing changes to critical assets.
SP-CMM1 is N/A, since a structured process is required to enforce a two-pers on rule for implementing changes to critical assets.
SP-CMM2 is N/A, since a well-defined process is required to enforce a two-pers on rule for implementing changes to critical assets.
Change Management (CHG) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • An IT Asset Management (ITAM) function, or similar function, ensures compliance with requirements for asset management. • ITAM leverages a Configuration Management Database (CMDB), or similar tool, as the authoritative source of IT assets. • Logical Access Control (LAC) is governed to limit the ability of non-administrators from making configuration changes to systems, applications and services. • A formal Change Management (CM) program ensures that no unauthorized changes are made, that all changes are documented, that services are not disrupted and that resources are used efficiently. • The CM function has formally defined roles and associated responsibilities. • Changes are tracked through a centralized technology solution to submit, review, approve and assign Requests for Change (RFC). • A Change Advisory Board (CAB), or similar function: o Exists to govern changes to systems, applications and services to ensure their stability, reliability and predictability. o Reviews RFC for cybersecurity & data privacy ramifications. o Notifies stakeholders to ensure awareness of the impact of proposed changes. • IT personnel use dedicated development/test/staging environments to deploy and evaluate changes, wherever technically possible. • Critical systems are configured to use dual authorization mechanisms requiring the approval of two authorized individuals in order to execute a change.
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to enforce a two-pers on rule for implementing changes to critical assets.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to enforce a two-pers on rule for implementing changes to critical assets.
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
AC-5 CM-5(4)
null
AC-5
AC-5
AC-5 CM-5(4)
null
null
AC-5
AC-5
CM-5(4)
null
null
AC-5
AC-5
null
AC-5
null
AC-5
null
AC-5
AC-5
null
null
null
null
3.1.1e
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
1.1.2.4
null
null
null
null
null
null
AM:SG1.SP1 ID:SG1.SP1 ID:SG1.SP2 ID:SG1.SP3
null
null
null
null
TBD - 3.1.1e
null
null
null
AC-5
null
null
null
null
null
null
null
AC-5
null
AC-5
AC-5
null
AC-5
null
AC-5
AC-5
null
null
null
null
null
null
null
null
null
null
AC-5
null
null
8-611
null
null
null
null
null
null
null
AC-5
AC-5
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
AC-5
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
2-2-1-6
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
x
null
null
x
R-AC-1 R-AC-2 R-AM-1 R-AM-3 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-GV-2 R-GV-3 R-GV-6 R-GV-7 R-IR-1
R-AC-1
R-AC-2
null
null
R-AM-1
null
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
null
null
null
null
R-GV-2
R-GV-3
null
null
R-GV-6
R-GV-7
null
R-IR-1
null
null
null
null
null
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-10 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Change Management
Limit Production / Operational Privileges (Incompatible Roles)
CHG-04.4
Mechanisms exist to limit operational privileges for implementing changes.
- CimTrak Integrity Suite (https://www.cimcor.com/cimtrak/) - Separation of Duties (SoD) - Privileged Account Management (PAM)
null
Does the organization limit operational privileges for implementing changes?
6
Protect
null
X
null
There is no evidence of a capability to limit operational privileges for implementing changes.
SP-CMM1 is N/A, since a structured process is required to limit operational privileges for implementing changes.
Change Management (CHG) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Change management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for change management. • Changes are tracked through a centralized technology solution to submit, review, approve and assign Requests for Change (RFC). • A Change Advisory Board (CAB), or similar function, exists to govern changes to systems, applications and services to ensure their stability, reliability and predictability. • A CAB, or similar function, reviews RFCs for cybersecurity & data privacy ramifications. • A CAB, or similar function, notifies stakeholders to ensure awareness of the impact of proposed changes. • Logical Access Control (LAC) limits the ability of non-administrators from making unauthorized configuration changes to systems, applications and services. • Cybersecurity controls are tested after a change is implemented to ensure cybersecurity controls are operating properly.
Change Management (CHG) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • An IT Asset Management (ITAM) function, or similar function, ensures compliance with requirements for asset management. • ITAM leverages a Configuration Management Database (CMDB), or similar tool, as the authoritative source of IT assets. • Logical Access Control (LAC) is governed to limit the ability of non-administrators from making configuration changes to systems, applications and services. • A formal Change Management (CM) program ensures that no unauthorized changes are made, that all changes are documented, that services are not disrupted and that resources are used efficiently. • The CM function has formally defined roles and associated responsibilities. • Changes are tracked through a centralized technology solution to submit, review, approve and assign Requests for Change (RFC). • A Change Advisory Board (CAB), or similar function: o Exists to govern changes to systems, applications and services to ensure their stability, reliability and predictability. o Reviews RFC for cybersecurity & data privacy ramifications. o Notifies stakeholders to ensure awareness of the impact of proposed changes. • IT personnel use dedicated development/test/staging environments to deploy and evaluate changes, wherever technically possible.
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to limit operational privileges for implementing changes.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to limit operational privileges for implementing changes.
null
null
null
null
null
null
null
DSS06.03
null
CCC-04
IAM-04
null
null
CR 2.1 (6.3.3(4))
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
CM-5(5)
null
null
null
CM-5(5)
null
null
null
null
CM-5(5)
null
null
null
null
null
null
null
null
null
null
null
null
3.4.5
null
null
null
PO.2 PO.2.1
null
null
null
null
null
null
null
null
null
null
null
null
null
null
1.1.2.6
null
null
null
null
null
ARCHITECTURE-5.H.MIL3
null
null
null
null
null
null
null
null
null
CM-5(5)
null
null
null
null
null
null
null
CM-5(5)
null
CM-5(5)
CM-5(5)
null
CM-5(5)
null
CM-5(5)
CM-5(5)
null
null
null
null
null
null
null
null
null
null
CM-5(5)
null
null
null
null
null
null
null
null
null
null
null
CM-5(5)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
DEV-09 PSS-08
null
null
null
10.4
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Article 27
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
2.5.2
null
null
null
null
null
null
null
null
null
null
null
null
null
x
R-AC-1 R-AC-2 R-AM-1 R-AM-3 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-GV-2 R-GV-3 R-GV-6 R-GV-7 R-IR-1
R-AC-1
R-AC-2
null
null
R-AM-1
null
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
null
null
null
null
R-GV-2
R-GV-3
null
null
R-GV-6
R-GV-7
null
R-IR-1
null
null
null
null
null
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-10 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Change Management
Library Privileges
CHG-04.5
Mechanisms exist to restrict software library privileges to those individuals with a pertinent business need for access.
- Privileged Account Management (PAM)
null
Does the organization restrict software library privileges to those individuals with a pertinent business need for access?
8
Protect
null
null
X
There is no evidence of a capability to restrict software library privileges to those individuals with a pertinent business need for access.
Change Management (CHG) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist: • IT personnel use an informal process to: o Govern changes to systems, applications and services to ensure their stability, reliability and predictability. o Notify stakeholders about proposed changes. • Logical Access Control (LAC) limits the ability of non-administrators from making unauthorized configuration changes to systems, applications and services. • Requests for Change (RFC) are submitted to IT personnel. • prior to changes being made, RFCs are informally reviewed for cybersecurity & data privacy ramifications. • Whenever possible, IT personnel test changes to business-critical systems/services/applications on a similarly configured IT environment as that of Production, prior to widespread production release of the change. • IT personnel use an informal process to govern changes to the software library to prevent unauthorized changes and create an audit trail of changes made. • LAC is governed to limit the ability of non-administrators from accessing or editing the software library.
Change Management (CHG) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Change management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for change management. • Changes are tracked through a centralized technology solution to submit, review, approve and assign Requests for Change (RFC). • A Change Advisory Board (CAB), or similar function, exists to govern changes to systems, applications and services to ensure their stability, reliability and predictability. • A CAB, or similar function, reviews RFCs for cybersecurity & data privacy ramifications. • A CAB, or similar function, notifies stakeholders to ensure awareness of the impact of proposed changes. • Logical Access Control (LAC) limits the ability of non-administrators from making unauthorized configuration changes to systems, applications and services. • Cybersecurity controls are tested after a change is implemented to ensure cybersecurity controls are operating properly. • IT personnel use a Source Code Manager (SCM) solution to govern modifying, copying, deleting, moving and renaming items in the software library. • SCM supports integrity checking on the source code repository. • SCM uses Role-Based Access Controls (RBAC) to limit the logical access and permissions for users in the software library.
Change Management (CHG) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • An IT Asset Management (ITAM) function, or similar function, ensures compliance with requirements for asset management. • ITAM leverages a Configuration Management Database (CMDB), or similar tool, as the authoritative source of IT assets. • Logical Access Control (LAC) is governed to limit the ability of non-administrators from making configuration changes to systems, applications and services. • A formal Change Management (CM) program ensures that no unauthorized changes are made, that all changes are documented, that services are not disrupted and that resources are used efficiently. • The CM function has formally defined roles and associated responsibilities. • Changes are tracked through a centralized technology solution to submit, review, approve and assign Requests for Change (RFC). • A Change Advisory Board (CAB), or similar function: o Exists to govern changes to systems, applications and services to ensure their stability, reliability and predictability. o Reviews RFC for cybersecurity & data privacy ramifications. o Notifies stakeholders to ensure awareness of the impact of proposed changes. • IT personnel use dedicated development/test/staging environments to deploy and evaluate changes, wherever technically possible. • The CM program includes changes associated with the software library. • IT personnel use a Source Code Manager (SCM) solution to provide application lifecycle support including source code management, project management, reporting, automated builds, testing, release management and requirement management. • SCM governs modifying, copying, deleting, moving and renaming items in the software library. • SCM supports atomic commits . • SCM supports integrity checking on the source code repository. • SCM uses Role-Based Access Controls (RBAC) to limit the logical access and permissions for users in the software library.
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to restrict software library privileges to those individuals with a pertinent business need for access.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to restrict software library privileges to those individuals with a pertinent business need for access.
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
TS-1.14
null
null
null
PS.1.1
null
null
CM-5(6)
null
null
null
CM-5(6)
null
null
null
null
CM-5(6)
null
null
null
null
null
CM-5(6)
null
null
null
null
CM-5(6)
null
null
null
null
null
PS.1 PS.1.1
null
null
null
null
null
null
null
null
null
null
null
null
null
null
1.1.24.2
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
DEV-07 DEV-08
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
1-3-2-2
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
x
R-AC-1 R-AC-2 R-AM-1 R-AM-3 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-GV-2 R-GV-3 R-GV-6 R-GV-7 R-IR-1
R-AC-1
R-AC-2
null
null
R-AM-1
null
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
null
null
null
null
R-GV-2
R-GV-3
null
null
R-GV-6
R-GV-7
null
R-IR-1
null
null
null
null
null
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-10 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Change Management
Stakeholder Notification of Changes
CHG-05
Mechanisms exist to ensure stakeholders are made aware of and understand the impact of proposed changes.
- Change management procedures - VisibleOps methodology - ITIL infrastructure library
null
Does the organization ensure stakeholders are made aware of and understand the impact of proposed changes?
9
Protect
null
X
X
There is no evidence of a capability to ensure stakeholders are made aware of and understand the impact of proposed changes.
Change Management (CHG) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist: • IT personnel use an informal process to: o Govern changes to systems, applications and services to ensure their stability, reliability and predictability. o Notify stakeholders about proposed changes. • Logical Access Control (LAC) limits the ability of non-administrators from making unauthorized configuration changes to systems, applications and services. • Requests for Change (RFC) are submitted to IT personnel. • prior to changes being made, RFCs are informally reviewed for cybersecurity & data privacy ramifications. • Whenever possible, IT personnel test changes to business-critical systems/services/applications on a similarly configured IT environment as that of Production, prior to widespread production release of the change.
Change Management (CHG) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Change management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for change management. • Changes are tracked through a centralized technology solution to submit, review, approve and assign Requests for Change (RFC). • A Change Advisory Board (CAB), or similar function, exists to govern changes to systems, applications and services to ensure their stability, reliability and predictability. • A CAB, or similar function, reviews RFCs for cybersecurity & data privacy ramifications. • A CAB, or similar function, notifies stakeholders to ensure awareness of the impact of proposed changes. • Logical Access Control (LAC) limits the ability of non-administrators from making unauthorized configuration changes to systems, applications and services. • Cybersecurity controls are tested after a change is implemented to ensure cybersecurity controls are operating properly.
Change Management (CHG) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • An IT Asset Management (ITAM) function, or similar function, ensures compliance with requirements for asset management. • ITAM leverages a Configuration Management Database (CMDB), or similar tool, as the authoritative source of IT assets. • Logical Access Control (LAC) is governed to limit the ability of non-administrators from making configuration changes to systems, applications and services. • A formal Change Management (CM) program ensures that no unauthorized changes are made, that all changes are documented, that services are not disrupted and that resources are used efficiently. • The CM function has formally defined roles and associated responsibilities. • Changes are tracked through a centralized technology solution to submit, review, approve and assign Requests for Change (RFC). • A Change Advisory Board (CAB), or similar function: o Exists to govern changes to systems, applications and services to ensure their stability, reliability and predictability. o Reviews RFC for cybersecurity & data privacy ramifications. o Notifies stakeholders to ensure awareness of the impact of proposed changes. • IT personnel use dedicated development/test/staging environments to deploy and evaluate changes, wherever technically possible.
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to ensure stakeholders are made aware of and understand the impact of proposed changes.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to ensure stakeholders are made aware of and understand the impact of proposed changes.
CC8.1
CC2.2-POF11
null
null
null
null
null
EDM05.01 EDM05.02 EDM05.03
null
CCC-05 CEK-06 TVM-09
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
GOVERN 5.0
null
null
null
null
CM-9
null
CM-9
CM-9
CM-9
null
null
CM-9
CM-9
null
null
null
CM-9
CM-9
3.4.10 3.4.13
CM-9
null
CM-9
null
CM-9
CM-9
NFO - CM-9
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
1.1.2.5
null
null
null
null
null
null
TM:SG4.SP2
null
null
null
null
null
null
null
null
CM-9
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
CM-9
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
CM-9
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
x
null
null
x
R-AC-1 R-AC-2 R-AM-1 R-AM-3 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-GV-2 R-GV-3 R-GV-6 R-GV-7 R-IR-1
R-AC-1
R-AC-2
null
null
R-AM-1
null
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
null
null
null
null
R-GV-2
R-GV-3
null
null
R-GV-6
R-GV-7
null
R-IR-1
null
null
null
null
null
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-10 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Change Management
Cybersecurity Functionality Verification
CHG-06
Mechanisms exist to verify the functionality of cybersecurity controls when anomalies are discovered.
- Information Assurance Program (IAP) - Security Test & Evaluation (STE)
null
Does the organization verify the functionality of cybersecurity controls when anomalies are discovered?
9
Protect
null
X
null
There is no evidence of a capability to verify the functionality of security controls when anomalies are discovered.
Change Management (CHG) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist: • IT personnel use an informal process to: o Govern changes to systems, applications and services to ensure their stability, reliability and predictability. o Notify stakeholders about proposed changes. • Logical Access Control (LAC) limits the ability of non-administrators from making unauthorized configuration changes to systems, applications and services. • Requests for Change (RFC) are submitted to IT personnel. • prior to changes being made, RFCs are informally reviewed for cybersecurity & data privacy ramifications. • Whenever possible, IT personnel test changes to business-critical systems/services/applications on a similarly configured IT environment as that of Production, prior to widespread production release of the change.
Change Management (CHG) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Change management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for change management. • Changes are tracked through a centralized technology solution to submit, review, approve and assign Requests for Change (RFC). • A Change Advisory Board (CAB), or similar function, exists to govern changes to systems, applications and services to ensure their stability, reliability and predictability. • A CAB, or similar function, reviews RFCs for cybersecurity & data privacy ramifications. • A CAB, or similar function, notifies stakeholders to ensure awareness of the impact of proposed changes. • Logical Access Control (LAC) limits the ability of non-administrators from making unauthorized configuration changes to systems, applications and services. • Cybersecurity controls are tested after a change is implemented to ensure cybersecurity controls are operating properly.
Change Management (CHG) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • An IT Asset Management (ITAM) function, or similar function, ensures compliance with requirements for asset management. • ITAM leverages a Configuration Management Database (CMDB), or similar tool, as the authoritative source of IT assets. • Logical Access Control (LAC) is governed to limit the ability of non-administrators from making configuration changes to systems, applications and services. • A formal Change Management (CM) program ensures that no unauthorized changes are made, that all changes are documented, that services are not disrupted and that resources are used efficiently. • The CM function has formally defined roles and associated responsibilities. • Changes are tracked through a centralized technology solution to submit, review, approve and assign Requests for Change (RFC). • A Change Advisory Board (CAB), or similar function: o Exists to govern changes to systems, applications and services to ensure their stability, reliability and predictability. o Reviews RFC for cybersecurity & data privacy ramifications. o Notifies stakeholders to ensure awareness of the impact of proposed changes. • IT personnel use dedicated development/test/staging environments to deploy and evaluate changes, wherever technically possible. • Up on implementing the RFC, the technician implementing a change tests to ensure anti-malware, logging and other cybersecurity & data privacy controls are still implemented and operating properly. • A structured set of controls are tested after a change is implemented to ensure cybersecurity controls are operating properly. • Results from testing changes are documented. • A vulnerability assessment is conducted on systems/applications/services to detect any new vulnerabilities that a change may have introduced.
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to verify the functionality of security controls when anomalies are discovered.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to verify the functionality of security controls when anomalies are discovered.
null
null
null
null
null
null
null
null
null
null
null
null
null
CR 3.3 (7.5.1) CR 3.3 (7.5.3(1))
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
CM-3(2) SI-6
null
CM-3(2)
CM-3(2) SI-6
CM-3(2) SI-6 SA-8(31)
null
null
CM-3(2)
CM-3(2) SI-6
SA-8(31)
null
null
CM-3(2)
CM-3(2) SI-6
3.4.10 3.4.13
null
null
null
null
null
null
null
null
null
A.03.04.03.d[01]
null
null
null
null
null
null
6.5.2 10.7.3 A3.2.2.1
null
6.5.2
null
null
6.5.2
null
6.5.2
6.5.2
null
G.2.6.1
null
null
null
null
null
null
TM:SG2.SP2
null
null
null
null
null
null
null
null
CM-3(2) SI-6
null
null
null
null
null
null
null
CM-3(2) SI-6
null
SI-6
CM-3(2) SI-6
null
CM-3(2) SI-6
null
SI-6
CM-3(2) SI-6
null
null
null
null
null
null
null
null
null
null
CM-3(2)
null
null
8-613
null
null
null
null
null
null
null
CM-3(2)
CM-3(2) SI-6
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
CM-3(2) SI-6
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
10.6 12.30 14.10
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
7.5.5
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
x
null
null
x
R-AC-2 R-AM-2 R-AM-3 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1
null
R-AC-2
null
null
null
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
null
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
null
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-10 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Change Management
Report Verification Results
CHG-06.1
Mechanisms exist to report the results of cybersecurity & data privacy function verification to appropriate organizational management.
- CimTrak Integrity Suite (https://www.cimcor.com/cimtrak/) - NNT Change Tracker (https://www.newnettechnologies.com)
null
Does the organization report the results of cybersecurity & data privacy function verification to appropriate organizational management?
5
Identify
null
X
null
There is no evidence of a capability to report the results of cybersecurity & data privacy function verification to appropriate organizational management.
SP-CMM1 is N/A, since a structured process is required to report the results of cybersecurity & data privacy function verification to appropriate organizational management.
Change Management (CHG) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Change management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for change management. • Changes are tracked through a centralized technology solution to submit, review, approve and assign Requests for Change (RFC). • A Change Advisory Board (CAB), or similar function, exists to govern changes to systems, applications and services to ensure their stability, reliability and predictability. • A CAB, or similar function, reviews RFCs for cybersecurity & data privacy ramifications. • A CAB, or similar function, notifies stakeholders to ensure awareness of the impact of proposed changes. • Logical Access Control (LAC) limits the ability of non-administrators from making unauthorized configuration changes to systems, applications and services. • Cybersecurity controls are tested after a change is implemented to ensure cybersecurity controls are operating properly. • Up on completing the RFC, the CAB reports the results of cybersecurity & data privacy function verification to senior management.
Change Management (CHG) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • An IT Asset Management (ITAM) function, or similar function, ensures compliance with requirements for asset management. • ITAM leverages a Configuration Management Database (CMDB), or similar tool, as the authoritative source of IT assets. • Logical Access Control (LAC) is governed to limit the ability of non-administrators from making configuration changes to systems, applications and services. • A formal Change Management (CM) program ensures that no unauthorized changes are made, that all changes are documented, that services are not disrupted and that resources are used efficiently. • The CM function has formally defined roles and associated responsibilities. • Changes are tracked through a centralized technology solution to submit, review, approve and assign Requests for Change (RFC). • A Change Advisory Board (CAB), or similar function: o Exists to govern changes to systems, applications and services to ensure their stability, reliability and predictability. o Reviews RFC for cybersecurity & data privacy ramifications. o Notifies stakeholders to ensure awareness of the impact of proposed changes. • IT personnel use dedicated development/test/staging environments to deploy and evaluate changes, wherever technically possible. • Up on completing the RFC, the CAB reports the results of cybersecurity & data privacy function verification to senior management.
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to report the results of cybersecurity & data privacy function verification to appropriate organizational management.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to report the results of cybersecurity & data privacy function verification to appropriate organizational management.
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
SI-6(3)
null
null
null
null
SI-6(3)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
A.03.04.03.d[01] A.03.04.03.d[02]
null
null
null
null
null
null
6.5.2
null
6.5.2
null
null
6.5.2
null
6.5.2
6.5.2
null
G.1.2
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
R-AM-3 R-GV-3 R-GV-5 R-GV-6 R-GV-7 R-GV-8 R-IR-3
null
null
null
null
null
null
R-AM-3
null
null
null
null
null
null
null
null
null
null
null
null
null
null
R-GV-3
null
R-GV-5
R-GV-6
R-GV-7
R-GV-8
null
null
R-IR-3
null
null
null
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-10 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Cloud Security
Cloud Services
CLD-01
Mechanisms exist to facilitate the implementation of cloud management controls to ensure cloud instances are secure and in-line with industry practices.
- Data Protection Impact Assessment (DPIA)
E-AST-06
Does the organization facilitate the implementation of cloud management controls to ensure cloud instances are secure and in-line with industry practices?
10
Protect
X
X
X
There is no evidence of a capability to facilitate the implementation of cloud management controls to ensure cloud instances are secure and in-line with industry practices.
Cloud Security (CLD) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Cloud-based technologies are governed no differently from on-premise network assets (e.g., cloud-based technology is viewed as an extension of the corporate network). • A Shared Responsibility Matrix (SRM), or similar Customer Responsibility Matrix (CRM), is documented for each Cloud Service Providers (CSPs) instance that takes into account differences between Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a Service (IaaS) methodologies.
Cloud Security (CLD) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Cloud security management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel: o Identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for cloud security management. o Use an informal process to govern cloud-specific cybersecurity & data privacy-specific tools. • A Shared Responsibility Matrix (SRM), or similar Customer Responsibility Matrix (CRM), is documented for each Cloud Service Providers (CSPs) instance that takes into account differences between Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a Service (IaaS) methodologies. • IT personnel have a documented architecture for cloud-based technologies to support cybersecurity and data protection requirements. • Cybersecurity and data privacy requirements are identified and documented for cloud-specific sensitive/regulated data processing, storing and/ or transmitting, including restrictions on data processing and storage locations. • Technologies exist to support: o A secure infrastructure, including a managed security zone to house cybersecurity & data privacy tools. o A standardized virtualization format. o Cloud access points, including a managed security zone with o Data handling & portability, including a managed security zone to house cybersecurity & data privacy tools o Integrity of multi-tenant CSP assets, including a managed security zone to house cybersecurity & data privacy tools o Integrity of VM images, including a managed security zone to house cybersecurity & data privacy tools. o Processing and storage of service location, including a managed security zone to house cybersecurity & data privacy tools.
Cloud Security (CLD) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • The Chief Information Security Officer (CISO), or similar function, analyzes the organization’s business strategy to determine prioritized and authoritative guidance for cloud security practices. • The CISO, or similar function, develops a security-focused Concept of Operations (CONOPS) that documents management, operational and technical measures to apply defense-in-depth techniques across the organization to ensure that cloud security is incorporated. • A Governance, Risk & Compliance (GRC) function, or similar function, provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data to ensure that compliance requirements for cloud security are identified and documented. • A Chief Information Officer (CIO), or similar function, defines the authoritative architecture for use with on-premise, cloud-native and hybrid models, providing governance oversight for operations planning, deployment and maintenance of cloud-based technology assets supporting cybersecurity and data protection requirements. • A Chief Technology Officer (CTO), or similar function, aligns with the CIO’s architectural model to evaluate and implement new cloud-based technologies. • A steering committee is formally established to provide executive oversight of the cybersecurity & data privacy program, including cloud security, as well as establish a clear and authoritative accountability structure for cloud security operations. • Roles and associated responsibilities for governing cloud instances, including provisioning, maintaining and deprovisioning, are formally assigned. • A Shared Responsibility Matrix (SRM), or similar Customer Responsibility Matrix (CRM), is documented for each Cloud Service Providers (CSPs) instance that takes into account differences between Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a Service (IaaS) methodologies. • IT architects, in conjunction with cybersecurity architects: o Ensure the cloud security architecture supports the organization's technology strategy to securely design, configure and maintain cloud employments. o Ensure multi-tenant CSP assets (physical and virtual) are designed and governed such that provider and customer (tenant) user access is appropriately segmented from other tenant users. o Ensure CSPs use secure protocols for the import, export and management of data in cloud-based services. o Implement a dedicated subnet to host security-specific technologies on all cloud instances, where technically feasible. • A Change Advisory Board (CAB), or similar function, governs changes to cloud-based systems, applications and services to ensure their stability, reliability and predictability. • CAB review processes identify and prevent use of unapproved CSPs. • A dedicated IT infrastructure team, or similar function, enables the implementation of cloud management controls to ensure cloud instances are both secure and compliant, leveraging industry-recognized secure practices that are CSP-specific. • Cybersecurity and data privacy requirements are identified and documented for each CSP instance to address sensitive/regulated data processing, storing and/ or transmitting and provide restrictions on data processing and storage locations. • A Data Protection Impact Assessment (DPIA) is used to help ensure the protection of sensitive/regulated data processed, stored or transmitted on external systems.
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to facilitate the implementation of cloud management controls to ensure cloud instances are secure and in-line with industry practices.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to facilitate the implementation of cloud management controls to ensure cloud instances are secure and in-line with industry practices.
null
null
null
null
null
null
null
null
null
IPY-01 IPY-04 IVS-06 IVS-07 IVS-08 STA-05 STA-06
CLS-01 CLS-05 CLS-12
null
null
null
null
null
null
null
null
5.23
7.2.2 CLD.12.1.5 CLD.12.4.5
null
null
null
null
null
null
TS-1.9
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
NFO – PL-8
null
null
null
null
null
null
null
null
2.6 12.8.1
1.2.1 12.8.1
12.8.1
1.2.1 12.8.1
12.8.1
12.8.1
12.8.1
12.8.1
1.2.1 12.8.1
1.2.1 12.8.1
12.8.1
J.1
null
5.3.4
null
null
null
null
null
null
5.10.1.5
null
null
null
AC.L1-b.1.iv
null
null
null
null
null
null
52.204-21(b)(1)(iv)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
4.L.A
2.E.6.1 3.3.1
null
null
null
null
null
null
null
null
5.8 5.12
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Art 32.1 Art 32.2
null
null
null
Sec 14 Sec 15
Art 16
null
null
null
null
null
null
COS-01 COS-02
null
null
null
11.2
null
null
null
null
null
null
null
null
null
null
null
4-2
TPC-43
3.3.4 3.3.8 3.4.3
4-2-1 4-2-2 4-2-3 4-2-3-2 4-2-4
null
null
null
Sec 19.1 Sec 19.2
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
1529 1437 1579 1580 1581
null
null
null
null
null
null
null
null
null
null
4.1 4.2 7.2.2.19.PB 8.1.5.P 8.1.2.7.PB 9.5.P 9.5.1.P 9.5.2.P 9.5.2.1.PB 12.4.5.P 13.1.4.P 15.1.1.16.B
null
18.1
22.1.20.C.01 22.1.20.C.02 22.1.20.C.03 22.1.20.C.04 22.1.20.C.05 22.1.21.C.01 22.1.21.C.02 22.1.21.C.03 22.1.21.C.04 22.1.21.C.05 22.1.21.C.06 22.1.21.C.07 22.1.24.C.01 22.1.24.C.02 22.1.24.C.03 22.1.24.C.04 22.1.25.C.01 22.1.25.C.02 22.1.26.C.01 22.1.26.C.02 22.1.26.C.03 22.1.27.C.01 23.1.54.C.01 23.1.54.C.02 23.2.19.C.01
null
null
null
null
null
null
null
null
null
null
5.11
null
null
null
null
null
null
null
null
null
null
null
null
null
x
FAR 52.204-21
x
null
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-1 R-AM-2 R-AM-3 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1
R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
null
NT-2 NT-3 NT-4 NT-5 NT-6 NT-7 NT-8 NT-9 NT-10 NT-11 NT-12 NT-13 NT-14 MT-1 MT-2 MT-3 MT-4 MT-5 MT-6 MT-7 MT-8 MT-9 MT-10 MT-11 MT-12 MT-13 MT-14 MT-15 MT-16
null
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15
MT-16
null
Cloud Security
Cloud Infrastructure Onboarding
CLD-01.1
Mechanisms exist to ensure cloud services are designed and configured so systems, applications and processes are secured in accordance with applicable organizational standards, as well as statutory, regulatory and contractual obligations.
null
null
Does the organization ensure cloud services are designed and configured so systems, applications and processes are secured in accordance with applicable organizational standards, as well as statutory, regulatory and contractual obligations?
9
Protect
X
X
null
There is no evidence of a capability to ensure cloud services are designed and configured so systems, applications and processes are secured in accordance with applicable organizational standards, as well as statutory, regulatory and contractual obligations.
SP-CMM1 is N/A, since a structured process is required to ensure cloud services are designed and configured so systems, applications and processes are secured in accordance with applicable organizational standards, as well as statutory, regulatory and contractual obligations.
SP-CMM2 is N/A, since a well-defined process is required to ensure cloud services are designed and configured so systems, applications and processes are secured in accordance with applicable organizational standards, as well as statutory, regulatory and contractual obligations.
Cloud Security (CLD) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Roles and associated responsibilities for governing cloud instances, including provisioning, maintaining and deprovisioning, are formally assigned. • A Shared Responsibility Matrix (SRM), or similar Customer Responsibility Matrix (CRM), is documented for each Cloud Service Providers (CSPs) instance that takes into account differences between Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a Service (IaaS) methodologies. • IT architects, in conjunction with cybersecurity architects: o Ensure the cloud security architecture supports the organization's technology strategy to securely design, configure and maintain cloud employments. o Ensure multi-tenant CSP assets (physical and virtual) are designed and governed such that provider and customer (tenant) user access is appropriately segmented from other tenant users. o Ensure CSPs use secure protocols for the import, export and management of data in cloud-based services. o Implement a dedicated subnet to host security-specific technologies on all cloud instances, where technically feasible. • A Change Advisory Board (CAB), or similar function: o Governs changes to cloud-based systems, applications and services to ensure their stability, reliability and predictability. o Reviews processes to identify and prevent use of unapproved CSPs. • A dedicated IT infrastructure team, or similar function, enables the implementation of cloud management controls to ensure cloud instances are both secure and compliant, leveraging industry-recognized secure practices that are CSP-specific. • Cybersecurity and data privacy requirements are identified and documented for each CSP instance to address sensitive/regulated data processing, storing and/ or transmitting and provide restrictions on data processing and storage locations. • A Data Protection Impact Assessment (DPIA) is used to help ensure the protection of sensitive/regulated data processed, stored or transmitted on external systems. • Roles and associated responsibilities for governing cloud instances, including provisioning, maintaining and deprovisioning, are formally assigned to qualified individuals. • IT architects, in conjunction with cybersecurity architects, ensure multi-tenant CSP assets (physical and virtual) are designed and governed such that provider and customer (tenant) user access is appropriately segmented from other tenant users. • IT architects, in conjunction with cybersecurity architects, ensure CSPs use secure protocols for the import, export and management of data in cloud-based services. • IT architects, in conjunction with cybersecurity architects, implement a dedicated subnet to host security-specific technologies on all cloud instances, where technically feasible. • IT infrastructure personnel and Data Protection Officers (DPOs) work with business stakeholders to identify business-critical systems and services, as well as associated sensitive/regulated data, including Personal Data (PD). • The DPO function oversees the storage, processing and transmission of PD in CSPs. • An IT Asset Management (ITAM) function, or similar function, governs cloud-based assets leveraging an established Configuration Management Database (CMDB), or similar tool, as the authoritative source of IT assets to provide oversight of purchasing, updating, repairing and disposing of cloud-based assets. • Formal Change Management (CM) program governs cloud-based systems, applications and services and ensures that no unauthorized changes are made, that all changes are documented, that services are not unnecessarily disrupted and that resources are used efficiently. • An IT infrastructure team, or similar function, enables the implementation of a Content Delivery Network (CDN) by restricting access to the origin server's IP address to the CDN and an authorized management network.
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to ensure cloud services are designed and configured so systems, applications and processes are secured in accordance with applicable organizational standards, as well as statutory, regulatory and contractual obligations.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to ensure cloud services are designed and configured so systems, applications and processes are secured in accordance with applicable organizational standards, as well as statutory, regulatory and contractual obligations.
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
TPC-43
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
23.4.9.C.01 23.4.9.C.02 23.4.9.C.03 23.4.10.C.01 23.5.11.C.01 23.5.12.C.01 23.5.12.C.02
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-1 R-AM-2 R-AM-3 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-GV-8 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1
R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
null
MT-1 MT-2 MT-3 MT-4 MT-5 MT-6 MT-7 MT-8 MT-9 MT-10 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
null
null
null
null
null
null
null
null
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Cloud Security
Cloud Infrastructure Offboarding
CLD-01.2
Mechanisms exist to ensure cloud services are decommissioned so that data is securely transitioned to new systems or archived in accordance with applicable organizational standards, as well as statutory, regulatory and contractual obligations.
null
null
Does the organization ensure cloud services are decommissioned so that data is securely transitioned to new systems or archived in accordance with applicable organizational standards, as well as statutory, regulatory and contractual obligations?
9
Protect
X
X
null
There is no evidence of a capability to ensure cloud services are decommissioned so that data is securely transitioned to new systems or archived in accordance with applicable organizational standards, as well as statutory, regulatory and contractual obligations.
SP-CMM1 is N/A, since a structured process is required to ensure cloud services are decommissioned so that data is securely transitioned to new systems or archived in accordance with applicable organizational standards, as well as statutory, regulatory and contractual obligations.
SP-CMM2 is N/A, since a well-defined process is required to ensure cloud services are decommissioned so that data is securely transitioned to new systems or archived in accordance with applicable organizational standards, as well as statutory, regulatory and contractual obligations.
Cloud Security (CLD) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Roles and associated responsibilities for governing cloud instances, including provisioning, maintaining and deprovisioning, are formally assigned. • A Shared Responsibility Matrix (SRM), or similar Customer Responsibility Matrix (CRM), is documented for each Cloud Service Providers (CSPs) instance that takes into account differences between Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a Service (IaaS) methodologies. • IT architects, in conjunction with cybersecurity architects: o Ensure the cloud security architecture supports the organization's technology strategy to securely design, configure and maintain cloud employments. o Ensure multi-tenant CSP assets (physical and virtual) are designed and governed such that provider and customer (tenant) user access is appropriately segmented from other tenant users. o Ensure CSPs use secure protocols for the import, export and management of data in cloud-based services. o Implement a dedicated subnet to host security-specific technologies on all cloud instances, where technically feasible. • A Change Advisory Board (CAB), or similar function: o Governs changes to cloud-based systems, applications and services to ensure their stability, reliability and predictability. o Reviews processes to identify and prevent use of unapproved CSPs. • A dedicated IT infrastructure team, or similar function, enables the implementation of cloud management controls to ensure cloud instances are both secure and compliant, leveraging industry-recognized secure practices that are CSP-specific. • Cybersecurity and data privacy requirements are identified and documented for each CSP instance to address sensitive/regulated data processing, storing and/ or transmitting and provide restrictions on data processing and storage locations. • A Data Protection Impact Assessment (DPIA) is used to help ensure the protection of sensitive/regulated data processed, stored or transmitted on external systems. • Roles and associated responsibilities for governing cloud instances, including provisioning, maintaining and deprovisioning, are formally assigned to qualified individuals.
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to ensure cloud services are decommissioned so that data is securely transitioned to new systems or archived in accordance with applicable organizational standards, as well as statutory, regulatory and contractual obligations.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to ensure cloud services are decommissioned so that data is securely transitioned to new systems or archived in accordance with applicable organizational standards, as well as statutory, regulatory and contractual obligations.
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
23.4.13.C.01 23.4.13.C.02 23.4.13.C.03
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
R-AM-1 R-AM-3 R-AM-2 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-GV-8 R-IR-1 R-IR-2 R-IR-4 R-SA-1
null
null
null
null
null
R-AM-1
R-AM-3
R-AM-2
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
null
R-IR-4
R-SA-1
MT-1 MT-2 MT-3 MT-4 MT-5 MT-6 MT-7 MT-8 MT-9 MT-10 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
null
null
null
null
null
null
null
null
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Cloud Security
Cloud Security Architecture
CLD-02
Mechanisms exist to ensure the cloud security architecture supports the organization's technology strategy to securely design, configure and maintain cloud employments.
- Architectural review board - System Security Plan (SSP) - Security architecture roadmaps
E-TDA-09
Does the organization ensure the cloud security architecture supports the organization's technology strategy to securely design, configure and maintain cloud employments?
8
Protect
null
X
null
There is no evidence of a capability to ensure the cloud security architecture supports the organization's technology strategy to securely design, configure and maintain cloud employments.
Cloud Security (CLD) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Cloud-based technologies are governed no differently from on-premise network assets (e.g., cloud-based technology is viewed as an extension of the corporate network). • A Shared Responsibility Matrix (SRM), or similar Customer Responsibility Matrix (CRM), is documented for each Cloud Service Providers (CSPs) instance that takes into account differences between Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a Service (IaaS) methodologies.
Cloud Security (CLD) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Cloud security management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel: o Identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for cloud security management. o Use an informal process to govern cloud-specific cybersecurity & data privacy-specific tools. • A Shared Responsibility Matrix (SRM), or similar Customer Responsibility Matrix (CRM), is documented for each Cloud Service Providers (CSPs) instance that takes into account differences between Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a Service (IaaS) methodologies. • IT personnel have a documented architecture for cloud-based technologies to support cybersecurity and data protection requirements. • Cybersecurity and data privacy requirements are identified and documented for cloud-specific sensitive/regulated data processing, storing and/ or transmitting, including restrictions on data processing and storage locations. • Technologies exist to support: o A secure infrastructure, including a managed security zone to house cybersecurity & data privacy tools. o A standardized virtualization format. o Cloud access points, including a managed security zone with o Data handling & portability, including a managed security zone to house cybersecurity & data privacy tools o Integrity of multi-tenant CSP assets, including a managed security zone to house cybersecurity & data privacy tools o Integrity of VM images, including a managed security zone to house cybersecurity & data privacy tools. o Processing and storage of service location, including a managed security zone to house cybersecurity & data privacy tools.
Cloud Security (CLD) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Roles and associated responsibilities for governing cloud instances, including provisioning, maintaining and deprovisioning, are formally assigned. • A Shared Responsibility Matrix (SRM), or similar Customer Responsibility Matrix (CRM), is documented for each Cloud Service Providers (CSPs) instance that takes into account differences between Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a Service (IaaS) methodologies. • IT architects, in conjunction with cybersecurity architects: o Ensure the cloud security architecture supports the organization's technology strategy to securely design, configure and maintain cloud employments. o Ensure multi-tenant CSP assets (physical and virtual) are designed and governed such that provider and customer (tenant) user access is appropriately segmented from other tenant users. o Ensure CSPs use secure protocols for the import, export and management of data in cloud-based services. o Implement a dedicated subnet to host security-specific technologies on all cloud instances, where technically feasible. • A Change Advisory Board (CAB), or similar function: o Governs changes to cloud-based systems, applications and services to ensure their stability, reliability and predictability. o Reviews processes to identify and prevent use of unapproved CSPs. • A dedicated IT infrastructure team, or similar function, enables the implementation of cloud management controls to ensure cloud instances are both secure and compliant, leveraging industry-recognized secure practices that are CSP-specific. • Cybersecurity and data privacy requirements are identified and documented for each CSP instance to address sensitive/regulated data processing, storing and/ or transmitting and provide restrictions on data processing and storage locations. • A Data Protection Impact Assessment (DPIA) is used to help ensure the protection of sensitive/regulated data processed, stored or transmitted on external systems. • IT architects, in conjunction with cybersecurity architects, ensure multi-tenant CSP assets (physical and virtual) are designed and governed such that provider and customer (tenant) user access is appropriately segmented from other tenant users. • IT architects, in conjunction with cybersecurity architects, ensure CSPs use secure protocols for the import, export and management of data in cloud-based services. • IT architects, in conjunction with cybersecurity architects, implement a dedicated subnet to host security-specific technologies on all cloud instances, where technically feasible. • IT infrastructure personnel and Data Protection Officers (DPOs) work with business stakeholders to identify business-critical systems and services, as well as associated sensitive/regulated data, including Personal Data (PD). • The DPO function oversees the storage, processing and transmission of PD in CSPs. • An IT Asset Management (ITAM) function, or similar function, governs cloud-based assets leveraging an established Configuration Management Database (CMDB), or similar tool, as the authoritative source of IT assets to provide oversight of purchasing, updating, repairing and disposing of cloud-based assets. • Formal Change Management (CM) program governs cloud-based systems, applications and services and ensures that no unauthorized changes are made, that all changes are documented, that services are not unnecessarily disrupted and that resources are used efficiently. • An IT infrastructure team, or similar function, enables the implementation of a Content Delivery Network (CDN) by restricting access to the origin server's IP address to the CDN and an authorized management network.
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to ensure the cloud security architecture supports the organization's technology strategy to securely design, configure and maintain cloud employments.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to ensure the cloud security architecture supports the organization's technology strategy to securely design, configure and maintain cloud employments.
null
null
null
null
null
null
null
null
null
IVS-06 IVS-07 IVS-08
CLS-01 CLS-05 CLS-12
null
null
null
null
null
null
null
null
5.23
CLD.9.5.1 CLD.13.1.4
null
null
null
null
null
null
TS-1.9 TS-2.12
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
NFO – PL-8
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
N.1
null
5.3.4
null
null
null
null
null
null
null
null
null
null
AC.L1-b.1.iv
null
null
null
null
null
null
52.204-21(b)(1)(iv)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
4.L.A
2.E.6.1 3.3.1
null
null
null
null
null
null
null
null
5.12
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
COS-01 COS-02
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
3.3.4 3.3.8 3.4.3
4-2-3-2
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
8.1.2.7.PB 9.5.P 9.5.1.P 9.5.2.P 9.5.2.1.PB 12.4.5.P 13.1.4.P
null
null
22.1.23.C.01 22.1.23.C.02 22.1.23.C.03 23.1.54.C.01 23.1.54.C.02 23.1.56.C.01 23.2.20.C.01
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
x
FAR 52.204-21 Lockton
null
null
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-1 R-AM-2 R-AM-3 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1
R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
null
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-10 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Cloud Security
Cloud Infrastructure Security Subnet
CLD-03
Mechanisms exist to host security-specific technologies in a dedicated subnet.
- Security management subnet
null
Does the organization host security-specific technologies in a dedicated subnet?
6
Protect
null
X
X
There is no evidence of a capability to host security-specific technologies in a dedicated subnet.
Cloud Security (CLD) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Cloud-based technologies are governed no differently from on-premise network assets (e.g., cloud-based technology is viewed as an extension of the corporate network). • A Shared Responsibility Matrix (SRM), or similar Customer Responsibility Matrix (CRM), is documented for each Cloud Service Providers (CSPs) instance that takes into account differences between Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a Service (IaaS) methodologies.
Cloud Security (CLD) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Cloud security management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel: o Identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for cloud security management. o Use an informal process to govern cloud-specific cybersecurity & data privacy-specific tools. • A Shared Responsibility Matrix (SRM), or similar Customer Responsibility Matrix (CRM), is documented for each Cloud Service Providers (CSPs) instance that takes into account differences between Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a Service (IaaS) methodologies. • IT personnel have a documented architecture for cloud-based technologies to support cybersecurity and data protection requirements. • Cybersecurity and data privacy requirements are identified and documented for cloud-specific sensitive/regulated data processing, storing and/ or transmitting, including restrictions on data processing and storage locations. • Network security requirements for managed subnets are identified and documented.
Cloud Security (CLD) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Roles and associated responsibilities for governing cloud instances, including provisioning, maintaining and deprovisioning, are formally assigned. • A Shared Responsibility Matrix (SRM), or similar Customer Responsibility Matrix (CRM), is documented for each Cloud Service Providers (CSPs) instance that takes into account differences between Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a Service (IaaS) methodologies. • IT architects, in conjunction with cybersecurity architects: o Ensure the cloud security architecture supports the organization's technology strategy to securely design, configure and maintain cloud employments. o Ensure multi-tenant CSP assets (physical and virtual) are designed and governed such that provider and customer (tenant) user access is appropriately segmented from other tenant users. o Ensure CSPs use secure protocols for the import, export and management of data in cloud-based services. o Implement a dedicated subnet to host security-specific technologies on all cloud instances, where technically feasible. • A Change Advisory Board (CAB), or similar function: o Governs changes to cloud-based systems, applications and services to ensure their stability, reliability and predictability. o Reviews processes to identify and prevent use of unapproved CSPs. • A dedicated IT infrastructure team, or similar function, enables the implementation of cloud management controls to ensure cloud instances are both secure and compliant, leveraging industry-recognized secure practices that are CSP-specific. • Cybersecurity and data privacy requirements are identified and documented for each CSP instance to address sensitive/regulated data processing, storing and/ or transmitting and provide restrictions on data processing and storage locations. • A Data Protection Impact Assessment (DPIA) is used to help ensure the protection of sensitive/regulated data processed, stored or transmitted on external systems. • Network security requirements for managed subnets are identified and documented.
Cloud Security (CLD) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to host security-specific technologies in a dedicated subnet.
null
null
null
null
null
null
null
null
null
IVS-06 IVS-08
CLS-09
null
null
null
null
null
null
null
null
null
CLD.9.5.1
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
SC-7(29)
null
null
null
null
SC-7(29)
null
SC-7(29)
SC-7(29)
SC-7(29)
null
null
null
null
null
null
null
3.13.2 NFO – PL-8
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
H.1.1.3
null
null
null
null
null
null
null
null
null
null
SC.L2-3.13.2
SC.L2-3.13.2
AC.L1-b.1.iv
SC.L2-3.13.2
SC.L2-3.13.2
null
null
null
null
52.204-21(b)(1)(iv)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
4.L.A
null
null
null
null
null
6.9
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
COS-01 COS-02 COS-05
null
null
null
9.2
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
1385 1750
null
null
null
null
null
null
null
null
null
null
12.4.5.P 13.1.4.P
null
null
22.1.24.C.02
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
x
FAR 52.204-21 Lockton
null
x
R-AM-2 R-AM-3 R-BC-1 R-BC-2 R-GV-2 R-GV-4 R-GV-5
null
null
null
null
null
R-AM-2
R-AM-3
R-BC-1
R-BC-2
null
null
null
null
null
null
null
null
null
null
null
R-GV-2
null
R-GV-4
R-GV-5
null
null
null
null
null
null
null
null
null
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-10 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15
null
- Added NIST 800-53 R5 mapping for SC-7(29)
Cloud Security
Application & Program Interface (API) Security
CLD-04
Mechanisms exist to ensure support for secure interoperability between components with Application & Program Interfaces (APIs).
- Use only open and published APIs
null
Does the organization ensure support for secure interoperability between components with Application & Program Interfaces (APIs)?
9
Protect
null
X
X
There is no evidence of a capability to ensure support for secure interoperability between components with Application & Program Interfaces (APIs).
SP-CMM1 is N/A, since a structured process is required to ensure support for secure interoperability between components with Application & Program Interfaces (APIs).
Cloud Security (CLD) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Cloud security management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel: o Identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for cloud security management. o Use an informal process to govern cloud-specific cybersecurity & data privacy-specific tools. • A Shared Responsibility Matrix (SRM), or similar Customer Responsibility Matrix (CRM), is documented for each Cloud Service Providers (CSPs) instance that takes into account differences between Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a Service (IaaS) methodologies. • IT personnel have a documented architecture for cloud-based technologies to support cybersecurity and data protection requirements. • Cybersecurity and data privacy requirements are identified and documented for cloud-specific sensitive/regulated data processing, storing and/ or transmitting, including restrictions on data processing and storage locations. Cloud requirements for interoperability between components (APIs) are identified and documented.
Cloud Security (CLD) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Roles and associated responsibilities for governing cloud instances, including provisioning, maintaining and deprovisioning, are formally assigned. • A Shared Responsibility Matrix (SRM), or similar Customer Responsibility Matrix (CRM), is documented for each Cloud Service Providers (CSPs) instance that takes into account differences between Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a Service (IaaS) methodologies. • IT architects, in conjunction with cybersecurity architects: o Ensure the cloud security architecture supports the organization's technology strategy to securely design, configure and maintain cloud employments. o Ensure multi-tenant CSP assets (physical and virtual) are designed and governed such that provider and customer (tenant) user access is appropriately segmented from other tenant users. o Ensure CSPs use secure protocols for the import, export and management of data in cloud-based services. o Implement a dedicated subnet to host security-specific technologies on all cloud instances, where technically feasible. • A Change Advisory Board (CAB), or similar function: o Governs changes to cloud-based systems, applications and services to ensure their stability, reliability and predictability. o Reviews processes to identify and prevent use of unapproved CSPs. • A dedicated IT infrastructure team, or similar function, enables the implementation of cloud management controls to ensure cloud instances are both secure and compliant, leveraging industry-recognized secure practices that are CSP-specific. • Cybersecurity and data privacy requirements are identified and documented for each CSP instance to address sensitive/regulated data processing, storing and/ or transmitting and provide restrictions on data processing and storage locations. • A Data Protection Impact Assessment (DPIA) is used to help ensure the protection of sensitive/regulated data processed, stored or transmitted on external systems. Cloud requirements for interoperability between components (APIs) are identified and documented.
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to ensure support for secure interoperability between components with Application & Program Interfaces (APIs).
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to ensure support for secure interoperability between components with Application & Program Interfaces (APIs).
null
null
null
null
null
null
null
null
null
IPY-01 IPY-02 IPY-03
CLS-07 CLS-12 CLS-13
null
null
null
null
null
null
null
null
5.23 8.26
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
1.1.4
null
null
null
null
null
null
null
null
null
null
null
null
AC.L1-b.1.iv
null
null
null
null
null
null
52.204-21(b)(1)(iv)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
4.L.A
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
PI-01
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
1-3-2-3
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
1817 1818
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
FAR 52.204-21
null
null
R-AC-4 R-AM-2 R-AM-3 R-BC-1 R-BC-2 R-BC-4 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-4 R-GV-5
null
null
null
R-AC-4
null
R-AM-2
R-AM-3
R-BC-1
R-BC-2
null
R-BC-4
null
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
null
R-GV-4
R-GV-5
null
null
null
null
null
null
null
null
null
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-10 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Cloud Security
Virtual Machine Images
CLD-05
Mechanisms exist to ensure the integrity of virtual machine images at all times.
- CimTrak Integrity Suite (https://www.cimcor.com/cimtrak/) - File Integrity Monitoring (FIM) - Docker (https://www.docker.com/) - NNT Change Tracker (https://www.newnettechnologies.com)
null
Does the organization ensure the integrity of virtual machine images at all times?
8
Protect
null
null
X
There is no evidence of a capability to ensure the integrity of virtual machine images at all times.
Cloud Security (CLD) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Cloud-based technologies are governed no differently from on-premise network assets (e.g., cloud-based technology is viewed as an extension of the corporate network). • A Shared Responsibility Matrix (SRM), or similar Customer Responsibility Matrix (CRM), is documented for each Cloud Service Providers (CSPs) instance that takes into account differences between Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a Service (IaaS) methodologies.
Cloud Security (CLD) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Cloud security management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel: o Identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for cloud security management. o Use an informal process to govern cloud-specific cybersecurity & data privacy-specific tools. • A Shared Responsibility Matrix (SRM), or similar Customer Responsibility Matrix (CRM), is documented for each Cloud Service Providers (CSPs) instance that takes into account differences between Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a Service (IaaS) methodologies. • IT personnel have a documented architecture for cloud-based technologies to support cybersecurity and data protection requirements. • Cybersecurity and data privacy requirements are identified and documented for cloud-specific sensitive/regulated data processing, storing and/ or transmitting, including restrictions on data processing and storage locations.
Cloud Security (CLD) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Roles and associated responsibilities for governing cloud instances, including provisioning, maintaining and deprovisioning, are formally assigned. • A Shared Responsibility Matrix (SRM), or similar Customer Responsibility Matrix (CRM), is documented for each Cloud Service Providers (CSPs) instance that takes into account differences between Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a Service (IaaS) methodologies. • IT architects, in conjunction with cybersecurity architects: o Ensure the cloud security architecture supports the organization's technology strategy to securely design, configure and maintain cloud employments. o Ensure multi-tenant CSP assets (physical and virtual) are designed and governed such that provider and customer (tenant) user access is appropriately segmented from other tenant users. o Ensure CSPs use secure protocols for the import, export and management of data in cloud-based services. o Implement a dedicated subnet to host security-specific technologies on all cloud instances, where technically feasible. • A Change Advisory Board (CAB), or similar function: o Governs changes to cloud-based systems, applications and services to ensure their stability, reliability and predictability. o Reviews processes to identify and prevent use of unapproved CSPs. • A dedicated IT infrastructure team, or similar function, enables the implementation of cloud management controls to ensure cloud instances are both secure and compliant, leveraging industry-recognized secure practices that are CSP-specific. • Cybersecurity and data privacy requirements are identified and documented for each CSP instance to address sensitive/regulated data processing, storing and/ or transmitting and provide restrictions on data processing and storage locations. • A Data Protection Impact Assessment (DPIA) is used to help ensure the protection of sensitive/regulated data processed, stored or transmitted on external systems. • Cloud requirements for interoperability implemented through standardized virtualization formats are identified and documented. • The IT Asset Management (ITAM) function uses technical mechanisms to ensure the integrity of virtual machine images throughout the asset lifecycle.
Cloud Security (CLD) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to ensure the integrity of virtual machine images at all times.
null
null
null
null
null
null
null
null
null
IVS-04
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
V.1.5
null
null
null
null
null
null
null
null
5.10.3
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
2.L.F
3.3.7
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
PSS-11
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
x
null
null
null
R-AM-3 R-BC-1 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-GV-1 R-IR-1 R-IR-4
null
null
null
null
null
null
R-AM-3
R-BC-1
null
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
null
null
R-GV-1
null
null
null
null
null
null
null
R-IR-1
null
null
R-IR-4
null
null
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-10 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Cloud Security
Multi-Tenant Environments
CLD-06
Mechanisms exist to ensure multi-tenant owned or managed assets (physical and virtual) are designed and governed such that provider and customer (tenant) user access is appropriately segmented from other tenant users.
- Security architecture review - Defined processes to segment at the network, application, databases layers
null
Does the organization ensure multi-tenant owned or managed assets (physical and virtual) are designed and governed such that provider and customer (tenant) user access is appropriately segmented from other tenant users?
9
Protect
null
X
X
There is no evidence of a capability to ensure multi-tenant owned or managed assets (physical and virtual) are designed and governed such that provider and customer (tenant) user access is appropriately segmented from other tenant users.
Cloud Security (CLD) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Cloud-based technologies are governed no differently from on-premise network assets (e.g., cloud-based technology is viewed as an extension of the corporate network). • A Shared Responsibility Matrix (SRM), or similar Customer Responsibility Matrix (CRM), is documented for each Cloud Service Providers (CSPs) instance that takes into account differences between Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a Service (IaaS) methodologies.
Cloud Security (CLD) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Cloud security management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel: o Identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for cloud security management. o Use an informal process to govern cloud-specific cybersecurity & data privacy-specific tools. • A Shared Responsibility Matrix (SRM), or similar Customer Responsibility Matrix (CRM), is documented for each Cloud Service Providers (CSPs) instance that takes into account differences between Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a Service (IaaS) methodologies. • IT personnel have a documented architecture for cloud-based technologies to support cybersecurity and data protection requirements. • Cybersecurity and data privacy requirements are identified and documented for cloud-specific sensitive/regulated data processing, storing and/ or transmitting, including restrictions on data processing and storage locations. • Cloud instances of virtual machines are treated no differently from on-premise VM assets, where no dedicated cloud governance process exists. • Cybersecurity and data privacy requirements for virtual machines are identified and documented. • IT personnel use an informal process to govern VM images. • Cybersecurity and data privacy requirements for multi-tenant CSP environments are identified and documented. • Contracts ensure multi-tenant CSPs: o Facilitate prompt response to suspected or confirmed security incidents and vulnerabilities, including timely notification to affected customers. o Generate security event logs for its clients. o Facilitate prompt forensic investigations in the event of a suspected or confirmed security incident.
Cloud Security (CLD) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Roles and associated responsibilities for governing cloud instances, including provisioning, maintaining and deprovisioning, are formally assigned. • A Shared Responsibility Matrix (SRM), or similar Customer Responsibility Matrix (CRM), is documented for each Cloud Service Providers (CSPs) instance that takes into account differences between Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a Service (IaaS) methodologies. • IT architects, in conjunction with cybersecurity architects: o Ensure the cloud security architecture supports the organization's technology strategy to securely design, configure and maintain cloud employments. o Ensure multi-tenant CSP assets (physical and virtual) are designed and governed such that provider and customer (tenant) user access is appropriately segmented from other tenant users. o Ensure CSPs use secure protocols for the import, export and management of data in cloud-based services. o Implement a dedicated subnet to host security-specific technologies on all cloud instances, where technically feasible. • A Change Advisory Board (CAB), or similar function: o Governs changes to cloud-based systems, applications and services to ensure their stability, reliability and predictability. o Reviews processes to identify and prevent use of unapproved CSPs. • A dedicated IT infrastructure team, or similar function, enables the implementation of cloud management controls to ensure cloud instances are both secure and compliant, leveraging industry-recognized secure practices that are CSP-specific. • Cybersecurity and data privacy requirements are identified and documented for each CSP instance to address sensitive/regulated data processing, storing and/ or transmitting and provide restrictions on data processing and storage locations. • A Data Protection Impact Assessment (DPIA) is used to help ensure the protection of sensitive/regulated data processed, stored or transmitted on external systems. • Contracts ensure multi-tenant CSPs facilitate prompt forensic investigations in the event of a suspected or confirmed security incident. • Contracts ensure multi-tenant CSPs facilitate prompt response to suspected or confirmed security incidents and vulnerabilities, including timely notification to affected customers. • Contracts ensure multi-tenant CSPs generate security event logs for its clients.
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to ensure multi-tenant owned or managed assets (physical and virtual) are designed and governed such that provider and customer (tenant) user access is appropriately segmented from other tenant users.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to ensure multi-tenant owned or managed assets (physical and virtual) are designed and governed such that provider and customer (tenant) user access is appropriately segmented from other tenant users.
null
null
null
null
null
null
null
null
null
IVS-06
null
null
null
null
null
null
null
null
null
5.23
CLD.9.5.1
null
null
null
null
null
null
TS-1.9 TS-2.12
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
A1.1 A1.1.1 A1.1.2 A1.1.3 A1.1.4
null
null
null
null
null
null
null
A1.1.1 A1.1.2 A1.1.3 A1.1.4
null
N.1
null
5.3.4
null
null
null
null
null
null
null
null
null
null
AC.L1-b.1.iv
null
null
null
null
null
null
52.204-21(b)(1)(iv)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
4.L.A
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
OPS-24
null
null
null
10.1 11.3
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
1529
null
null
null
null
null
null
null
null
null
null
9.5.P 9.5.1.P 9.5.2.P 9.5.2.1.PB 13.1.4.P
null
null
23.1.55.C.01 23.1.55.C.02 23.1.55.C.03 23.2.20.C.01
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
FAR 52.204-21
null
null
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-1 R-AM-2 R-AM-3 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1
R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
null
NT-2 NT-3 NT-4 NT-5 NT-6 NT-7 NT-8 NT-9 NT-10 NT-11 NT-12 NT-13 NT-14 MT-1 MT-2 MT-3 MT-4 MT-5 MT-6 MT-7 MT-8 MT-9 MT-10 MT-11 MT-12 MT-13 MT-14 MT-15
null
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Cloud Security
Customer Responsibility Matrix (CRM)
CLD-06.1
Mechanisms exist to formally document a Customer Responsibility Matrix (CRM), delineating assigned responsibilities for controls between the Cloud Service Provider (CSP) and its customers.
- Customer Responsibility Matrix (CRM) - Shared Responsibility Matrix (SRM) - Responsible, Accountable, Supporting, Consulted and Informed (RASCI) matrix
E-CPL-03
Does the organization formally document a Customer Responsibility Matrix (CRM), delineating assigned responsibilities for controls between the Cloud Service Provider (CSP) and its customers?
8
Identify
X
X
X
There is no evidence of a capability to formally document a Customer Responsibility Matrix (CRM), delineating assigned responsibilities for controls between the Cloud Service Provider (CSP) and its customers.
SP-CMM1 is N/A, since a structured process is required to formally document a Customer Responsibility Matrix (CRM), delineating assigned responsibilities for controls between the Cloud Service Provider (CSP) and its customers.
Cloud Security (CLD) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Cloud security management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel: o Identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for cloud security management. o Use an informal process to govern cloud-specific cybersecurity & data privacy-specific tools. • A Shared Responsibility Matrix (SRM), or similar Customer Responsibility Matrix (CRM), is documented for each Cloud Service Providers (CSPs) instance that takes into account differences between Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a Service (IaaS) methodologies. • IT personnel have a documented architecture for cloud-based technologies to support cybersecurity and data protection requirements. • Cybersecurity and data privacy requirements are identified and documented for cloud-specific sensitive/regulated data processing, storing and/ or transmitting, including restrictions on data processing and storage locations.
Cloud Security (CLD) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Roles and associated responsibilities for governing cloud instances, including provisioning, maintaining and deprovisioning, are formally assigned. • A Shared Responsibility Matrix (SRM), or similar Customer Responsibility Matrix (CRM), is documented for each Cloud Service Providers (CSPs) instance that takes into account differences between Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a Service (IaaS) methodologies. • IT architects, in conjunction with cybersecurity architects: o Ensure the cloud security architecture supports the organization's technology strategy to securely design, configure and maintain cloud employments. o Ensure multi-tenant CSP assets (physical and virtual) are designed and governed such that provider and customer (tenant) user access is appropriately segmented from other tenant users. o Ensure CSPs use secure protocols for the import, export and management of data in cloud-based services. o Implement a dedicated subnet to host security-specific technologies on all cloud instances, where technically feasible. • A Change Advisory Board (CAB), or similar function: o Governs changes to cloud-based systems, applications and services to ensure their stability, reliability and predictability. o Reviews processes to identify and prevent use of unapproved CSPs. • A dedicated IT infrastructure team, or similar function, enables the implementation of cloud management controls to ensure cloud instances are both secure and compliant, leveraging industry-recognized secure practices that are CSP-specific. • Cybersecurity and data privacy requirements are identified and documented for each CSP instance to address sensitive/regulated data processing, storing and/ or transmitting and provide restrictions on data processing and storage locations. • A Data Protection Impact Assessment (DPIA) is used to help ensure the protection of sensitive/regulated data processed, stored or transmitted on external systems.
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to formally document a Customer Responsibility Matrix (CRM), delineating assigned responsibilities for controls between the Cloud Service Provider (CSP) and its customers.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to formally document a Customer Responsibility Matrix (CRM), delineating assigned responsibilities for controls between the Cloud Service Provider (CSP) and its customers.
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
4.3(c)
null
5.23
6.1.1 CLD.6.3.1
null
null
null
null
null
null
TS-1.10
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
PO.2 PO.2.1 PO.2.2 PO.2.3
null
null
null
null
12.4.1
null
null
null
null
null
null
null
12.4.1
null
G.1.3
null
null
null
null
null
THIRD-PARTIES-1.A.MIL1
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
6.1.1.13.PB 6.1.3.13.PB 6.3.P 6.3.1.P 6.3.1.1.PB 6.3 6.3.1 6.3.1.1
null
null
23.1.55.C.01 23.1.55.C.02 23.1.55.C.03
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
R-AM-3 R-EX-5 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1
null
null
null
null
null
null
R-AM-3
null
null
null
null
null
null
null
null
null
R-EX-5
null
null
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
null
MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Cloud Security
Multi-Tenant Event Logging Capabilities
CLD-06.2
Mechanisms exist to ensure Multi-Tenant Service Providers (MTSP) facilitate security event logging capabilities for its customers that are consistent with applicable statutory, regulatory and/or contractual obligations.
null
null
Does the organization ensure Multi-Tenant Service Providers (MTSP) facilitate security event logging capabilities for its customers that are consistent with applicable statutory, regulatory and/or contractual obligations?
8
Identify
null
null
X
There is no evidence of a capability to ensure Multi-Tenant Service Providers (MTSP) facilitate security event logging capabilities for its customers that are consistent with applicable statutory, regulatory and/ or contractual obligations.
SP-CMM1 is N/A, since a structured process is required to ensure Multi-Tenant Service Providers (MTSP) facilitate security event logging capabilities for its customers that are consistent with applicable statutory, regulatory and/ or contractual obligations.
Cloud Security (CLD) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Cloud security management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel: o Identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for cloud security management. o Use an informal process to govern cloud-specific cybersecurity & data privacy-specific tools. • A Shared Responsibility Matrix (SRM), or similar Customer Responsibility Matrix (CRM), is documented for each Cloud Service Providers (CSPs) instance that takes into account differences between Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a Service (IaaS) methodologies. • IT personnel have a documented architecture for cloud-based technologies to support cybersecurity and data protection requirements. • Cybersecurity and data privacy requirements are identified and documented for cloud-specific sensitive/regulated data processing, storing and/ or transmitting, including restrictions on data processing and storage locations.
Cloud Security (CLD) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Roles and associated responsibilities for governing cloud instances, including provisioning, maintaining and deprovisioning, are formally assigned. • A Shared Responsibility Matrix (SRM), or similar Customer Responsibility Matrix (CRM), is documented for each Cloud Service Providers (CSPs) instance that takes into account differences between Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a Service (IaaS) methodologies. • IT architects, in conjunction with cybersecurity architects: o Ensure the cloud security architecture supports the organization's technology strategy to securely design, configure and maintain cloud employments. o Ensure multi-tenant CSP assets (physical and virtual) are designed and governed such that provider and customer (tenant) user access is appropriately segmented from other tenant users. o Ensure CSPs use secure protocols for the import, export and management of data in cloud-based services. o Implement a dedicated subnet to host security-specific technologies on all cloud instances, where technically feasible. • A Change Advisory Board (CAB), or similar function: o Governs changes to cloud-based systems, applications and services to ensure their stability, reliability and predictability. o Reviews processes to identify and prevent use of unapproved CSPs. • A dedicated IT infrastructure team, or similar function, enables the implementation of cloud management controls to ensure cloud instances are both secure and compliant, leveraging industry-recognized secure practices that are CSP-specific. • Cybersecurity and data privacy requirements are identified and documented for each CSP instance to address sensitive/regulated data processing, storing and/ or transmitting and provide restrictions on data processing and storage locations. • A Data Protection Impact Assessment (DPIA) is used to help ensure the protection of sensitive/regulated data processed, stored or transmitted on external systems.
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to ensure Multi-Tenant Service Providers (MTSP) facilitate security event logging capabilities for its customers that are consistent with applicable statutory, regulatory and/ or contractual obligations.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to ensure Multi-Tenant Service Providers (MTSP) facilitate security event logging capabilities for its customers that are consistent with applicable statutory, regulatory and/ or contractual obligations.
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
CLD.12.4.5
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
A1.2 A1.2.1
null
null
null
null
null
null
null
A1.2.1
null
N.1.24
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
12.4.5.P
null
null
23.5.11.C.01 23.5.12.C.01 23.5.12.C.02
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
R-AM-3 R-EX-5 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1
null
null
null
null
null
null
R-AM-3
null
null
null
null
null
null
null
null
null
R-EX-5
null
null
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
null
MT-8 MT-9 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
MT-8
MT-9
null
null
MT-12
MT-13
MT-14
MT-15
null
null
Cloud Security
Multi-Tenant Forensics Capabilities
CLD-06.3
Mechanisms exist to ensure Multi-Tenant Service Providers (MTSP) facilitate prompt forensic investigations in the event of a suspected or confirmed security incident.
null
null
Does the organization ensure Multi-Tenant Service Providers (MTSP) facilitate prompt forensic investigations in the event of a suspected or confirmed security incident?
8
Identify
null
null
X
There is no evidence of a capability to ensure Multi-Tenant Service Providers (MTSP) facilitate prompt forensic investigations in the event of a suspected or confirmed security incident.
SP-CMM1 is N/A, since a structured process is required to ensure Multi-Tenant Service Providers (MTSP) facilitate prompt forensic investigations in the event of a suspected or confirmed security incident.
Cloud Security (CLD) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Cloud security management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel: o Identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for cloud security management. o Use an informal process to govern cloud-specific cybersecurity & data privacy-specific tools. • A Shared Responsibility Matrix (SRM), or similar Customer Responsibility Matrix (CRM), is documented for each Cloud Service Providers (CSPs) instance that takes into account differences between Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a Service (IaaS) methodologies. • IT personnel have a documented architecture for cloud-based technologies to support cybersecurity and data protection requirements. • Cybersecurity and data privacy requirements are identified and documented for cloud-specific sensitive/regulated data processing, storing and/ or transmitting, including restrictions on data processing and storage locations.
Cloud Security (CLD) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Roles and associated responsibilities for governing cloud instances, including provisioning, maintaining and deprovisioning, are formally assigned. • A Shared Responsibility Matrix (SRM), or similar Customer Responsibility Matrix (CRM), is documented for each Cloud Service Providers (CSPs) instance that takes into account differences between Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a Service (IaaS) methodologies. • IT architects, in conjunction with cybersecurity architects: o Ensure the cloud security architecture supports the organization's technology strategy to securely design, configure and maintain cloud employments. o Ensure multi-tenant CSP assets (physical and virtual) are designed and governed such that provider and customer (tenant) user access is appropriately segmented from other tenant users. o Ensure CSPs use secure protocols for the import, export and management of data in cloud-based services. o Implement a dedicated subnet to host security-specific technologies on all cloud instances, where technically feasible. • A Change Advisory Board (CAB), or similar function: o Governs changes to cloud-based systems, applications and services to ensure their stability, reliability and predictability. o Reviews processes to identify and prevent use of unapproved CSPs. • A dedicated IT infrastructure team, or similar function, enables the implementation of cloud management controls to ensure cloud instances are both secure and compliant, leveraging industry-recognized secure practices that are CSP-specific. • Cybersecurity and data privacy requirements are identified and documented for each CSP instance to address sensitive/regulated data processing, storing and/ or transmitting and provide restrictions on data processing and storage locations. • A Data Protection Impact Assessment (DPIA) is used to help ensure the protection of sensitive/regulated data processed, stored or transmitted on external systems.
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to ensure Multi-Tenant Service Providers (MTSP) facilitate prompt forensic investigations in the event of a suspected or confirmed security incident.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to ensure Multi-Tenant Service Providers (MTSP) facilitate prompt forensic investigations in the event of a suspected or confirmed security incident.
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
A1.2 A1.2.2
null
null
null
null
null
null
null
A1.2.2
null
N.2.7
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
R-AM-3 R-EX-5 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1
null
null
null
null
null
null
R-AM-3
null
null
null
null
null
null
null
null
null
R-EX-5
null
null
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
null
MT-8 MT-9 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
MT-8
MT-9
null
null
MT-12
MT-13
MT-14
MT-15
null
null
Cloud Security
Multi-Tenant Incident Response Capabilities
CLD-06.4
Mechanisms exist to ensure Multi-Tenant Service Providers (MTSP) facilitate prompt response to suspected or confirmed security incidents and vulnerabilities, including timely notification to affected customers.
null
null
Does the organization ensure Multi-Tenant Service Providers (MTSP) facilitate prompt response to suspected or confirmed security incidents and vulnerabilities, including timely notification to affected customers?
8
Identify
null
null
X
There is no evidence of a capability to ensure Multi-Tenant Service Providers (MTSP) facilitate prompt response to suspected or confirmed security incidents and vulnerabilities, including timely notification to affected customers.
SP-CMM1 is N/A, since a structured process is required to ensure Multi-Tenant Service Providers (MTSP) facilitate prompt response to suspected or confirmed security incidents and vulnerabilities, including timely notification to affected customers.
Cloud Security (CLD) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Cloud security management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel: o Identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for cloud security management. o Use an informal process to govern cloud-specific cybersecurity & data privacy-specific tools. • A Shared Responsibility Matrix (SRM), or similar Customer Responsibility Matrix (CRM), is documented for each Cloud Service Providers (CSPs) instance that takes into account differences between Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a Service (IaaS) methodologies. • IT personnel have a documented architecture for cloud-based technologies to support cybersecurity and data protection requirements. • Cybersecurity and data privacy requirements are identified and documented for cloud-specific sensitive/regulated data processing, storing and/ or transmitting, including restrictions on data processing and storage locations.
Cloud Security (CLD) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Roles and associated responsibilities for governing cloud instances, including provisioning, maintaining and deprovisioning, are formally assigned. • A Shared Responsibility Matrix (SRM), or similar Customer Responsibility Matrix (CRM), is documented for each Cloud Service Providers (CSPs) instance that takes into account differences between Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a Service (IaaS) methodologies. • IT architects, in conjunction with cybersecurity architects: o Ensure the cloud security architecture supports the organization's technology strategy to securely design, configure and maintain cloud employments. o Ensure multi-tenant CSP assets (physical and virtual) are designed and governed such that provider and customer (tenant) user access is appropriately segmented from other tenant users. o Ensure CSPs use secure protocols for the import, export and management of data in cloud-based services. o Implement a dedicated subnet to host security-specific technologies on all cloud instances, where technically feasible. • A Change Advisory Board (CAB), or similar function: o Governs changes to cloud-based systems, applications and services to ensure their stability, reliability and predictability. o Reviews processes to identify and prevent use of unapproved CSPs. • A dedicated IT infrastructure team, or similar function, enables the implementation of cloud management controls to ensure cloud instances are both secure and compliant, leveraging industry-recognized secure practices that are CSP-specific. • Cybersecurity and data privacy requirements are identified and documented for each CSP instance to address sensitive/regulated data processing, storing and/ or transmitting and provide restrictions on data processing and storage locations. • A Data Protection Impact Assessment (DPIA) is used to help ensure the protection of sensitive/regulated data processed, stored or transmitted on external systems.
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to ensure Multi-Tenant Service Providers (MTSP) facilitate prompt response to suspected or confirmed security incidents and vulnerabilities, including timely notification to affected customers.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to ensure Multi-Tenant Service Providers (MTSP) facilitate prompt response to suspected or confirmed security incidents and vulnerabilities, including timely notification to affected customers.
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
A1.2 A1.2.3
null
null
null
null
null
null
null
A1.2.3
null
N.1.23
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
23.5.12.C.01 23.5.12.C.02
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
R-AM-3 R-EX-5 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1
null
null
null
null
null
null
R-AM-3
null
null
null
null
null
null
null
null
null
R-EX-5
null
null
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
null
MT-8 MT-9 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
MT-8
MT-9
null
null
MT-12
MT-13
MT-14
MT-15
null
null
Cloud Security
Data Handling & Portability
CLD-07
Mechanisms exist to ensure cloud providers use secure protocols for the import, export and management of data in cloud-based services.
- Data Protection Impact Assessment (DPIA) - Security architecture review - Encrypted data transfers (e.g. TLS or VPNs)
null
Does the organization ensure cloud providers use secure protocols for the import, export and management of data in cloud-based services?
4
Protect
null
X
null
There is no evidence of a capability to ensure cloud providers use secure protocols for the import, export and management of data in cloud-based services.
Cloud Security (CLD) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Cloud-based technologies are governed no differently from on-premise network assets (e.g., cloud-based technology is viewed as an extension of the corporate network). • A Shared Responsibility Matrix (SRM), or similar Customer Responsibility Matrix (CRM), is documented for each Cloud Service Providers (CSPs) instance that takes into account differences between Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a Service (IaaS) methodologies.
Cloud Security (CLD) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Cloud security management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel: o Identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for cloud security management. o Use an informal process to govern cloud-specific cybersecurity & data privacy-specific tools. • A Shared Responsibility Matrix (SRM), or similar Customer Responsibility Matrix (CRM), is documented for each Cloud Service Providers (CSPs) instance that takes into account differences between Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a Service (IaaS) methodologies. • IT personnel have a documented architecture for cloud-based technologies to support cybersecurity and data protection requirements. • Cybersecurity and data privacy requirements are identified and documented for cloud-specific sensitive/regulated data processing, storing and/ or transmitting, including restrictions on data processing and storage locations.
Cloud Security (CLD) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Roles and associated responsibilities for governing cloud instances, including provisioning, maintaining and deprovisioning, are formally assigned. • A Shared Responsibility Matrix (SRM), or similar Customer Responsibility Matrix (CRM), is documented for each Cloud Service Providers (CSPs) instance that takes into account differences between Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a Service (IaaS) methodologies. • IT architects, in conjunction with cybersecurity architects: o Ensure the cloud security architecture supports the organization's technology strategy to securely design, configure and maintain cloud employments. o Ensure multi-tenant CSP assets (physical and virtual) are designed and governed such that provider and customer (tenant) user access is appropriately segmented from other tenant users. o Ensure CSPs use secure protocols for the import, export and management of data in cloud-based services. o Implement a dedicated subnet to host security-specific technologies on all cloud instances, where technically feasible. • A Change Advisory Board (CAB), or similar function: o Governs changes to cloud-based systems, applications and services to ensure their stability, reliability and predictability. o Reviews processes to identify and prevent use of unapproved CSPs. • A dedicated IT infrastructure team, or similar function, enables the implementation of cloud management controls to ensure cloud instances are both secure and compliant, leveraging industry-recognized secure practices that are CSP-specific. • Cybersecurity and data privacy requirements are identified and documented for each CSP instance to address sensitive/regulated data processing, storing and/ or transmitting and provide restrictions on data processing and storage locations. • A Data Protection Impact Assessment (DPIA) is used to help ensure the protection of sensitive/regulated data processed, stored or transmitted on external systems.
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to ensure cloud providers use secure protocols for the import, export and management of data in cloud-based services.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to ensure cloud providers use secure protocols for the import, export and management of data in cloud-based services.
null
null
null
null
null
null
null
null
null
IPY-01 IPY-03 IVS-07
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
V.1.9
null
null
null
null
null
null
null
null
null
null
null
null
AC.L1-b.1.iv
null
null
null
null
null
null
52.204-21(b)(1)(iv)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
4.L.A
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
PI-01 PI-02
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
FAR 52.204-21
null
null
R-AM-3 R-EX-5 R-GV-1 R-IR-3
null
null
null
null
null
null
R-AM-3
null
null
null
null
null
null
null
null
null
R-EX-5
null
null
R-GV-1
null
null
null
null
null
null
null
null
null
R-IR-3
null
null
null
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-10 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Cloud Security
Standardized Virtualization Formats
CLD-08
Mechanisms exist to ensure interoperability by requiring cloud providers to use industry-recognized formats and provide documentation of custom changes for review.
- CimTrak Integrity Suite (https://www.cimcor.com/cimtrak/) - Data Protection Impact Assessment (DPIA) - Manual review process - Vendor risk assessments - Independent vendor compliance assessments
null
Does the organization ensure interoperability by requiring cloud providers to use industry-recognized formats and provide documentation of custom changes for review?
4
Protect
null
X
X
There is no evidence of a capability to ensure interoperability by requiring cloud providers to use industry-recognized formats and provide documentation of custom changes for review.
Cloud Security (CLD) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Cloud-based technologies are governed no differently from on-premise network assets (e.g., cloud-based technology is viewed as an extension of the corporate network). • A Shared Responsibility Matrix (SRM), or similar Customer Responsibility Matrix (CRM), is documented for each Cloud Service Providers (CSPs) instance that takes into account differences between Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a Service (IaaS) methodologies.
Cloud Security (CLD) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Cloud security management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel: o Identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for cloud security management. o Use an informal process to govern cloud-specific cybersecurity & data privacy-specific tools. • A Shared Responsibility Matrix (SRM), or similar Customer Responsibility Matrix (CRM), is documented for each Cloud Service Providers (CSPs) instance that takes into account differences between Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a Service (IaaS) methodologies. • IT personnel have a documented architecture for cloud-based technologies to support cybersecurity and data protection requirements. • Cybersecurity and data privacy requirements are identified and documented for cloud-specific sensitive/regulated data processing, storing and/ or transmitting, including restrictions on data processing and storage locations.
Cloud Security (CLD) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Roles and associated responsibilities for governing cloud instances, including provisioning, maintaining and deprovisioning, are formally assigned. • A Shared Responsibility Matrix (SRM), or similar Customer Responsibility Matrix (CRM), is documented for each Cloud Service Providers (CSPs) instance that takes into account differences between Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a Service (IaaS) methodologies. • IT architects, in conjunction with cybersecurity architects: o Ensure the cloud security architecture supports the organization's technology strategy to securely design, configure and maintain cloud employments. o Ensure multi-tenant CSP assets (physical and virtual) are designed and governed such that provider and customer (tenant) user access is appropriately segmented from other tenant users. o Ensure CSPs use secure protocols for the import, export and management of data in cloud-based services. o Implement a dedicated subnet to host security-specific technologies on all cloud instances, where technically feasible. • A Change Advisory Board (CAB), or similar function: o Governs changes to cloud-based systems, applications and services to ensure their stability, reliability and predictability. o Reviews processes to identify and prevent use of unapproved CSPs. • A dedicated IT infrastructure team, or similar function, enables the implementation of cloud management controls to ensure cloud instances are both secure and compliant, leveraging industry-recognized secure practices that are CSP-specific. • Cybersecurity and data privacy requirements are identified and documented for each CSP instance to address sensitive/regulated data processing, storing and/ or transmitting and provide restrictions on data processing and storage locations. • A Data Protection Impact Assessment (DPIA) is used to help ensure the protection of sensitive/regulated data processed, stored or transmitted on external systems.
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to ensure interoperability by requiring cloud providers to use industry-recognized formats and provide documentation of custom changes for review.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to ensure interoperability by requiring cloud providers to use industry-recognized formats and provide documentation of custom changes for review.
null
null
null
null
null
null
null
null
null
IPY-01 IPY-03 IVS-01
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
V.4.4
null
null
null
null
null
null
null
null
5.10.3
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
2.L.F
3.3.7
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
PSS-11
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
x
null
null
null
R-AM-3 R-BC-3 R-EX-1 R-EX-2 R-EX-5 R-GV-1 R-IR-1 R-IR-3 R-IR-4
null
null
null
null
null
null
R-AM-3
null
null
R-BC-3
null
null
R-EX-1
R-EX-2
null
null
R-EX-5
null
null
R-GV-1
null
null
null
null
null
null
null
R-IR-1
null
R-IR-3
R-IR-4
null
null
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-10 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Cloud Security
Geolocation Requirements for Processing, Storage and Service Locations
CLD-09
Mechanisms exist to control the location of cloud processing/storage based on business requirements that includes statutory, regulatory and contractual obligations.
- Data Protection Impact Assessment (DPIA)
E-AST-06 E-AST-23
Does the organization control the location of cloud processing/storage based on business requirements that includes statutory, regulatory and contractual obligations?
10
Protect
null
X
X
There is no evidence of a capability to control the location of cloud processing/storage based on business requirements that includes statutory, regulatory and contractual obligations.
Cloud Security (CLD) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Cloud-based technologies are governed no differently from on-premise network assets (e.g., cloud-based technology is viewed as an extension of the corporate network). • A Shared Responsibility Matrix (SRM), or similar Customer Responsibility Matrix (CRM), is documented for each Cloud Service Providers (CSPs) instance that takes into account differences between Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a Service (IaaS) methodologies.
Cloud Security (CLD) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Cloud security management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel: o Identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for cloud security management. o Use an informal process to govern cloud-specific cybersecurity & data privacy-specific tools. • A Shared Responsibility Matrix (SRM), or similar Customer Responsibility Matrix (CRM), is documented for each Cloud Service Providers (CSPs) instance that takes into account differences between Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a Service (IaaS) methodologies. • IT personnel have a documented architecture for cloud-based technologies to support cybersecurity and data protection requirements. • Cybersecurity and data privacy requirements are identified and documented for cloud-specific sensitive/regulated data processing, storing and/ or transmitting, including restrictions on data processing and storage locations.
Cloud Security (CLD) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Roles and associated responsibilities for governing cloud instances, including provisioning, maintaining and deprovisioning, are formally assigned. • A Shared Responsibility Matrix (SRM), or similar Customer Responsibility Matrix (CRM), is documented for each Cloud Service Providers (CSPs) instance that takes into account differences between Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a Service (IaaS) methodologies. • IT architects, in conjunction with cybersecurity architects: o Ensure the cloud security architecture supports the organization's technology strategy to securely design, configure and maintain cloud employments. o Ensure multi-tenant CSP assets (physical and virtual) are designed and governed such that provider and customer (tenant) user access is appropriately segmented from other tenant users. o Ensure CSPs use secure protocols for the import, export and management of data in cloud-based services. o Implement a dedicated subnet to host security-specific technologies on all cloud instances, where technically feasible. • A Change Advisory Board (CAB), or similar function: o Governs changes to cloud-based systems, applications and services to ensure their stability, reliability and predictability. o Reviews processes to identify and prevent use of unapproved CSPs. • A dedicated IT infrastructure team, or similar function, enables the implementation of cloud management controls to ensure cloud instances are both secure and compliant, leveraging industry-recognized secure practices that are CSP-specific. • Cybersecurity and data privacy requirements are identified and documented for each CSP instance to address sensitive/regulated data processing, storing and/ or transmitting and provide restrictions on data processing and storage locations. • A Data Protection Impact Assessment (DPIA) is used to help ensure the protection of sensitive/regulated data processed, stored or transmitted on external systems.
Cloud Security (CLD) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
Cloud Security (CLD) efforts are “world-class” capabilities that leverage predictive analysis (e.g., machine learning, AI, etc.). In addition to CMM Level 4 criteria, CMM Level 5 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Stakeholders make time-sensitive decisions to support operational efficiency, which may include automated remediation actions. ▪ Based on predictive analysis, process improvements are implemented according to “continuous improvement” practices that affect process changes.
null
null
null
null
null
null
null
null
null
DSP-19 UEM-12 UEM-12
null
null
null
null
null
null
null
null
null
5.23
6.1.3
null
7.5 7.5.1 7.5.2 8.5.1 8.5.2
null
null
null
null
null
null
null
null
null
null
null
SA-9(5)
null
null
null
SA-9(5) SA-9(8)
null
null
null
null
SA-9(5) SA-9(8)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
D.3.3
null
null
null
null
null
null
null
null
null
null
null
null
AC.L1-b.1.iv
null
null
SA-9(5)
null
null
null
52.204-21(b)(1)(iv)
null
null
null
SA-9(5)
null
SA-9(5)
SA-9(5)
null
SA-9(5)
null
SA-9(5)
SA-9(5)
null
null
null
null
null
null
null
null
null
4.L.A
2.C.7 SA-9(5) SA-9(8)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
SA-9(5)
null
null
null
null
null
Art 6 Art 9
null
null
null
null
null
null
null
null
null
null
null
null
PI-02 PSS-12
null
null
null
null
null
null
25(h)
null
null
null
null
null
null
Article 15
null
4-2-1-1
TPC-30
null
4-1-3-2 4-2-3-3
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Article 3 Article 44 Article 45(1) Article 45(2)(a) Article 45(2)(b) Article 45(2)(c) Article 46(1) Article 46(2)(a) Article 46(2)(b) Article 46(2)(c) Article 46(2)(d) Article 46(2)(e) Article 46(2)(f) Article 46(3)(a) Article 46(3)(b)
null
null
null
null
APP 8
1572 1578
null
null
null
null
null
Article 38 Article 39 Article 40
null
null
null
Article 24(1)
null
null
null
22.1.22.C.01 22.1.22.C.02 22.1.22.C.03 22.1.22.C.04 22.1.22.C.05 22.1.22.C.06 23.4.11.C.01 23.4.11.C.02
null
null
null
null
null
null
null
null
Art 12.1 Art 12.2
null
null
Art 33 Art 34
null
null
null
null
null
null
null
null
Art 23
null
null
null
x
FAR 52.204-21
null
x
R-AC-4 R-AM-1 R-AM-3 R-BC-2 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-GV-1 R-GV-2 R-GV-4 R-GV-5 R-IR-1 R-IR-4
null
null
null
R-AC-4
R-AM-1
null
R-AM-3
null
R-BC-2
null
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
null
R-GV-1
R-GV-2
null
R-GV-4
R-GV-5
null
null
null
R-IR-1
null
null
R-IR-4
null
null
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-10 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Cloud Security
Sensitive Data In Public Cloud Providers
CLD-10
Mechanisms exist to limit and manage the storage of sensitive/regulated data in public cloud providers.
- Data Protection Impact Assessment (DPIA) - Security and network architecture diagrams - Data Flow Diagram (DFD)
E-AST-08
Does the organization limit and manage the storage of sensitive/regulated data in public cloud providers?
6
Protect
null
X
null
There is no evidence of a capability to limit and manage the storage of sensitive/regulated data in public cloud providers.
Cloud Security (CLD) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Cloud-based technologies are governed no differently from on-premise network assets (e.g., cloud-based technology is viewed as an extension of the corporate network). • A Shared Responsibility Matrix (SRM), or similar Customer Responsibility Matrix (CRM), is documented for each Cloud Service Providers (CSPs) instance that takes into account differences between Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a Service (IaaS) methodologies.
Cloud Security (CLD) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Cloud security management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel: o Identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for cloud security management. o Use an informal process to govern cloud-specific cybersecurity & data privacy-specific tools. • A Shared Responsibility Matrix (SRM), or similar Customer Responsibility Matrix (CRM), is documented for each Cloud Service Providers (CSPs) instance that takes into account differences between Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a Service (IaaS) methodologies. • IT personnel have a documented architecture for cloud-based technologies to support cybersecurity and data protection requirements. • Cybersecurity and data privacy requirements are identified and documented for cloud-specific sensitive/regulated data processing, storing and/ or transmitting, including restrictions on data processing and storage locations.
Cloud Security (CLD) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Roles and associated responsibilities for governing cloud instances, including provisioning, maintaining and deprovisioning, are formally assigned. • A Shared Responsibility Matrix (SRM), or similar Customer Responsibility Matrix (CRM), is documented for each Cloud Service Providers (CSPs) instance that takes into account differences between Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a Service (IaaS) methodologies. • IT architects, in conjunction with cybersecurity architects: o Ensure the cloud security architecture supports the organization's technology strategy to securely design, configure and maintain cloud employments. o Ensure multi-tenant CSP assets (physical and virtual) are designed and governed such that provider and customer (tenant) user access is appropriately segmented from other tenant users. o Ensure CSPs use secure protocols for the import, export and management of data in cloud-based services. o Implement a dedicated subnet to host security-specific technologies on all cloud instances, where technically feasible. • A Change Advisory Board (CAB), or similar function: o Governs changes to cloud-based systems, applications and services to ensure their stability, reliability and predictability. o Reviews processes to identify and prevent use of unapproved CSPs. • A dedicated IT infrastructure team, or similar function, enables the implementation of cloud management controls to ensure cloud instances are both secure and compliant, leveraging industry-recognized secure practices that are CSP-specific. • Cybersecurity and data privacy requirements are identified and documented for each CSP instance to address sensitive/regulated data processing, storing and/ or transmitting and provide restrictions on data processing and storage locations. • A Data Protection Impact Assessment (DPIA) is used to help ensure the protection of sensitive/regulated data processed, stored or transmitted on external systems. • IT infrastructure personnel and Data Protection Officers (DPOs) work with business stakeholders to identify business-critical systems and services, as well as associated sensitive/regulated data, including Personal Data (PD). • The DPO function oversees the storage, processing and transmission of PD in CSPs.
Cloud Security (CLD) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to limit and manage the storage of sensitive/regulated data in public cloud providers.
null
null
null
null
null
null
null
null
null
DSP-17
null
null
null
null
null
null
null
null
null
null
CLD.9.5.1
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
D.3.3
null
null
null
null
null
null
null
null
null
null
null
null
AC.L1-b.1.iv
null
null
null
null
null
null
52.204-21(b)(1)(iv)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
4.L.A
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
6-1-1308(7)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
11.6
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
8.1.5.P
null
null
2.3.23.C.01 22.1.22.C.04 22.1.22.C.05
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
FAR 52.204-21
null
null
R-AC-4 R-AM-3 R-BC-2 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5
null
null
null
R-AC-4
null
null
R-AM-3
null
R-BC-2
null
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-10 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Cloud Security
Cloud Access Point (CAP)
CLD-11
Mechanisms exist to utilize Cloud Access Points (CAPs) to provide boundary protection and monitoring functions that both provide access to the cloud and protect the organization from the cloud.
- Next Generation Firewall (NGF) - Web Application Firewall (WAF) - Network Routing / Switching - Intrusion Detection / Protection (IDS / IPS) - Data Loss Prevention (DLP) - Full Packet Capture
null
Does the organization utilize Cloud Access Points (CAPs) to provide boundary protection and monitoring functions that both provide access to the cloud and protect the organization from the cloud?
7
Protect
null
X
null
There is no evidence of a capability to utilize Cloud Access Points (CAPs) to provide boundary protection and monitoring functions that both provide access to the cloud and protect the organization from the cloud.
Cloud Security (CLD) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Cloud-based technologies are governed no differently from on-premise network assets (e.g., cloud-based technology is viewed as an extension of the corporate network). • A Shared Responsibility Matrix (SRM), or similar Customer Responsibility Matrix (CRM), is documented for each Cloud Service Providers (CSPs) instance that takes into account differences between Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a Service (IaaS) methodologies.
SP-CMM2 is N/A, since a well-defined process is required to prevent "side channel attacks" when using a Content Delivery Network (CDN) by restricting access to the origin server's IP address to the CDN and an authorized management network.
Cloud Security (CLD) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Roles and associated responsibilities for governing cloud instances, including provisioning, maintaining and deprovisioning, are formally assigned. • A Shared Responsibility Matrix (SRM), or similar Customer Responsibility Matrix (CRM), is documented for each Cloud Service Providers (CSPs) instance that takes into account differences between Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a Service (IaaS) methodologies. • IT architects, in conjunction with cybersecurity architects: o Ensure the cloud security architecture supports the organization's technology strategy to securely design, configure and maintain cloud employments. o Ensure multi-tenant CSP assets (physical and virtual) are designed and governed such that provider and customer (tenant) user access is appropriately segmented from other tenant users. o Ensure CSPs use secure protocols for the import, export and management of data in cloud-based services. o Implement a dedicated subnet to host security-specific technologies on all cloud instances, where technically feasible. • A Change Advisory Board (CAB), or similar function: o Governs changes to cloud-based systems, applications and services to ensure their stability, reliability and predictability. o Reviews processes to identify and prevent use of unapproved CSPs. • A dedicated IT infrastructure team, or similar function, enables the implementation of cloud management controls to ensure cloud instances are both secure and compliant, leveraging industry-recognized secure practices that are CSP-specific. • Cybersecurity and data privacy requirements are identified and documented for each CSP instance to address sensitive/regulated data processing, storing and/ or transmitting and provide restrictions on data processing and storage locations. • A Data Protection Impact Assessment (DPIA) is used to help ensure the protection of sensitive/regulated data processed, stored or transmitted on external systems. • IT architects, in conjunction with cybersecurity architects, use Cloud Access Points (CAPs) to provide boundary protection and monitoring functions that control access to the cloud and protect the organization as well.
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to utilize Cloud Access Points (CAPs) to provide boundary protection and monitoring functions that both provide access to the cloud and protect the organization from the cloud.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to utilize Cloud Access Points (CAPs) to provide boundary protection and monitoring functions that both provide access to the cloud and protect the organization from the cloud.
null
CC6.1-POF5
null
null
null
null
null
null
null
IVS-08
CLS-12 CLS-14
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
P.7
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
4.L.A 6.L.A
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
COS-04
null
null
null
9.10 11.8 16.4
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
22.1.24.C.01 22.1.24.C.02 22.1.24.C.03 22.1.24.C.04
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
x
null
null
null
R-AC-4 R-AM-3 R-SA-1
null
null
null
R-AC-4
null
null
R-AM-3
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
R-SA-1
null
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-10 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Cloud Security
Side Channel Attack Prevention
CLD-12
Mechanisms exist to prevent "side channel attacks" when using a Content Delivery Network (CDN) by restricting access to the origin server's IP address to the CDN and an authorized management network.
null
null
Does the organization prevent "side channel attacks" when using a Content Delivery Network (CDN) by restricting access to the origin server's IP address to the CDN and an authorized management network?
3
Protect
null
null
X
There is no evidence of a capability to prevent "side channel attacks" when using a Content Delivery Network (CDN) by restricting access to the origin server's IP address to the CDN and an authorized management network.
SP-CMM1 is N/A, since a structured process is required to prevent "side channel attacks" when using a Content Delivery Network (CDN) by restricting access to the origin server's IP address to the CDN and an authorized management network.
SP-CMM2 is N/A, since a well-defined process is required to prevent "side channel attacks" when using a Content Delivery Network (CDN) by restricting access to the origin server's IP address to the CDN and an authorized management network.
Cloud Security (CLD) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Roles and associated responsibilities for governing cloud instances, including provisioning, maintaining and deprovisioning, are formally assigned. • A Shared Responsibility Matrix (SRM), or similar Customer Responsibility Matrix (CRM), is documented for each Cloud Service Providers (CSPs) instance that takes into account differences between Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a Service (IaaS) methodologies. • IT architects, in conjunction with cybersecurity architects: o Ensure the cloud security architecture supports the organization's technology strategy to securely design, configure and maintain cloud employments. o Ensure multi-tenant CSP assets (physical and virtual) are designed and governed such that provider and customer (tenant) user access is appropriately segmented from other tenant users. o Ensure CSPs use secure protocols for the import, export and management of data in cloud-based services. o Implement a dedicated subnet to host security-specific technologies on all cloud instances, where technically feasible. • A Change Advisory Board (CAB), or similar function: o Governs changes to cloud-based systems, applications and services to ensure their stability, reliability and predictability. o Reviews processes to identify and prevent use of unapproved CSPs. • A dedicated IT infrastructure team, or similar function, enables the implementation of cloud management controls to ensure cloud instances are both secure and compliant, leveraging industry-recognized secure practices that are CSP-specific. • Cybersecurity and data privacy requirements are identified and documented for each CSP instance to address sensitive/regulated data processing, storing and/ or transmitting and provide restrictions on data processing and storage locations. • A Data Protection Impact Assessment (DPIA) is used to help ensure the protection of sensitive/regulated data processed, stored or transmitted on external systems. IT infrastructure team assigns roles and responsibilities for governing Content Delivery Network (CDN) instances, including provisioning, maintaining and deprovisioning of instances.
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to prevent "side channel attacks" when using a Content Delivery Network (CDN) by restricting access to the origin server's IP address to the CDN and an authorized management network.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to prevent "side channel attacks" when using a Content Delivery Network (CDN) by restricting access to the origin server's IP address to the CDN and an authorized management network.
null
null
null
null
null
null
null
null
null
null
CLS-02
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
12.4.2
null
null
null
null
null
null
null
12.4.2
null
N.9
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
1438 1439
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
R-AC-4 R-BC-2 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5
null
null
null
R-AC-4
null
null
null
null
R-BC-2
null
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-10 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Cloud Security
Hosted Systems, Applications & Services
CLD-13
Mechanisms exist to specify applicable cybersecurity & data protection controls that must be implemented on external systems, consistent with the contractual obligations established with the External Service Providers (ESP) owning, operating and/or maintaining external systems, applications and/or services.
- Customer Responsibility Matrix (CRM) - Shared Responsibility Matrix (SRM) - Responsible, Accountable, Supporting, Consulted and Informed (RASCI) matrix
null
Does the organization specify applicable cybersecurity & data protection controls that must be implemented on external systems, consistent with the contractual obligations established with the External Service Providers (ESP) owning, operating and/or maintaining external systems, applications and/or services?
9
Protect
X
X
null
There is no evidence of a capability to specify applicable cybersecurity & data protection controls that must be implemented on external systems, consistent with the contractual obligations established with the External Service Providers (ESP) owning, operating and/or maintaining external systems, applications and/or services.
SP-CMM1 is N/A, since a structured process is required to specify applicable cybersecurity & data protection controls that must be implemented on external systems, consistent with the contractual obligations established with the External Service Providers (ESP) owning, operating and/or maintaining external systems, applications and/or services.
SP-CMM2 is N/A, since a well-defined process is required to specify applicable cybersecurity & data protection controls that must be implemented on external systems, consistent with the contractual obligations established with the External Service Providers (ESP) owning, operating and/or maintaining external systems, applications and/or services.
Cloud Security (CLD) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Roles and associated responsibilities for governing cloud instances, including provisioning, maintaining and deprovisioning, are formally assigned. • A Shared Responsibility Matrix (SRM), or similar Customer Responsibility Matrix (CRM), is documented for each Cloud Service Providers (CSPs) instance that takes into account differences between Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a Service (IaaS) methodologies. • IT architects, in conjunction with cybersecurity architects: o Ensure the cloud security architecture supports the organization's technology strategy to securely design, configure and maintain cloud employments. o Ensure multi-tenant CSP assets (physical and virtual) are designed and governed such that provider and customer (tenant) user access is appropriately segmented from other tenant users. o Ensure CSPs use secure protocols for the import, export and management of data in cloud-based services. o Implement a dedicated subnet to host security-specific technologies on all cloud instances, where technically feasible. • A Change Advisory Board (CAB), or similar function: o Governs changes to cloud-based systems, applications and services to ensure their stability, reliability and predictability. o Reviews processes to identify and prevent use of unapproved CSPs. • A dedicated IT infrastructure team, or similar function, enables the implementation of cloud management controls to ensure cloud instances are both secure and compliant, leveraging industry-recognized secure practices that are CSP-specific. • Cybersecurity and data privacy requirements are identified and documented for each CSP instance to address sensitive/regulated data processing, storing and/ or transmitting and provide restrictions on data processing and storage locations. • A Data Protection Impact Assessment (DPIA) is used to help ensure the protection of sensitive/regulated data processed, stored or transmitted on external systems. IT infrastructure team assigns roles and responsibilities for governing Content Delivery Network (CDN) instances, including provisioning, maintaining and deprovisioning of instances.
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to specify applicable cybersecurity & data protection controls that must be implemented on external systems, consistent with the contractual obligations established with the External Service Providers (ESP) owning, operating and/or maintaining external systems, applications and/or services.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to specify applicable cybersecurity & data protection controls that must be implemented on external systems, consistent with the contractual obligations established with the External Service Providers (ESP) owning, operating and/or maintaining external systems, applications and/or services.
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-1 R-AM-2 R-AM-3 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1
R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
null
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-10 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15
null
- new control
Cloud Security
Authorized Individuals For Hosted Systems, Applications & Services
CLD-13.1
Mechanisms exist to authorize specified individuals to access External Service Providers (ESP) owned, operated and/or maintained external systems, applications and/or services.
- Responsible, Accountable, Supporting, Consulted and Informed (RASCI) matrix
null
Does the organization authorize specified individuals to access External Service Providers (ESP) owned, operated and/or maintained external systems, applications and/or services?
9
Protect
X
X
null
There is no evidence of a capability to authorize specified individuals to access External Service Providers (ESP) owned, operated and/or maintained external systems, applications and/or services.
SP-CMM1 is N/A, since a structured process is required to authorize specified individuals to access External Service Providers (ESP) owned, operated and/or maintained external systems, applications and/or services.
SP-CMM2 is N/A, since a well-defined process is required to authorize specified individuals to access External Service Providers (ESP) owned, operated and/or maintained external systems, applications and/or services.
Cloud Security (CLD) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Roles and associated responsibilities for governing cloud instances, including provisioning, maintaining and deprovisioning, are formally assigned. • A Shared Responsibility Matrix (SRM), or similar Customer Responsibility Matrix (CRM), is documented for each Cloud Service Providers (CSPs) instance that takes into account differences between Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a Service (IaaS) methodologies. • IT architects, in conjunction with cybersecurity architects: o Ensure the cloud security architecture supports the organization's technology strategy to securely design, configure and maintain cloud employments. o Ensure multi-tenant CSP assets (physical and virtual) are designed and governed such that provider and customer (tenant) user access is appropriately segmented from other tenant users. o Ensure CSPs use secure protocols for the import, export and management of data in cloud-based services. o Implement a dedicated subnet to host security-specific technologies on all cloud instances, where technically feasible. • A Change Advisory Board (CAB), or similar function: o Governs changes to cloud-based systems, applications and services to ensure their stability, reliability and predictability. o Reviews processes to identify and prevent use of unapproved CSPs. • A dedicated IT infrastructure team, or similar function, enables the implementation of cloud management controls to ensure cloud instances are both secure and compliant, leveraging industry-recognized secure practices that are CSP-specific. • Cybersecurity and data privacy requirements are identified and documented for each CSP instance to address sensitive/regulated data processing, storing and/ or transmitting and provide restrictions on data processing and storage locations. • A Data Protection Impact Assessment (DPIA) is used to help ensure the protection of sensitive/regulated data processed, stored or transmitted on external systems. IT infrastructure team assigns roles and responsibilities for governing Content Delivery Network (CDN) instances, including provisioning, maintaining and deprovisioning of instances.
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to authorize specified individuals to access External Service Providers (ESP) owned, operated and/or maintained external systems, applications and/or services.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to authorize specified individuals to access External Service Providers (ESP) owned, operated and/or maintained external systems, applications and/or services.
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-1 R-AM-2 R-AM-3 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1
R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
null
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-10 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15
null
- new control
Cloud Security
Sensitive/Regulated Data On Hosted Systems, Applications & Services
CLD-13.2
Mechanisms exist to define formal processes to store, process and/or transmit sensitive/regulated data using External Service Providers (ESP) owned, operated and/or maintained external systems, applications and/or services , in accordance with all applicable statutory, regulatory and/or contractual obligations.
null
null
Does the organization define formal processes to store, process and/or transmit sensitive/regulated data using External Service Providers (ESP) owned, operated and/or maintained external systems, applications and/or services , in accordance with all applicable statutory, regulatory and/or contractual obligations?
9
Protect
X
X
null
There is no evidence of a capability to define formal processes to store, process and/or transmit sensitive/regulated data using External Service Providers (ESP) owned, operated and/or maintained external systems, applications and/or services , in accordance with all applicable statutory, regulatory and/or contractual obligations.
SP-CMM1 is N/A, since a structured process is required to define formal processes to store, process and/or transmit sensitive/regulated data using External Service Providers (ESP) owned, operated and/or maintained external systems, applications and/or services , in accordance with all applicable statutory, regulatory and/or contractual obligations.
SP-CMM2 is N/A, since a well-defined process is required to define formal processes to store, process and/or transmit sensitive/regulated data using External Service Providers (ESP) owned, operated and/or maintained external systems, applications and/or services , in accordance with all applicable statutory, regulatory and/or contractual obligations.
Cloud Security (CLD) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Roles and associated responsibilities for governing cloud instances, including provisioning, maintaining and deprovisioning, are formally assigned. • A Shared Responsibility Matrix (SRM), or similar Customer Responsibility Matrix (CRM), is documented for each Cloud Service Providers (CSPs) instance that takes into account differences between Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a Service (IaaS) methodologies. • IT architects, in conjunction with cybersecurity architects: o Ensure the cloud security architecture supports the organization's technology strategy to securely design, configure and maintain cloud employments. o Ensure multi-tenant CSP assets (physical and virtual) are designed and governed such that provider and customer (tenant) user access is appropriately segmented from other tenant users. o Ensure CSPs use secure protocols for the import, export and management of data in cloud-based services. o Implement a dedicated subnet to host security-specific technologies on all cloud instances, where technically feasible. • A Change Advisory Board (CAB), or similar function: o Governs changes to cloud-based systems, applications and services to ensure their stability, reliability and predictability. o Reviews processes to identify and prevent use of unapproved CSPs. • A dedicated IT infrastructure team, or similar function, enables the implementation of cloud management controls to ensure cloud instances are both secure and compliant, leveraging industry-recognized secure practices that are CSP-specific. • Cybersecurity and data privacy requirements are identified and documented for each CSP instance to address sensitive/regulated data processing, storing and/ or transmitting and provide restrictions on data processing and storage locations. • A Data Protection Impact Assessment (DPIA) is used to help ensure the protection of sensitive/regulated data processed, stored or transmitted on external systems. IT infrastructure team assigns roles and responsibilities for governing Content Delivery Network (CDN) instances, including provisioning, maintaining and deprovisioning of instances.
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to define formal processes to store, process and/or transmit sensitive/regulated data using External Service Providers (ESP) owned, operated and/or maintained external systems, applications and/or services , in accordance with all applicable statutory, regulatory and/or contractual obligations.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to define formal processes to store, process and/or transmit sensitive/regulated data using External Service Providers (ESP) owned, operated and/or maintained external systems, applications and/or services , in accordance with all applicable statutory, regulatory and/or contractual obligations.
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-1 R-AM-2 R-AM-3 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1
R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
null
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-10 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15
null
- new control
Cloud Security
Prohibition On Unverified Hosted Systems, Applications & Services
CLD-14
Mechanisms exist to prohibit access to, or usage of, hosted systems, applications and/or services until applicable cybersecurity & data protection control implementation is verified.
null
null
Does the organization prohibit access to, or usage of, hosted systems, applications and/or services until applicable cybersecurity & data protection control implementation is verified?
8
Protect
X
X
null
There is no evidence of a capability to prohibit access to, or usage of, hosted systems, applications and/or services until applicable cybersecurity & data protection control implementation is verified.
SP-CMM1 is N/A, since a structured process is required to prohibit access to, or usage of, hosted systems, applications and/or services until applicable cybersecurity & data protection control implementation is verified.
SP-CMM2 is N/A, since a well-defined process is required to prohibit access to, or usage of, hosted systems, applications and/or services until applicable cybersecurity & data protection control implementation is verified.
Cloud Security (CLD) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Roles and associated responsibilities for governing cloud instances, including provisioning, maintaining and deprovisioning, are formally assigned. • A Shared Responsibility Matrix (SRM), or similar Customer Responsibility Matrix (CRM), is documented for each Cloud Service Providers (CSPs) instance that takes into account differences between Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a Service (IaaS) methodologies. • IT architects, in conjunction with cybersecurity architects: o Ensure the cloud security architecture supports the organization's technology strategy to securely design, configure and maintain cloud employments. o Ensure multi-tenant CSP assets (physical and virtual) are designed and governed such that provider and customer (tenant) user access is appropriately segmented from other tenant users. o Ensure CSPs use secure protocols for the import, export and management of data in cloud-based services. o Implement a dedicated subnet to host security-specific technologies on all cloud instances, where technically feasible. • A Change Advisory Board (CAB), or similar function: o Governs changes to cloud-based systems, applications and services to ensure their stability, reliability and predictability. o Reviews processes to identify and prevent use of unapproved CSPs. • A dedicated IT infrastructure team, or similar function, enables the implementation of cloud management controls to ensure cloud instances are both secure and compliant, leveraging industry-recognized secure practices that are CSP-specific. • Cybersecurity and data privacy requirements are identified and documented for each CSP instance to address sensitive/regulated data processing, storing and/ or transmitting and provide restrictions on data processing and storage locations. • A Data Protection Impact Assessment (DPIA) is used to help ensure the protection of sensitive/regulated data processed, stored or transmitted on external systems. IT infrastructure team assigns roles and responsibilities for governing Content Delivery Network (CDN) instances, including provisioning, maintaining and deprovisioning of instances.
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to prohibit access to, or usage of, hosted systems, applications and/or services until applicable cybersecurity & data protection control implementation is verified.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to prohibit access to, or usage of, hosted systems, applications and/or services until applicable cybersecurity & data protection control implementation is verified.
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-1 R-AM-2 R-AM-3 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1
R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
null
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-10 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15
null
- new control
Compliance
Statutory, Regulatory & Contractual Compliance
CPL-01
Mechanisms exist to facilitate the identification and implementation of relevant statutory, regulatory and contractual controls.
- Governance, Risk and Compliance Solution (GRC) tool (SCFConnect, SureCloud,Ostendio, ZenGRC, Archer, RSAM, MetricStream, etc.) - Steering committee
E-CPL-01 E-GOV-10
Does the organization facilitate the identification and implementation of relevant statutory, regulatory and contractual controls?
10
Identify
X
X
null
There is no evidence of a capability to facilitate the identification and implementation of relevant statutory, regulatory and contractual controls.
Compliance (CPL) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist: • IT personnel use an informal process to govern statutory, regulatory and contractual compliance obligations. • IT personnel self-identify a set of controls that are used to conduct cybersecurity & data privacy control assessments. • IT personnel perform internal assessments of cybersecurity & data privacy controls to determine compliance status.
Compliance (CPL) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Compliance activities are decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for compliance activities. • Cybersecurity personnel use a defined set of controls to conduct cybersecurity & data privacy control assessments, as defined by the applicable statutory, regulatory and contractual requirements. • Legal representation is consulted on an as-needed basis. • Cybersecurity personnel perform an informal annual review of existing compliance requirements and researches evolving or new requirements.
Compliance (CPL) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • The Chief Information Security Officer (CISO), or similar function, analyzes the organization’s business strategy to determine prioritized and authoritative guidance for statutory, regulatory and contractual obligations. • The CISO, or similar function, develops a security-focused Concept of Operations (CONOPS) that documents management, operational and technical measures to apply defense-in-depth techniques across the organization to manage compliance efforts. • A steering committee is formally established to provide executive oversight of the cybersecurity & data privacy program with regards to GRC operations. • A Governance, Risk & Compliance (GRC) function, or similar function, provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to ensure compliance requirements are identified and documented. • The GRC function, or similar function: o Ensures data/process owners understand their requirements to manage applicable cybersecurity & data privacy controls through oversight and written guidance. o Provides applicable stakeholders with status reports on control execution to enable security controls oversight. o Works with data/process owners and asset custodians to document and validate the scope of cybersecurity & data privacy controls to ensure statutory, regulatory and/ or contractual compliance obligations are met. o Conducts cybersecurity & data privacy control assessments, on a regular cadence that is defined by the applicable statutory, regulatory and contractual requirements. • Cybersecurity and data privacy controls are centrally managed through a technology solution (e.g., GRC solution) to assign controls, track control activities and report on compliance efforts. • Legal representation is consulted on an as-needed basis.
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to facilitate the identification and implementation of relevant statutory, regulatory and contractual controls.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to facilitate the identification and implementation of relevant statutory, regulatory and contractual controls.
CC2.2 CC2.3
CC3.1-POF14
7.1 9
null
null
null
null
MEA02.01 MEA02.02 MEA03.01 MEA03.02 MEA03.03 MEA03.04
Principle 14 Principle 15
A&A-01 A&A-04 GRC-07 STA-06 STA-09 UEM-14
CLS-04 GVN-02 LGL-03 LGL-04 LGL-05 LGL-06 LGL-07 LGL-08 OPA-05
SO25
null
null
null
4.2.2
null
4.1 9.1 9.2 9.2.1 9.2.2
18.1.1
5.31 8.34
18.1.1
null
6.15 6.15.1 6.15.1.1
5.1
null
null
null
null
Sec 4(I)
GOVERN 1.1
GV.PO-P5 GV.MT-P3
null
null
null
PL-1 PM-8
PL-1
PL-1
PL-1
PL-1 PM-8
PL-1
PL-1
PL-1
PL-1
PM-8
null
PL-1
PL-1
PL-1
3.3 3.3.3 3.3.4 3.4 3.4.1 3.4.2 3.4.3
PL-1 PM-8
PL-1
null
PM-8
PL-1
null
NFO - PL-1
null
null
null
null
null
ID.GV-3 PR.IP-5 DE.DP-2
GV.OC-03 GV.SC-03 GV.SC-09
null
12.1
A3.1 A3.1.1
null
null
null
null
null
null
null
null
null
L.1
null
1.5 1.5.1 7.1.1
null
7.1.1
7.1.1
PROGRAM-1.G.MIL2 PROGRAM-2.I.MIL3
COMP:SG4.SP1 EF:SG3.SP3 EF:SG4.SP1 RRD:SG1.SP1
null
4.1.1 4.2.1 4.2.2 4.3
null
null
null
null
null
null
PL-1 PM-8
6,502
252.204-7008(b) 252.204-7008(c)(1) 252.204-7008(c)(1)(i) 252.204-7008(c)(1)(i)(A) 252.204-7008(c)(1)(i)(B) 252.204-7008(c)(1)(ii) 252.204-7012(b)(1)(i) 252.204-7012(b)(1)(ii) 252.204-7012(b)(2)(i) 252.204-7012(b)(2)(ii)(A) 252.204-7012(b)(2)(ii)(B) 252.204-7012(b)(2)(ii)(C) 252.204-7012(b)(2)(ii)(D) 252.204-7012(b)(3) 252.204-7012(k) 252.204-7012(l) 252.204-7019(b) 252.204-7019(c)(1) 252.204-7019(c)(2) 252.204-7020(c) 252.204-7021(b) 252.204-7021(c)(1) 252.204-7021(c)(2)
null
52.204-21(b)(2) 52.204-21(c)
null
null
§ 11.10 § 11.10(a) § 11.10(b) § 11.10(c) § 11.10(d) § 11.10(e) § 11.10(f) § 11.10(g) § 11.10(h) § 11.10(i) § 11.10(j) § 11.10(k) § 11.10(k)(1) § 11.10(k)(2) § 11.100 § 11.100(c) § 11.100(c)(1) § 11.100(c)(2)
PL-1
PL-1
PL-1
PL-1
PL-1
PL-1
PL-1
PL-1
PL-1
PL-1
null
D1.G.Ov.E.2 D3.PC.Am.B.11
null
null
314.4(c)
164.302 164.318 164.318(a) 164.318(a)(1) 164.318(a)(2) 164.318(b) 164.318(c) 164.534 164.534(a) 164.534(b) 164.534(c)
null
null
null
1.1 1.6 1.7.1 1.7.1.1 1.7.1.2 1.7.2 1.10.1 1.10.2 1.10.3 2.A.1 2.C.9 2.E.1 2.E.2 2.E.4 2.E.4.1 2.E.4.2 2.E.4.3 2.E.4.4 2.E.5.1 2.E.5.2 2.E.6 2.E.6.3 2.F.2 2.F.4 PL-1
null
null
8-104
null
null
null
null
null
5.11
PL-1
PL-1
PL-1
IV.A IV.B IV.B.1 IV.B.2 IV.C.1 IV.C.2 IV.C.2.a IV.C.2.b IV.C.2.c IV.C.2.d IV.C.2.e IV.C.2.e.i IV.C.2.e.ii IV.C.2.e.iii IV.C.2.e.iv IV.C.2.f
null
1798.91.06(a) 1798.91.06(b) 1798.91.06(c) 1798.91.06(d) 1798.91.06(e) 1798.91.06(f) 1798.91.06(g) 1798.91.06(h) 1798.91.06(i)
7010(a)
null
6-1-1305(1) 6-1-1305(6) 6-1-1307(2) 6-1-1307(3) 6-1-1308(6)
null
null
Sec 45(a) Sec 45(b) Sec 45(c) Sec 45(d) Sec 50
null
null
500.19
Sec 4(2)(a) Sec 4(2)(b)(i) Sec 4(2)(b)(ii) Sec 4(2)(b)(ii)(A) Sec 4(2)(b)(ii)(A)(1) Sec 4(2)(b)(ii)(A)(2) Sec 4(2)(b)(ii)(A)(3) Sec 4(2)(b)(ii)(A)(4) Sec 4(2)(b)(ii)(A)(5) Sec 4(2)(b)(ii)(A)(6) Sec 4(2)(b)(ii)(B)(1) Sec 4(2)(b)(ii)(B)(2) Sec 4(2)(b)(ii)(B)(3) Sec 4(2)(b)(ii)(B)(4) Sec 4(2)(b)(ii)(C)(1) Sec 4(2)(b)(ii)(C)(2) Sec 4(2)(b)(ii)(C)(3) Sec 4(2)(b)(ii)(C)(4) Sec 4(2)(c)
null
38-99-20(I)
null
null
PL-1
PL-1
PL-1
Sec 11.175(c)
59.1-576.A 59.1-576.B 59.1-576.C.1 59.1-576.C.2 59.1-576.C.3 59.1-576.C.4 59.1-576.C.5 59.1-576.C.6 59.1-576.C.7 59.1-576.C.8 59.1-576.C.9 59.1-576.C.10 59.1-576.C.11 59.1-576.C.12 59.1-576.C.13 59.1-576.C.14 59.1-576.D 59.1-581.E 59.1-582.A.1 59.1-582.A.2 59.1-582.A.3 59.1-582.A.4 59.1-582.A.5 59.1-582.A.6 59.1-582.A.7 59.1-582.A.8 59.1-582.A.9 59.1-582.B.1 59.1-582.B.2 59.1-582.B.3 59.1-582.B.4 59.1-582.C 59.1-582.D 59.1-582.E 59.1-582.F 59.1-582.G 59.1-582.H
null
3.1(1) 3.8(92) 3.8(93) 3.8(94) 3.8(95) 3.8(96) 3.8(97) 3.8(98)
Art 4.1 Art 4.2 Art 4.3 Art 5.4
Art 2 Art 3 Art 15
Art 1.2 Art 2.1 Art 2.2 Art 3.1 Art 3.2 Art 3.3 Art 6.1 Art 17.3 Art 20.3 Art 23.1 Art 23.2 Art 24.1 Art 24.2 Art 24.3 Art 25.1 Art 25.2 Art 25.3 Art 27.1 Art 27.2 Art 27.3 Art 27.4 Art 27.5 Art 32.1 Art 32.2 Art 32.3 Art 32.4 Art 40.1 Art 40.2 Art 42.2 Art 43 Art 50
Article 21.1
Art 3 Art 29
Principle 3.5.a Principle 3.5.b Principle 3.5.b.i Principle 3.5.b.ii Principle 3.5.b.iii Principle 3.6.a Principle 3.6.b Principle 3.6.b.i Principle 3.6.b.ii Principle 3.6.b.iii Principle 3.6.b.iii.1 Principle 3.6.b.iii.2 Principle 3.6.b.iv Principle 3.6.b.iv.1 Principle 3.6.b.iv.2 Principle 3.6.b.v Principle 3.6.b.vi Principle 3.6.b.vii Principle 3.6.b.viii Principle 3.6.c Principle 3.6.d Principle 3.6.e Principle 3.6.f Principle 3.6.g Principle 3.6.h Principle 3.7.a Principle 3.7.b Principle 3.7.c Principle 3.7.d Principle 3.7.e
Sec 14 Sec 15
Art 16
Art 13
Art 5 Art 41
Sec 5 Sec 32 Sec 33 Sec 34 Sec 35
Art 34
Sec 9 Sec 9a Annex
12.5
SP-01 PI-02 COM-01
Art 10
Sec 7
Sec 2
1.3
Sec 16 Sec 17
Sec 26 Sec 31 Sec 33 Sec 34 Sec 35
4(a) 4(b)(i) 4(b)(ii) 51(1) 51(2)(a) 51(2)(b) 51(2)(c) 52(1)(a) 52(1)(b) 52(1)(c) 52(2) 52(3) 54 55(1)(a) 55(1)(b) 55(2)
Art 3 Art 4
Sec 12 Sec 13 Sec 14
2.1(2) 2.1(3) 3.1(16) 4.1(1) 4.1(6) 4.1(7)
Sec 13 Sec 14
Art 1 Art 36
Art 14 Art 15 Art 16 Art 17
Article 2
Art 7 Art 19
1-4
TPC-20 TPC-21 TPC-43
3.2.2 3.2.3 3.3.13
1-7-1 1-7-2
null
Article 5.1 Article 13 Article 49 Article 59
null
Sec 2 Sec 3 Sec 9 Sec 19 Sec 21
null
7.1.5 [OP.PL.5]
Sec 31
Art 7
Art 12
Sec 15 Sec 16
B3.a
null
null
null
Article 3 Article 25(1) Article 25(2) Article 25(3) Article 27(1) Article 27(2)(a) Article 27(2)(b) Article 27(3)Article 27(4) Article 27(5)
null
null
null
APP Part 11
null
0078 0854
null
28
31 35 35(a) 35(b) 36
Article 46
Sec 4
Article 32 Article 37 Article 38(4) Article 42
Principle 4
Sec 8
null
Article 20 Article 21 Article 22 Article 26(1) Article 26(1)(i) Article 26(1)(ii) Article 26(2) Article 26(3) Article 26(4) Article 26-2(1) Article 26-2(1)(i) Article 26-2(1)(ii) Article 26-2(2) Article 26-2(3) Article 36 Article 37 Article 38 Article 39 Article 51(1) Article 51(2) Article 52(1) Article 53(2) Article 53(3) Article 53(1) Article 53(2) Article 53(3) Article 53(4) Article 54 Article 55
18.1.1
Sec 9
14.1
1.1.64.C.01 1.1.65.C.01 1.1.66.C.01 1.1.66.C.02 1.1.67.C.01
null
Sec 25
Sec 24
3.1(a) 3.1(b) 3.1(c)
3.2.3
Art 3 Art 29
Art 27
Art 9
Art 10.1 Art 10.2
Sec 6
null
Art 7.1 Art 7.2 Art 7.3 Art 7.4 Art 7.5 Art 7.6 Art 7.7 Art 7.8 Art 7.9 Art 7.10
null
null
Principle 7
Art 7
Art 4
Art 10
Art 19
Art 9 Art 16 Art 17
Art 23
null
null
null
x
FAR 52.204-21 NAIC
x
x
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-1 R-AM-2 R-AM-3 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-GV-8 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1 R-SA-2
R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
R-SA-2
NT-1 NT-2 NT-3 NT-4 NT-5 NT-6 NT-7 NT-8 NT-9 NT-10 NT-11 NT-12 NT-13 NT-14 MT-1 MT-2 MT-3 MT-4 MT-5 MT-6 MT-7 MT-8 MT-9 MT-10 MT-11 MT-12 MT-13 MT-14 MT-15 MT-16
NT-1
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15
MT-16
- updated DFARS mapping
Compliance
Non-Compliance Oversight
CPL-01.1
Mechanisms exist to document and review instances of non-compliance with statutory, regulatory and/or contractual obligations to develop appropriate risk mitigation actions.
null
E-CPL-05
Does the organization document and review instances of non-compliance with statutory, regulatory and/or contractual obligations to develop appropriate risk mitigation actions?
9
Respond
null
X
null
There is no evidence of a capability to document and review instances of non-compliance with statutory, regulatory and/ or contractual obligations to develop appropriate risk mitigation actions.
SP-CMM1 is N/A, since a structured process is required to document and review instances of non-compliance with statutory, regulatory and/ or contractual obligations to develop appropriate risk mitigation actions.
Compliance (CPL) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Compliance activities are decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for compliance activities. • Cybersecurity personnel use a defined set of controls to conduct cybersecurity & data privacy control assessments, as defined by the applicable statutory, regulatory and contractual requirements. • Legal representation is consulted on an as-needed basis.
Compliance (CPL) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • A Governance, Risk & Compliance (GRC) function, or similar function, provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to ensure compliance requirements are identified and documented. • The GRC function, or similar function: o Ensures data/process owners understand their requirements to manage applicable cybersecurity & data privacy controls through oversight and written guidance. o Provides applicable stakeholders with status reports on control execution to enable security controls oversight. o Works with data/process owners and asset custodians to document and validate the scope of cybersecurity & data privacy controls to ensure statutory, regulatory and/ or contractual compliance obligations are met. o Conducts cybersecurity & data privacy control assessments, on a regular cadence that is defined by the applicable statutory, regulatory and contractual requirements. • Cybersecurity and data privacy controls are centrally managed through a technology solution (e.g., GRC solution) to assign controls, track control activities and report on compliance efforts. • Legal representation is consulted on an as-needed basis.
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to document and review instances of non-compliance with statutory, regulatory and/ or contractual obligations to develop appropriate risk mitigation actions.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to document and review instances of non-compliance with statutory, regulatory and/ or contractual obligations to develop appropriate risk mitigation actions.
null
CC1.1-POF4 CC4.2-POF1 CC4.2-POF2 CC4.2-POF3
null
null
null
null
null
null
null
A&A-05 A&A-06 GRC-04
GVN-04
null
null
null
null
null
10.1
9.1 9.1(a) 9.1(b) 9.1(c) 9.1(d) 9.1(e) 9.1(f) 10.2 10.2(a) 10.2(a)(1) 10.2(a)(2) 10.2(b) 10.2(b)(1) 10.2(b)(2) 10.2(b)(3) 10.2(c) 10.2(d) 10.2(e) 10.2(f) 10.2(g)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
GV.OC-03
null
null
12.4.2
null
null
null
null
null
null
null
12.4.2
null
P.10.6
null
1.5.1
null
null
null
ASSET-5.E.MIL3 ASSET-5.F.MIL3 THREAT-3.F.MIL3 RISK-5.F.MIL3 ACCESS-4.F.MIL3 SITUATION-4.F.MIL3 RESPONSE-5.F.MIL3 THIRD-PARTIES-3.F.MIL3 WORKFORCE-4.F.MIL3 ARCHITECTURE-5.F.MIL3 PROGRAM-3.F.MIL3
null
null
null
null
null
null
null
null
null
null
null
252.204-7019(b)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Article 21.4
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
1-6 1-6-1
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
30 31
29 35 35(a) 35(b) 36
null
null
Article 54
null
null
null
Article 40(1) Article 40(2) Article 40(3)
4.7.1 4.7.1.1 4.7.1.2 4.7.1.3 4.7.1.4 4.7.1.5 4.7.1.6 4.7.1.7
null
null
1.1.68.C.01 1.1.69.C.01 1.1.69.C.02
null
null
null
null
3.2.3 4.5.2 4.5.3
null
null
null
null
null
5.7
null
6.10 6.14
null
null
null
null
null
null
null
null
null
null
null
null
null
null
x
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-1 R-AM-2 R-AM-3 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-GV-8 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1 R-SA-2
R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
R-SA-2
NT-1 NT-2 NT-3 NT-4 NT-5 NT-6 NT-7 NT-8 NT-9 NT-10 NT-11 NT-12 NT-13 NT-14 MT-1 MT-2 MT-3 MT-4 MT-5 MT-6 MT-7 MT-8 MT-9 MT-10 MT-11 MT-12 MT-13 MT-14 MT-15
NT-1
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15
null
- updated DFARS mapping
Compliance
Compliance Scope
CPL-01.2
Mechanisms exist to document and validate the scope of cybersecurity & data privacy controls that are determined to meet statutory, regulatory and/or contractual compliance obligations.
null
E-AST-02 E-CPL-02 E-GOV-10
Does the organization document and validate the scope of cybersecurity & data privacy controls that are determined to meet statutory, regulatory and/or contractual compliance obligations?
10
Identify
X
X
X
There is no evidence of a capability to document and validate the scope of cybersecurity & data privacy controls that are determined to meet statutory, regulatory and/ or contractual compliance obligations.
SP-CMM1 is N/A, since a structured process is required to document and validate the scope of cybersecurity & data privacy controls that are determined to meet statutory, regulatory and/ or contractual compliance obligations.
Compliance (CPL) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Compliance activities are decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for compliance activities. • Cybersecurity personnel use a defined set of controls to conduct cybersecurity & data privacy control assessments, as defined by the applicable statutory, regulatory and contractual requirements. • Data process owners and asset custodians are responsible for performing compliance scoping of control applicability for statutory, regulatory and/ or contractual compliance obligations.
Compliance (CPL) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • A Governance, Risk & Compliance (GRC) function, or similar function, provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to ensure compliance requirements are identified and documented. • The GRC function, or similar function: o Ensures data/process owners understand their requirements to manage applicable cybersecurity & data privacy controls through oversight and written guidance. o Provides applicable stakeholders with status reports on control execution to enable security controls oversight. o Works with data/process owners and asset custodians to document and validate the scope of cybersecurity & data privacy controls to ensure statutory, regulatory and/ or contractual compliance obligations are met. o Conducts cybersecurity & data privacy control assessments, on a regular cadence that is defined by the applicable statutory, regulatory and contractual requirements. • Cybersecurity and data privacy controls are centrally managed through a technology solution (e.g., GRC solution) to assign controls, track control activities and report on compliance efforts. • GRC personnel assist data process owners and asset custodians with performing compliance scoping of control applicability for statutory, regulatory and/ or contractual compliance obligations.
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to document and validate the scope of cybersecurity & data privacy controls that are determined to meet statutory, regulatory and/ or contractual compliance obligations.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to document and validate the scope of cybersecurity & data privacy controls that are determined to meet statutory, regulatory and/ or contractual compliance obligations.
null
CC2.2-POF9 CC5.2-POF2
7.1
null
null
null
null
null
null
null
null
null
null
null
null
null
null
4.3 4.3(a) 4.3(b) 4.3(c)
null
null
null
null
null
null
null
null
null
null
null
GOVERN 1.1 GOVERN 1.3
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
GV.OC-03
null
null
12.5 12.5.1 12.5.2 A3.2 A3.2.1 A3.2.3
null
null
null
null
null
null
12.5.1 12.5.2
12.5.1 12.5.2
null
L.6.1
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
B3.a
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
4.4.4 4.4.4.1 4.6.2.4
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
R-AC-1 R-AM-3 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1
R-AC-1
null
null
null
null
null
R-AM-3
null
null
null
null
null
null
null
null
null
null
null
null
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
null
MT-8 MT-9 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
MT-8
MT-9
null
null
MT-12
MT-13
MT-14
MT-15
null
null
Compliance
Cybersecurity & Data Protection Controls Oversight
CPL-02
Mechanisms exist to provide a cybersecurity & data protection controls oversight function that reports to the organization's executive leadership.
- Governance, Risk and Compliance Solution (GRC) tool (SCFConnect, SureCloud,Ostendio, ZenGRC, Archer, RSAM, MetricStream, etc.) - Steering committee - Formalized SDLC program - Formalized DevOps program - Information Assurance Program (IAP) - Security Test & Evaluation (STE)
E-CPL-07 E-CPL-09 E-GOV-04 E-GOV-05 E-GOV-06 E-GOV-13 E-RSK-03
Does the organization provide a cybersecurity & data protection controls oversight function that reports to the organization's executive leadership?
10
Detect
X
X
X
There is no evidence of a capability to provide a cybersecurity & data privacy controls oversight function that reports to the organization's executive leadership.
Compliance (CPL) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist: • IT personnel use an informal process to govern statutory, regulatory and contractual compliance obligations. • IT personnel self-identify a set of controls that are used to conduct cybersecurity & data privacy control assessments. • IT personnel perform internal assessments of cybersecurity & data privacy controls to determine compliance status.
Compliance (CPL) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Compliance activities are decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for compliance activities. • Cybersecurity personnel use a defined set of controls to conduct cybersecurity & data privacy control assessments, as defined by the applicable statutory, regulatory and contractual requirements. • Cybersecurity personnel generate a formal report for each security assessment to document the assessment of cybersecurity & data privacy controls. • Compliance reporting is performed, as required.
Compliance (CPL) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • A Governance, Risk & Compliance (GRC) function, or similar function, provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to ensure compliance requirements are identified and documented. • The GRC function, or similar function: o Ensures data/process owners understand their requirements to manage applicable cybersecurity & data privacy controls through oversight and written guidance. o Provides applicable stakeholders with status reports on control execution to enable security controls oversight. o Works with data/process owners and asset custodians to document and validate the scope of cybersecurity & data privacy controls to ensure statutory, regulatory and/ or contractual compliance obligations are met. o Conducts cybersecurity & data privacy control assessments, on a regular cadence that is defined by the applicable statutory, regulatory and contractual requirements. • Cybersecurity and data privacy controls are centrally managed through a technology solution (e.g., GRC solution) to assign controls, track control activities and report on compliance efforts. • An Audit Committee, or similar function: o Reviews the findings from security assessments and oversees long-term remediation efforts, when applicable. o Provides senior leaders with insights into the appropriateness of the organization's technology and information governance processes through recurring audits on pertinent cybersecurity & data privacy-related topics. o Governs changes to compliance operations to ensure its stability, reliability and ongoing improvement.
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to provide a cybersecurity & data privacy controls oversight function that reports to the organization's executive leadership.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to provide a cybersecurity & data privacy controls oversight function that reports to the organization's executive leadership.
CC1.1 CC2.2 CC2.3
CC1.1-POF3 CC4.2-POF1 CC4.2-POF2 CC4.2-POF3
9
null
null
null
null
MEA02.01 MEA02.02 MEA04.01 MEA04.02 MEA04.03 MEA04.04 MEA04.05 MEA04.06 MEA04.07 MEA04.08 MEA04.09
Principle 1 Principle 14 Principle 15 Principle 19 Principle 20
A&A-02 A&A-05 CEK-09 LOG-10 STA-11
CCM-07 GVN-04 LGL-03 SAP-10
SO25
8.2.7
null
RQ-05-17
9.3 9.3.1 9.3.2 9.3.3 9.3.3.1 9.3.3.2
9.1 9.3 10.2
8.1 10.1
12.7.1 18.2.2 18.2.3
5.31 5.36 6.8 8.8 8.34
12.7.1 18.2.2 18.2.3
null
null
5.10 5.11 5.12
null
null
T1001, T1001.001, T1001.002, T1001.003, T1003, T1003.001, T1003.002, T1003.003, T1003.004, T1003.005, T1003.006, T1003.007, T1003.008, T1008, T1021.002, T1021.005, T1029, T1030, T1036, T1036.003, T1036.005, T1036.007, T1037, T1037.002, T1037.003, T1037.004, T1037.005, T1041, T1046, T1048, T1048.001, T1048.002, T1048.003, T1052, T1052.001, T1053.006, T1055.009, T1056.002, T1059, T1059.005, T1059.007, T1068, T1070, T1070.001, T1070.002, T1070.003, T1071, T1071.001, T1071.002, T1071.003, T1071.004, T1072, T1078, T1078.001, T1078.003, T1078.004, T1080, T1090, T1090.001, T1090.002, T1090.003, T1095, T1102, T1102.001, T1102.002, T1102.003, T1104, T1105, T1110, T1110.001, T1110.002, T1110.003, T1110.004, T1111, T1132, T1132.001, T1132.002, T1176, T1185, T1187, T1189, T1190, T1195, T1195.001, T1195.002, T1197, T1201, T1203, T1204, T1204.001, T1204.002, T1204.003, T1205, T1205.001, T1210, T1211, T1212, T1213, T1213.001, T1213.002, T1213.003, T1218, T1218.002, T1218.010, T1218.011, T1218.012, T1219, T1221, T1222, T1222.001, T1222.002, T1489, T1498, T1498.001, T1498.002, T1499, T1499.001, T1499.002, T1499.003, T1499.004, T1528, T1530, T1537, T1539, T1542.004, T1542.005, T1543, T1543.002, T1546.003, T1546.004, T1546.013, T1547.003, T1547.011, T1547.013, T1548, T1548.003, T1550.003, T1552, T1552.001, T1552.002, T1552.004, T1552.005, T1553.003, T1555, T1555.001, T1555.002, T1556, T1556.001, T1557, T1557.001, T1557.002, T1558, T1558.002, T1558.003, T1558.004, T1562, T1562.001, T1562.002, T1562.004, T1562.006, T1563.001, T1564.004, T1565, T1565.001, T1565.003, T1566, T1566.001, T1566.002, T1566.003, T1567, T1568, T1568.002, T1569, T1569.002, T1570, T1571, T1572, T1573, T1573.001, T1573.002, T1574, T1574.004, T1574.007, T1574.008, T1574.009, T1598, T1598.001, T1598.002, T1598.003, T1599, T1599.001, T1602, T1602.001, T1602.002
null
Sec 4(C)(4) Sec 4(C)(4)(a) Sec 4(C)(4)(b) Sec 4(C)(4)(c) Sec 4(E)(2)(a) Sec 4(E)(2)(b) Sec 4(E)(3)
GOVERN 1.5
GV.MT-P4 PR.PO-P5
null
S-5
null
CA-7 CA-7(1) PM-14
CA-7
CA-7 CA-7(1)
CA-7 CA-7(1)
CA-7 CA-7(1) PM-14
CA-7
CA-7
CA-7 CA-7(1)
CA-7 CA-7(1)
PM-14
null
CA-7
CA-7 CA-7(1)
CA-7 CA-7(1)
3.3.8
PM-14
null
null
PM-14
PM-14
null
3.12.1 3.12.3
3.12.1 3.12.3
3.12.1[a] 3.12.1[b] 3.12.3
null
null
PO.2.3
DE.DP-5 PR.IP-5 PR.IP-7
GV.OC-03 ID.IM-01
null
12.11 12.11.1
10.7 10.7.1 10.7.2 10.7.3
null
null
null
null
null
null
10.7.2 10.7.3
10.7.1 10.7.2 10.7.3
null
P.2.2
null
1.5.1 5.2.5 9.3
null
null
null
ASSET-5.E.MIL3 ASSET-5.F.MIL3 THREAT-3.F.MIL3 RISK-5.F.MIL3 ACCESS-4.F.MIL3 SITUATION-4.F.MIL3 RESPONSE-5.F.MIL3 THIRD-PARTIES-3.F.MIL3 WORKFORCE-4.F.MIL3 ARCHITECTURE-5.F.MIL3 PROGRAM-3.F.MIL3
COMP:SG4.SP1 CTRL:SG3.SP1 GG2.GP9 GG2.GP10 MON:SG1.SP1 MON:SG1.SP3 OPD:SG1.SP1 OTA:SG4.SP1 RISK:SG6.SP2
null
null
null
CA.L2-3.12.1 CA.L2-3.12.3
CA.L2-3.12.1 CA.L2-3.12.3
null
CA.L2-3.12.1 CA.L2-3.12.3
CA.L2-3.12.1 CA.L2-3.12.3
CA-7 CA-7(1) PM-14
null
null
null
null
null
null
§ 11.10 § 11.10(a) § 11.10(b) § 11.10(c) § 11.10(d) § 11.10(e) § 11.10(f) § 11.10(g) § 11.10(h) § 11.10(i) § 11.10(j) § 11.10(k) § 11.10(k)(1) § 11.10(k)(2)
CA-7 CA-7(1)
CA-7
CA-7 CA-7(1)
CA-7 CA-7(1)
CA-7
CA-7 CA-7(1)
CA-7
CA-7 CA-7(1)
CA-7 CA-7(1)
CA-7
null
D5.IR.Pl.Int.3 D1.RM.RMP.E.2 D1.G.Ov.A.2
null
null
314.4(d)(1)
164.308(a)(8)
null
null
null
1.6 CA-7 CA-7(1) PM-14
null
null
8-202 8-302 8-610 8-614
null
null
null
null
null
5.7 5.11
CA-7
CA-7 CA-7(1)
CA-7 CA-7(1)
null
45.48.520
null
null
null
null
null
null
null
null
null
null
Sec 4(2)(b)(ii)(B)(4)
622(2)(B)(iii)
38-99-20(C)(4) 38-99-20(C)(4)(a) 38-99-20(C)(4)(b) 38-99-20(C)(4)(c) 38-99-20(E)(2)(a) 38-99-20(E)(2)(b) 38-99-20(E)(3)
null
Sec 10 Sec 11
CA-7 PM-14
CA-7
CA-7 CA-7(1)
null
null
§ 2447(b)(2)(C) § 2447(b)(8) § 2447(b)(8)(A)
3.4.6(41) 3.4.6(42) 3.4.6(43) 3.4.6(43)(a) 3.4.6(43)(b) 3.4.6(44) 3.4.6(45) 3.4.6(46) 3.4.6(47) 3.4.6(48)
null
null
Art 5.2
null
Art 3
Principle 3.4.b
null
null
Art 13
Art 41
Sec 5 Sec 32 Sec 33 Sec 34 Sec 35
Art 34
Sec 9 Sec 9a Annex
5.6
SP-03
Art 10
Sec 7
Sec 2
1.3 3.1
Sec 16 Sec 17
Sec 31 Sec 33 Sec 34 Sec 35
null
Art 3 Art 4
Sec 12 Sec 13 Sec 14
4.1(5)(a) 4.1(5)(b) 4.1(5)(c) 4.1(5)(d) 4.1(5)(e) 4.1(5)(f) 4.1(5)(g) 4.1(5)(h) 4.1(5)(i) 4.1(5)(j) 4.1(6) 4.1(7)
Sec 13 Sec 14
Art 1 Art 36
Art 14 Art 15 Art 16 Art 17
null
Art 7 Art 19
1-4
null
3.2.4
1-3-2
1-6 1-6-1
null
null
Sec 8 Sec 19 Sec 21
null
9
Sec 31
Art 7
Art 12
Sec 15 Sec 16
B3.a
null
null
null
null
null
null
null
APP Part 11
null
null
null
29 30 58(b) 58(c)
27 27(a) 27(b) 27(c) 27(d) 27(e) 29
null
Sec 4
Article 54
Principle 4
Sec 8
null
Article 21
4.6 4.6.1 4.6.2 4.6.2.2 4.6.2.6 4.6.3 4.6.3.1 4.6.3.2 4.6.2.3 4.6.2.4 12.7.1 18.2.2 18.2.3
Sec 9
null
6.1.7.C.01 23.2.18.C.01
null
Sec 25 Sec 29
Sec 24
null
3.2.3
null
Art 27
Art 9
null
null
5.7
null
6.10
null
Principle 7
Art 7
null
null
null
null
null
null
null
null
x
NAIC OR 6464A
null
x
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-1 R-AM-2 R-AM-3 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-GV-8 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1 R-SA-2
R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
R-SA-2
NT-1 NT-2 NT-3 NT-4 NT-5 NT-6 NT-7 NT-8 NT-9 NT-10 NT-11 NT-12 NT-13 NT-14 MT-1 MT-2 MT-3 MT-4 MT-5 MT-6 MT-7 MT-8 MT-9 MT-10 MT-11 MT-12 MT-13 MT-14 MT-15
NT-1
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15
null
- renamed control - wordsmithed control
Compliance
Internal Audit Function
CPL-02.1
Mechanisms exist to implement an internal audit function that is capable of providing senior organization management with insights into the appropriateness of the organization's technology and information governance processes.
null
E-CPL-04 E-CPL-07
Does the organization implement an internal audit function that is capable of providing senior organization management with insights into the appropriateness of the organization's technology and information governance processes?
5
Detect
null
X
null
There is no evidence of a capability to implement an internal audit function that is capable of providing senior organization management with insights into the appropriateness of the organization's technology and information governance processes.
SP-CMM1 is N/A, since a structured process is required to implement an internal audit function that is capable of providing senior organization management with insights into the appropriateness of the organization's technology and information governance processes.
SP-CMM2 is N/A, since a well-defined process is required to implement an internal audit function that is capable of providing senior organization management with insights into the appropriateness of the organization's technology and information governance processes.
Compliance (CPL) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • A Governance, Risk & Compliance (GRC) function, or similar function, provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to ensure compliance requirements are identified and documented. • The GRC function, or similar function: o Ensures data/process owners understand their requirements to manage applicable cybersecurity & data privacy controls through oversight and written guidance. o Provides applicable stakeholders with status reports on control execution to enable security controls oversight. o Works with data/process owners and asset custodians to document and validate the scope of cybersecurity & data privacy controls to ensure statutory, regulatory and/ or contractual compliance obligations are met. o Conducts cybersecurity & data privacy control assessments, on a regular cadence that is defined by the applicable statutory, regulatory and contractual requirements. • Cybersecurity and data privacy controls are centrally managed through a technology solution (e.g., GRC solution) to assign controls, track control activities and report on compliance efforts. • An assessor from within a GRC function, or similar function, is selected or a third-party assessor is contracted to perform an independent assessment of cybersecurity & data privacy controls.
Compliance (CPL) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to implement an internal audit function that is capable of providing senior organization management with insights into the appropriateness of the organization's technology and information governance processes.
null
CC4.1-POF1 CC4.1-POF2 CC4.1-POF3 CC4.1-POF4 CC4.1-POF5 CC4.1-POF6 CC4.1-POF7 CC4.1-POF8
null
null
null
null
null
APO02.04 MEA02.01 MEA02.02 MEA02.03 MEA02.04 MEA04.01 MEA04.02 MEA04.03 MEA04.04 MEA04.05 MEA04.06 MEA04.07 MEA04.08 MEA04.09
Principle 19 Principle 20
A&A-02 A&A-03 A&A-05 CEK-09 LOG-10
GVN-04
null
null
null
RQ-05-17
9.2 9.2.1 9.2.2
9.1
9.2 9.2.1 9.2.1(a)(1) 9.2.1(a)(2) 9.2.1(b) 9.2.2 9.2.2(a) 9.2.2(b) 9.2.2(c)
12.7.1
5.35 8.34
12.7.1
null
null
null
null
null
null
null
Sec 4(E)(2)(a) Sec 4(E)(2)(b)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
3.12.1
3.12.1
null
null
null
null
null
ID.IM-02 ID.IM-03
null
null
null
null
null
null
null
null
null
null
null
null
L.8
null
1.5.1
null
null
null
null
null
null
5.11
null
CA.L2-3.12.1
null
null
CA.L2-3.12.1
CA.L2-3.12.1
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
38-99-20(E)(2)(a) 38-99-20(E)(2)(b)
null
null
null
null
null
null
null
§ 2447(b)(2)(C) § 2447(b)(8) § 2447(b)(8)(A)
3.3.1(11) 3.3.6(25)
null
null
null
null
null
Principle 3.4.a Principle 3.4.b
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
1-4-2 2-13-4
null
3.2.5
1-8-1 1-8-3
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
46 60
31 32 33 34 34(a) 34(b)
null
null
Article 54
null
null
null
null
4.6.2 4.6.2.2 4.6.2.3 12.7.1
null
null
null
null
null
null
null
15.1.1 15.1.2 15.1.3 15.1.4
null
null
null
null
null
5.4 5.6
null
6.17 6.18 6.19 6.20
null
null
null
null
null
null
null
null
null
null
null
null
NAIC
null
x
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-1 R-AM-2 R-AM-3 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-GV-8 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1 R-SA-2
R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
R-SA-2
NT-1 NT-2 NT-3 NT-4 NT-5 NT-6 NT-7 NT-8 NT-9 NT-10 NT-11 NT-12 NT-13 NT-14 MT-1 MT-2 MT-3 MT-4 MT-5 MT-6 MT-7 MT-8 MT-9 MT-10 MT-11 MT-12 MT-13 MT-14 MT-15
NT-1
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Compliance
Cybersecurity & Data Protection Assessments
CPL-03
Mechanisms exist to ensure managers regularly review the processes and documented procedures within their area of responsibility to adhere to appropriate cybersecurity & data protection policies, standards and other applicable requirements.
- Information Assurance Program (IAP) - Security Test & Evaluation (STE) - Governance, Risk and Compliance Solution (GRC) tool (SCFConnect, SureCloud,Ostendio, ZenGRC, Archer, RSAM, MetricStream, etc.)
E-CPL-05 E-CPL-07
Does the organization ensure managers regularly review the processes and documented procedures within their area of responsibility to adhere to appropriate cybersecurity & data protection policies, standards and other applicable requirements?
10
Detect
null
X
X
There is no evidence of a capability to ensure managers regularly review the processes and documented procedures within their area of responsibility to adhere to appropriate cybersecurity & data protection policies, standards and other applicable requirements.
Compliance (CPL) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist: • IT personnel use an informal process to govern statutory, regulatory and contractual compliance obligations. • IT personnel self-identify a set of controls that are used to conduct cybersecurity & data privacy control assessments. • IT personnel perform internal assessments of cybersecurity & data privacy controls to determine compliance status.
Compliance (CPL) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Compliance activities are decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for compliance activities. • Cybersecurity personnel use a defined set of controls to conduct cybersecurity & data privacy control assessments, as defined by the applicable statutory, regulatory and contractual requirements. • Cybersecurity personnel either use an impartial member of its team or a third-party assessor to perform an independent assessment of cybersecurity & data privacy controls.
Compliance (CPL) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • A Governance, Risk & Compliance (GRC) function, or similar function, provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to ensure compliance requirements are identified and documented. • The GRC function, or similar function: o Ensures data/process owners understand their requirements to manage applicable cybersecurity & data privacy controls through oversight and written guidance. o Provides applicable stakeholders with status reports on control execution to enable security controls oversight. o Works with data/process owners and asset custodians to document and validate the scope of cybersecurity & data privacy controls to ensure statutory, regulatory and/ or contractual compliance obligations are met. o Conducts cybersecurity & data privacy control assessments, on a regular cadence that is defined by the applicable statutory, regulatory and contractual requirements. • Cybersecurity and data privacy controls are centrally managed through a technology solution (e.g., GRC solution) to assign controls, track control activities and report on compliance efforts. • Cybersecurity personnel either use an impartial member of its team or a third-party assessor to perform an independent assessment of cybersecurity & data privacy controls.
Compliance (CPL) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to ensure managers regularly review the processes and documented procedures within their area of responsibility to adhere to appropriate cybersecurity & data protection policies, standards and other applicable requirements.
CC4.1
CC1.1-POF3
9
null
null
null
null
MEA02.01 MEA02.02 MEA02.03 MEA02.04
Principle 16
A&A-02 A&A-05 CEK-09 LOG-10 STA-11
GVN-04 SAP-10
null
10.2.4
null
RQ-05-17
null
9.2
8.1 9.1 9.1(a) 9.1(b) 9.1(c) 9.1(d) 9.1(e) 9.1(f)
18.2.2
5.35 5.36 8.34
18.2.2
null
6.15.2.2
5.12
null
null
T1190, T1195, T1195.001, T1195.002, T1210
null
Sec 4(C)(4) Sec 4(E)(2)(a) Sec 4(E)(2)(b)
GOVERN 1.5
ID.DE-P5
null
A-3 A-4
null
CA-2
CA-2
CA-2
CA-2
CA-2
CA-2
CA-2
CA-2
CA-2
null
null
CA-2
CA-2
CA-2
3.4.9
CA-2
CA-2
null
null
CA-2
CA-2
3.12.1
3.12.1
null
A.03.12.01
null
null
null
ID.IM-02 ID.IM-03
null
null
10.7 10.7.1 10.7.2 10.7.3 11.1 12.4.2
null
null
null
null
null
null
10.7.2 10.7.3
10.7.1 10.7.2 10.7.3 12.4.2
null
C.1.9
null
1.5.1 1.5.2 9.3
null
null
null
ASSET-5.E.MIL3 ASSET-5.F.MIL3 THREAT-3.F.MIL3 RISK-5.F.MIL3 ACCESS-4.F.MIL3 SITUATION-4.F.MIL3 RESPONSE-5.F.MIL3 THIRD-PARTIES-3.F.MIL3 WORKFORCE-4.F.MIL3 ARCHITECTURE-5.F.MIL3 PROGRAM-3.F.MIL3
CTRL:SG4.SP1 RISK:SG3.SP1
null
null
null
CA.L2-3.12.1
null
null
CA.L2-3.12.1
CA.L2-3.12.1
CA-2
null
null
null
null
null
null
§ 11.10 § 11.10(a) § 11.10(b) § 11.10(c) § 11.10(d) § 11.10(e) § 11.10(f) § 11.10(g) § 11.10(h) § 11.10(i) § 11.10(j) § 11.10(k) § 11.10(k)(1) § 11.10(k)(2)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
314.4(d)(1)
164.308(a)(8)
null
null
null
1.6 1.6.1 1.6.2 1.6.3 2.D.3 CA-2
null
null
8-610
4.1 4.4
null
null
null
null
5.11
null
null
null
null
null
null
null
null
null
null
null
null
17.03(2)(h)
null
null
Sec 4(2)(b)(ii)(B)(4)
622(2)(B)(i) 622(2)(B)(ii) 622(2)(B)(iii) 622(2)(B)(iv)
38-99-20(C)(4) 38-99-20(E)(2)(a) 38-99-20(E)(2)(b)
null
Sec 11
CA-2
null
null
null
null
null
3.3.6(26) 3.3.6(27) 3.4.6(41) 3.4.6(42) 3.4.6(43) 3.4.6(43)(a) 3.4.6(43)(b) 3.4.6(44) 3.4.6(45) 3.4.6(46) 3.4.6(47) 3.4.6(48)
null
null
Art 5.2 Art 32.3
Article 21.1
Art 3 Art 29
Principle 3.4.b Principle 3.6.a Principle 3.6.b Principle 3.6.b.i Principle 3.6.b.ii Principle 3.6.b.iii Principle 3.6.b.iii.1 Principle 3.6.b.iii.2 Principle 3.6.b.iv Principle 3.6.b.iv.1 Principle 3.6.b.iv.2 Principle 3.6.b.v Principle 3.6.b.vi Principle 3.6.b.vii Principle 3.6.b.viii Principle 3.6.c Principle 3.6.d Principle 3.6.e Principle 3.6.f Principle 3.6.g Principle 3.6.h Principle 3.7.a Principle 3.7.b Principle 3.7.c Principle 3.7.d Principle 3.7.e
null
null
Art 13
Art 41
null
Art 34
null
5.6
COM-03
null
Sec 7
Sec 2
3.1
Sec 16 Sec 17
Sec 31
null
Art 3 Art 4
Sec 12 Sec 13 Sec 14
null
Sec 13 Sec 14
Art 1 Art 36
Art 14 Art 15
Article 11.7 Article 11.8
Art 7
1-4-1 2-13-4
null
3.2.4 3.2.5
1-3-2 1-8-1
1-6 1-6-1 1-6-2
null
null
Sec 8 Sec 19 Sec 21
null
null
Sec 31
null
null
null
B3.a
null
null
null
null
null
null
null
null
null
null
null
null
30
null
null
Article 38(1) Article 38(2) Article 40
null
null
null
Article 40(1) Article 40(2) Article 40(3)
4.6.1 4.6.2 4.6.2.2 4.6.2.5 4.2.6.6 4.6.2.7 18.2.2
Sec 9
null
4.3.16.C.01 6.1.7.C.01 6.1.9.C.01 23.2.18.C.01
null
Sec 25
Sec 24
null
4.5.1
null
null
Art 9
null
null
null
null
6.10
null
null
Art 7
null
null
null
null
null
null
null
null
x
MA 201 CMR 17 OR 6464A NAIC
null
x
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-1 R-AM-2 R-AM-3 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1
R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
null
NT-1 NT-2 NT-3 NT-4 NT-5 NT-6 NT-7 NT-8 NT-9 NT-10 NT-11 NT-12 NT-13 NT-14 MT-1 MT-2 MT-3 MT-4 MT-5 MT-6 MT-7 MT-8 MT-9 MT-10 MT-11 MT-12 MT-13 MT-14 MT-15
NT-1
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15
null
- renamed control - wordsmithed control
Compliance
Independent Assessors
CPL-03.1
Mechanisms exist to utilize independent assessors to evaluate cybersecurity & data protection controls at planned intervals or when the system, service or project undergoes significant changes.
- Information Assurance Program (IAP) - Security Test & Evaluation (STE)
E-CPL-07
Does the organization utilize independent assessors to evaluate cybersecurity & data protection controls at planned intervals or when the system, service or project undergoes significant changes?
6
Detect
null
X
null
There is no evidence of a capability to utilize independent assessors to evaluate cybersecurity & data protection controls at planned intervals or when the system, service or project undergoes significant changes.
Compliance (CPL) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist: • IT personnel use an informal process to govern statutory, regulatory and contractual compliance obligations. • IT personnel self-identify a set of controls that are used to conduct cybersecurity & data privacy control assessments. • IT personnel perform internal assessments of cybersecurity & data protection controls to determine compliance status. • F or specific statutory, regulatory and/ or contractual obligations, stakeholders may contract with a third-party auditor/assessor to perform an independent assessment of cybersecurity & data protection controls.
Compliance (CPL) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Compliance activities are decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel identify cybersecurity & data protection controls that are appropriate to address applicable statutory, regulatory and contractual requirements for compliance activities. • Cybersecurity personnel use a defined set of controls to conduct cybersecurity & data privacy control assessments, as defined by the applicable statutory, regulatory and contractual requirements. • Cybersecurity personnel either use an impartial member of its team or a third-party assessor to perform an independent assessment of cybersecurity & data protection controls.
Compliance (CPL) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • A Governance, Risk & Compliance (GRC) function, or similar function, provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data protection controls to ensure compliance requirements are identified and documented. • The GRC function, or similar function: o Ensures data/process owners understand their requirements to manage applicable cybersecurity & data protection controls through oversight and written guidance. o Provides applicable stakeholders with status reports on control execution to enable security controls oversight. o Works with data/process owners and asset custodians to document and validate the scope of cybersecurity & data protection controls to ensure statutory, regulatory and/ or contractual compliance obligations are met. o Conducts cybersecurity & data privacy control assessments, on a regular cadence that is defined by the applicable statutory, regulatory and contractual requirements. • Cybersecurity and data privacy controls are centrally managed through a technology solution (e.g., GRC solution) to assign controls, track control activities and report on compliance efforts. • Cybersecurity personnel either use an impartial member of its team or a third-party assessor to perform an independent assessment of cybersecurity & data protection controls.
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to utilize independent assessors to evaluate cybersecurity & data protection controls at planned intervals or when the system, service or project undergoes significant changes.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to utilize independent assessors to evaluate cybersecurity & data protection controls at planned intervals or when the system, service or project undergoes significant changes.
null
null
null
null
null
null
null
MEA03.03 MEA03.04 MEA04.01
null
A&A-05 CEK-09
null
null
null
null
RQ-05-17
null
9.2
null
18.2.1
5.35
18.2.1
null
6.15.2 6.15.2.1
null
null
null
null
null
null
null
null
null
null
null
CA-7(1)
null
CA-7(1)
CA-7(1)
CA-7(1)
null
null
CA-7(1)
CA-7(1)
null
null
null
CA-7(1)
CA-7(1)
3.4.9
null
null
null
null
null
null
NFO - CA-7(1)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
B.1.1.28
null
1.5.1 1.5.2
null
null
null
null
null
null
5.11 5.11.1 5.11.1.1 5.11.1.2 5.11.2 5.11.3 5.11.4
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
5.11
null
null
null
null
45.48.520
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Sec 11
null
null
null
null
null
null
3.3.6(25) 3.4.6(41) 3.4.6(42) 3.4.6(42) 3.4.6(43)(a) 3.4.6(43)(b)
null
null
Art 40.2 Art 42.1 Art 42.2 Art 42.3 Art 42.4 Art 42.6 Art 42.7 Art 43.2
null
Art 3
null
null
null
null
null
null
null
null
null
COM-03
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
1-4-2
TPC-20 TPC-21
null
1-8-2
1-6-1 1-6-2
null
null
Sec 60
null
9
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
30
null
null
Article 38(1) Article 38(2) Article 40
null
null
null
null
4.6.1 4.6.2.5 18.2.1
null
null
6.1.8.C.01
null
null
null
null
null
null
null
null
null
null
null
null
6.13 6.25
null
null
null
null
null
null
null
null
null
null
null
x
null
null
null
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-1 R-AM-2 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1
R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
null
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
null
NT-1 NT-2 NT-3 NT-4 NT-5 NT-6 NT-7 NT-8 NT-9 NT-10 NT-11 NT-12 NT-13 NT-14 MT-1 MT-2 MT-3 MT-4 MT-5 MT-6 MT-7 MT-8 MT-9 MT-10 MT-11 MT-12 MT-13 MT-14 MT-15
NT-1
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15
null
- wordsmithed control
Compliance
Functional Review Of Cybersecurity & Data Protection Controls
CPL-03.2
Mechanisms exist to regularly review technology assets for adherence to the organization’s cybersecurity & data protection policies and standards.
- CimTrak Integrity Suite (https://www.cimcor.com/cimtrak/) - Internal audit program - NNT Change Tracker (https://www.newnettechnologies.com) - Operational review processes - Regular/yearly policy and standards review process - Governance, Risk and Compliance Solution (GRC) (ZenGRC, Archer, RSAM, Metric stream, etc.)
E-CPL-08
Does the organization regularly review technology assets for adherence to the organization’s cybersecurity & data protection policies and standards?
8
Detect
X
X
X
There is no evidence of a capability to regularly review technology assets for adherence to the organization’s cybersecurity & data protection policies and standards.
Compliance (CPL) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist: • IT personnel use an informal process to govern statutory, regulatory and contractual compliance obligations. • IT personnel self-identify a set of controls that are used to conduct cybersecurity & data privacy control assessments. • IT personnel perform internal assessments of cybersecurity & data privacy controls to determine compliance status.
Compliance (CPL) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Compliance activities are decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for compliance activities. • Cybersecurity personnel use a defined set of controls to conduct cybersecurity & data privacy control assessments, as defined by the applicable statutory, regulatory and contractual requirements. • Cybersecurity personnel either use an impartial member of its team or a third-party assessor to perform an independent assessment of cybersecurity & data privacy controls.
Compliance (CPL) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • A Governance, Risk & Compliance (GRC) function, or similar function, provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to ensure compliance requirements are identified and documented. • The GRC function, or similar function: o Ensures data/process owners understand their requirements to manage applicable cybersecurity & data privacy controls through oversight and written guidance. o Provides applicable stakeholders with status reports on control execution to enable security controls oversight. o Works with data/process owners and asset custodians to document and validate the scope of cybersecurity & data privacy controls to ensure statutory, regulatory and/ or contractual compliance obligations are met. o Conducts cybersecurity & data privacy control assessments, on a regular cadence that is defined by the applicable statutory, regulatory and contractual requirements. • Cybersecurity and data privacy controls are centrally managed through a technology solution (e.g., GRC solution) to assign controls, track control activities and report on compliance efforts. • Cybersecurity personnel either use an impartial member of its team or a third-party assessor to perform an independent assessment of cybersecurity & data privacy controls. • Up on completing an assessment, the GRC function generates a formal report that documents the assessment of cybersecurity & data privacy controls to determine the effectiveness of controls and their ability to meet regulatory and company standards requirements.
Compliance (CPL) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to regularly review technology assets for adherence to the organization’s cybersecurity & data protection policies and standards.
CC4.1
CC7.2-POF4
null
null
null
null
null
MEA02.01 MEA02.02
Principle 16
A&A-05 CEK-09 IVS-03 STA-11
CCM-07 GVN-04 SAP-10
null
null
null
RQ-05-17
null
9.1
null
18.2.3
5.35 5.36 8.8
18.2.3
null
6.15.2.3
null
null
null
T1190, T1195, T1195.001, T1195.002, T1210
null
Sec 4(C)(4)
null
PR.PO-P5
null
A-3 A-4
null
CA-2 RA-3
CA-2 RA-3
CA-2 RA-3
CA-2 RA-3
CA-2 RA-3
CA-2 RA-3
CA-2 RA-3
CA-2 RA-3
CA-2 RA-3
null
null
CA-2 RA-3
CA-2 RA-3
CA-2 RA-3
3.4.9
CA-2 RA-3
CA-2 RA-3
null
RA-3
CA-2 RA-3
CA-2 RA-3
null
null
null
null
null
null
null
ID.IM-02
null
null
1.2.7 10.7 10.7.1 10.7.2 10.7.3 11.1 12.4.2
null
1.2.7
null
null
null
null
1.2.7 10.7.2 10.7.3
1.2.7 10.7.1 10.7.2 10.7.3 12.4.2
null
L.6.1
null
5.2.5
null
null
null
null
CTRL:SG3.SP1 CTRL:SG4.SP1 RISK:SG3.SP1
null
null
null
null
null
null
null
null
CA-2 RA-3
null
null
null
null
null
null
§ 11.10 § 11.10(a) § 11.10(b) § 11.10(c) § 11.10(d) § 11.10(e) § 11.10(f) § 11.10(g) § 11.10(h) § 11.10(i) § 11.10(j) § 11.10(k) § 11.10(k)(1) § 11.10(k)(2) § 11.300(e)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
CA-2 RA-3
null
null
8-610
4.1 4.4
null
null
null
null
5.11
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Sec 4(2)(b)(ii)(B)(4)
null
38-99-20(C)(4)
null
Sec 11
CA-2 RA-3
RA-3
RA-3
null
null
null
3.3.6(26) 3.3.6(27) 3.4.6(41) 3.4.6(42) 3.4.6(43) 3.4.6(43)(a) 3.4.6(43)(b) 3.4.6(44) 3.4.6(45) 3.4.6(46) 3.4.6(47) 3.4.6(48)
null
null
null
Article 21.1
Art 3
null
null
null
null
null
null
null
null
5.6
COM-01
null
null
null
3.1 3.3 12.30
null
null
null
null
null
null
null
null
null
Article 11.7 Article 11.8
null
1-4-1
null
null
1-8-1
null
null
null
null
null
null
null
null
null
null
B3.a
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Article 54
null
null
null
null
18.2.3
null
null
6.1.7.C.01 6.1.9.C.01 23.2.18.C.01
null
null
null
null
4.5.1
null
null
null
null
null
5.7
null
null
null
null
null
null
null
null
null
null
null
null
null
x
NAIC
null
x
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-1 R-AM-2 R-AM-3 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-GV-8 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1 R-SA-2
R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
R-SA-2
NT-1 NT-2 NT-3 NT-4 NT-5 NT-6 NT-7 NT-8 NT-9 NT-10 NT-11 NT-12 NT-13 NT-14 MT-1 MT-2 MT-3 MT-4 MT-5 MT-6 MT-7 MT-8 MT-9 MT-10 MT-11 MT-12 MT-13 MT-14 MT-15
NT-1
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15
null
- renamed control - wordsmithed control
Compliance
Audit Activities
CPL-04
Mechanisms exist to thoughtfully plan audits by including input from operational risk and compliance partners to minimize the impact of audit-related activities on business operations.
- Internal audit program
null
Does the organization thoughtfully plan audits by including input from operational risk and compliance partners to minimize the impact of audit-related activities on business operations?
5
Identify
null
X
null
There is no evidence of a capability to thoughtfully plan audits by including input from operational risk and compliance partners to minimize the impact of audit-related activities on business operations.
Compliance (CPL) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist: • IT personnel use an informal process to govern statutory, regulatory and contractual compliance obligations. • IT personnel self-identify a set of controls that are used to conduct cybersecurity & data privacy control assessments. • IT personnel perform internal assessments of cybersecurity & data privacy controls to determine compliance status. • IT personnel use an informal process to notify stakeholders about audit activities to minimize the impact of audit/assessment activities on business operations.
Compliance (CPL) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Compliance activities are decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for compliance activities. • Cybersecurity personnel use a defined set of controls to conduct cybersecurity & data privacy control assessments, as defined by the applicable statutory, regulatory and contractual requirements. • Cybersecurity personnel use an informal process to notify stakeholders about audit activities to minimize the impact of audit activities on business operations.
Compliance (CPL) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • A Governance, Risk & Compliance (GRC) function, or similar function, provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to ensure compliance requirements are identified and documented. • The GRC function, or similar function: o Ensures data/process owners understand their requirements to manage applicable cybersecurity & data privacy controls through oversight and written guidance. o Provides applicable stakeholders with status reports on control execution to enable security controls oversight. o Works with data/process owners and asset custodians to document and validate the scope of cybersecurity & data privacy controls to ensure statutory, regulatory and/ or contractual compliance obligations are met. o Conducts cybersecurity & data privacy control assessments, on a regular cadence that is defined by the applicable statutory, regulatory and contractual requirements. • Cybersecurity and data privacy controls are centrally managed through a technology solution (e.g., GRC solution) to assign controls, track control activities and report on compliance efforts. • Cybersecurity personnel use an defined process to notify stakeholders about audit activities to minimize the impact of audit activities on business operations.
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to thoughtfully plan audits by including input from operational risk and compliance partners to minimize the impact of audit-related activities on business operations.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to thoughtfully plan audits by including input from operational risk and compliance partners to minimize the impact of audit-related activities on business operations.
CC4.1
null
null
null
null
null
null
null
Principle 16
A&A-05
null
null
null
null
null
null
9.2
null
12.7.1
5.35 8.34
12.7.1
null
6.9.7 6.9.7.1
null
null
null
null
null
null
GOVERN 1.5
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
3.4.9
null
null
null
null
null
null
null
null
null
null
null
null
null
ID.IM-04
null
null
null
null
null
null
null
null
null
null
null
null
L.8.4.1
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
CIP-014-2 R2
null
null
null
null
null
null
null
null
null
null
IV.C.2.a IV.C.2.b IV.C.2.c IV.C.2.d IV.C.2.e IV.C.2.e.i IV.C.2.e.ii IV.C.2.e.iii IV.C.2.e.iv IV.C.2.f
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Art 3
null
null
null
null
null
null
null
null
null
COM-02 COM-03
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
4.6.1 12.7.1
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
x
null
null
x
R-BC-1 R-EX-1 R-EX-2 R-EX-4 R-EX-5 R-GV-1 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-SA-1
null
null
null
null
null
null
null
R-BC-1
null
null
null
null
R-EX-1
R-EX-2
null
R-EX-4
R-EX-5
null
null
R-GV-1
null
null
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
null
null
null
null
R-SA-1
null
NT-1 NT-2 NT-3 NT-4 NT-5 NT-6 NT-7 NT-8 NT-9 NT-10 NT-11 NT-12 NT-13 NT-14 MT-1 MT-2 MT-3 MT-4 MT-5 MT-6 MT-7 MT-8 MT-9 MT-10 MT-11 MT-12 MT-13 MT-14 MT-15
NT-1
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Compliance
Legal Assessment of Investigative Inquires
CPL-05
Mechanisms exist to determine whether a government agency has an applicable and valid legal basis to request data from the organization and what further steps need to be taken, if necessary.
null
null
Does the organization determine whether a government agency has an applicable and valid legal basis to request data from the organization and what further steps need to be taken, if necessary?
2
Respond
null
X
null
There is no evidence of a capability to determine whether a government agency has an applicable and valid legal basis to request data from the organization and what further steps need to be taken, if necessary.
SP-CMM1 is N/A, since a structured process is required to determine whether a government agency has an applicable and valid legal basis to request data from the organization and what further steps need to be taken, if necessary.
Compliance (CPL) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Compliance activities are decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for compliance activities. • Cybersecurity personnel use a defined set of controls to conduct cybersecurity & data privacy control assessments, as defined by the applicable statutory, regulatory and contractual requirements.
Compliance (CPL) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • A Governance, Risk & Compliance (GRC) function, or similar function, provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to ensure compliance requirements are identified and documented. • The GRC function, or similar function: o Ensures data/process owners understand their requirements to manage applicable cybersecurity & data privacy controls through oversight and written guidance. o Provides applicable stakeholders with status reports on control execution to enable security controls oversight. o Works with data/process owners and asset custodians to document and validate the scope of cybersecurity & data privacy controls to ensure statutory, regulatory and/ or contractual compliance obligations are met. o Conducts cybersecurity & data privacy control assessments, on a regular cadence that is defined by the applicable statutory, regulatory and contractual requirements. • Cybersecurity and data privacy controls are centrally managed through a technology solution (e.g., GRC solution) to assign controls, track control activities and report on compliance efforts.
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to determine whether a government agency has an applicable and valid legal basis to request data from the organization and what further steps need to be taken, if necessary.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to determine whether a government agency has an applicable and valid legal basis to request data from the organization and what further steps need to be taken, if necessary.
null
null
null
null
null
null
null
null
null
DSP-18
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
L.2.5
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
INQ-01
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Article 41
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-1 R-AM-2 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1
R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
null
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
null
NT-1 NT-2 NT-3 NT-4 NT-5 NT-6 NT-7 NT-8 NT-9 NT-10 NT-11 NT-12 NT-13 NT-14 MT-1 MT-2 MT-3 MT-4 MT-5 MT-6 MT-7 MT-8 MT-9 MT-10 MT-11 MT-12 MT-13 MT-14 MT-15
NT-1
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Compliance
Investigation Request Notifications
CPL-05.1
Mechanisms exist to notify customers about investigation request notifications, unless the applicable legal basis for a government agency's action prohibits notification (e.g., potential criminal prosecution).
null
null
Does the organization notify customers about investigation request notifications, unless the applicable legal basis for a government agency's action prohibits notification (e.g., potential criminal prosecution)?
2
Respond
null
X
null
There is no evidence of a capability to notify customers about investigation request notifications, unless the applicable legal basis for a government agency's action prohibits notification (e.g., potential criminal prosecution).
SP-CMM1 is N/A, since a structured process is required to notify customers about investigation request notifications, unless the applicable legal basis for a government agency's action prohibits notification (e.g., potential criminal prosecution).
Compliance (CPL) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Compliance activities are decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for compliance activities. • Cybersecurity personnel use a defined set of controls to conduct cybersecurity & data privacy control assessments, as defined by the applicable statutory, regulatory and contractual requirements. • Requests for investigations are handled through a formal, management-approved process. • Legal representation is consulted on an as-needed basis.
Compliance (CPL) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • A Governance, Risk & Compliance (GRC) function, or similar function, provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to ensure compliance requirements are identified and documented. • The GRC function, or similar function: o Ensures data/process owners understand their requirements to manage applicable cybersecurity & data privacy controls through oversight and written guidance. o Provides applicable stakeholders with status reports on control execution to enable security controls oversight. o Works with data/process owners and asset custodians to document and validate the scope of cybersecurity & data privacy controls to ensure statutory, regulatory and/ or contractual compliance obligations are met. o Conducts cybersecurity & data privacy control assessments, on a regular cadence that is defined by the applicable statutory, regulatory and contractual requirements. • Cybersecurity and data privacy controls are centrally managed through a technology solution (e.g., GRC solution) to assign controls, track control activities and report on compliance efforts. • An Integrated Security Incident Response Team (ISIRT) is formed to analyze and respond to government investigation requests, with legal representation being a key stakeholder. • Client or host-nation requests are formally evaluated to determine the risk impact of the request.
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to notify customers about investigation request notifications, unless the applicable legal basis for a government agency's action prohibits notification (e.g., potential criminal prosecution).
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to notify customers about investigation request notifications, unless the applicable legal basis for a government agency's action prohibits notification (e.g., potential criminal prosecution).
null
null
null
null
null
null
null
null
null
DSP-18
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
P.9.7
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
INQ-02
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Article 18
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-1 R-AM-2 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1
R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
null
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
null
NT-1 NT-2 NT-3 NT-4 NT-5 NT-6 NT-7 NT-8 NT-9 NT-10 NT-11 NT-12 NT-13 NT-14 MT-1 MT-2 MT-3 MT-4 MT-5 MT-6 MT-7 MT-8 MT-9 MT-10 MT-11 MT-12 MT-13 MT-14 MT-15
NT-1
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Compliance
Investigation Access Restrictions
CPL-05.2
Mechanisms exist to support official investigations by provisioning government investigators with "least privileges" and "least functionality" to ensure that government investigators only have access to the data and systems needed to perform the investigation.
null
null
Does the organization support official investigations by provisioning government investigators with "least privileges" and "least functionality" to ensure that government investigators only have access to the data and systems needed to perform the investigation?
2
Protect
null
X
null
There is no evidence of a capability to support official investigations by provisioning government investigators with "least privileges" and "least functionality" to ensure that government investigators only have access to the data and systems needed to perform the investigation.
SP-CMM1 is N/A, since a structured process is required to support official investigations by provisioning government investigators with "least privileges" and "least functionality" to ensure that government investigators only have access to the data and systems needed to perform the investigation.
Compliance (CPL) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Compliance activities are decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for compliance activities. • Cybersecurity personnel use a defined set of controls to conduct cybersecurity & data privacy control assessments, as defined by the applicable statutory, regulatory and contractual requirements. • Legal representation is consulted on an as-needed basis.
Compliance (CPL) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • A Governance, Risk & Compliance (GRC) function, or similar function, provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to ensure compliance requirements are identified and documented. • The GRC function, or similar function: o Ensures data/process owners understand their requirements to manage applicable cybersecurity & data privacy controls through oversight and written guidance. o Provides applicable stakeholders with status reports on control execution to enable security controls oversight. o Works with data/process owners and asset custodians to document and validate the scope of cybersecurity & data privacy controls to ensure statutory, regulatory and/ or contractual compliance obligations are met. o Conducts cybersecurity & data privacy control assessments, on a regular cadence that is defined by the applicable statutory, regulatory and contractual requirements. • Cybersecurity and data privacy controls are centrally managed through a technology solution (e.g., GRC solution) to assign controls, track control activities and report on compliance efforts. • An Integrated Security Incident Response Team (ISIRT) is formed to analyze and respond to government investigation requests, with legal representation being a key stakeholder. • Client or host-nation requests are formally evaluated to determine the risk impact of the request.
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to support official investigations by provisioning government investigators with "least privileges" and "least functionality" to ensure that government investigators only have access to the data and systems needed to perform the investigation.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to support official investigations by provisioning government investigators with "least privileges" and "least functionality" to ensure that government investigators only have access to the data and systems needed to perform the investigation.
null
null
null
null
null
null
null
null
null
DSP-18
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
H.2.3
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
IV.C.1 IV.C.2 IV.C.2.a IV.C.2.b IV.C.2.c IV.C.2.d IV.C.2.e IV.C.2.e.i IV.C.2.e.ii IV.C.2.e.iii IV.C.2.e.iv IV.C.2.f
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
INQ-03 INQ-04
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Article 61(4) Article 63 Article 63(1) Article 63(2) Article 63(3) Article 63(4) Article 64
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-1 R-AM-2 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1
R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
null
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
null
NT-1 NT-2 NT-3 NT-4 NT-5 NT-6 NT-7 NT-8 NT-9 NT-10 NT-11 NT-12 NT-13 NT-14 MT-1 MT-2 MT-3 MT-4 MT-5 MT-6 MT-7 MT-8 MT-9 MT-10 MT-11 MT-12 MT-13 MT-14 MT-15
NT-1
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Compliance
Government Surveillance
CPL-06
Mechanisms exist to constrain the host government from having unrestricted and non-monitored access to the organization's systems, applications and services that could potentially violate other applicable statutory, regulatory and/or contractual obligations.
- Board of Directors (Bod) Ethics Committee
null
Does the organization constrain the host government from having unrestricted and non-monitored access to the organization's systems, applications and services that could potentially violate other applicable statutory, regulatory and/or contractual obligations?
10
Protect
X
X
X
There is no evidence of a capability to constrain the host government from having unrestricted and non-monitored access to the organization's systems, applications and services that could potentially violate other applicable statutory, regulatory and/ or contractual obligations.
SP-CMM1 is N/A, since a structured process is required to constrain the host government from having unrestricted and non-monitored access to the organization's systems, applications and services that could potentially violate other applicable statutory, regulatory and/ or contractual obligations.
SP-CMM2 is N/A, since a well-defined process is required to constrain the host government from having unrestricted and non-monitored access to the organization's systems, applications and services that could potentially violate other applicable statutory, regulatory and/ or contractual obligations.
Compliance (CPL) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • A Governance, Risk & Compliance (GRC) function, or similar function, provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to ensure compliance requirements are identified and documented. • The GRC function, or similar function: o Ensures data/process owners understand their requirements to manage applicable cybersecurity & data privacy controls through oversight and written guidance. o Provides applicable stakeholders with status reports on control execution to enable security controls oversight. o Works with data/process owners and asset custodians to document and validate the scope of cybersecurity & data privacy controls to ensure statutory, regulatory and/ or contractual compliance obligations are met. o Conducts cybersecurity & data privacy control assessments, on a regular cadence that is defined by the applicable statutory, regulatory and contractual requirements. • Cybersecurity and data privacy controls are centrally managed through a technology solution (e.g., GRC solution) to assign controls, track control activities and report on compliance efforts. • An Integrated Security Incident Response Team (ISIRT) is formed to analyze and respond to government investigation requests, with legal representation being a key stakeholder. • Client or host-nation requests are formally evaluated to determine the risk impact of the request. • The CIO/CISO collaborate on methods to prevent a host government from having unrestricted and non-monitored access to the organization's systems, applications and services which could potentially violate other applicable statutory, regulatory and/ or contractual obligations.
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to constrain the host government from having unrestricted and non-monitored access to the organization's systems, applications and services that could potentially violate other applicable statutory, regulatory and/ or contractual obligations.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to constrain the host government from having unrestricted and non-monitored access to the organization's systems, applications and services that could potentially violate other applicable statutory, regulatory and/ or contractual obligations.
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
L.9.4
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Article 24 Article 27 Article 31 Article 33 Article 44
null
Article 11 Article 12 Article 26 Article 38(4) Article 40 Article 47(5) Article 60 Article 61(4) Article 63(3) Article 63(4) Article 64
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-1 R-AM-2 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-GV-8 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1
R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
null
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
null
MT-8 MT-9 MT-10 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Configuration Management
Configuration Management Program
CFG-01
Mechanisms exist to facilitate the implementation of configuration management controls.
- NNT Change Tracker (https://www.newnettechnologies.com) - Configuration Management Database (CMDB) - Baseline hardening standards - Formalized DevOps program - Information Assurance Program (IAP) - Security Test & Evaluation (STE)
null
Does the organization facilitate the implementation of configuration management controls?
9
Protect
X
X
X
There is no evidence of a capability to facilitate the implementation of configuration management controls.
Configuration Management (CFG) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist: • IT personnel use an informal process to design, build and maintain secure configurations for test, development, staging and production environments. • Secure configurations are not: o Standardized across the organization. o Consistently aligned with industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides).
Configuration Management (CFG) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Configuration management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for configuration management. • Technologies are configured to protect data with the strength and integrity commensurate with the classification or sensitivity of the information and mostly conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides), including cryptographic protections for sensitive/regulated data. • Special baseline configurations are created for higher-risk environments or for systems, applications and services that store, process or transmit sensitive/regulated data. • Apart from workstation and server operating system baselines, configuration management is decentralized. • Cybersecurity personnel use a structured process to design, build and maintain secure configurations for test, development, staging and production environments. • Deviations to baseline configurations are required to have a risk assessment and the business process owner acceptance of the risk(s) associated with the deviation. • Unauthorized configuration changes are investigated to determine if the unauthorized configuration is malicious in nature. • Logical Access Control (LAC) is enforced to prohibit non-administrative users from being able to install unauthorized software.
Configuration Management (CFG) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • The Chief Information Security Officer (CISO), or similar function, analyzes the organization’s business strategy to determine prioritized and authoritative guidance for secure configuration management practices. • The CISO, or similar function, develops a security-focused Concept of Operations (CONOPS) that documents management, operational and technical measures to apply defense-in-depth techniques across the organization with regards to secure configuration management. • A Governance, Risk & Compliance (GRC) function, or similar function, provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data to ensure that secure configuration management are identified and documented. • A steering committee is formally established to provide executive oversight of the cybersecurity & data privacy program, including secure configuration management to provide clear and authoritative accountability for secure configuration management operations. • The configuration management function is formally assigned with defined roles and responsibilities. • An IT infrastructure team, or similar function, ensures that statutory, regulatory and contractual cybersecurity & data privacy obligations are addressed to ensure secure configurations are designed, built and maintained. • Configuration management is centralized for all operating systems, applications, servers and other configurable technologies. • Technologies are configured to protect data with the strength and integrity commensurate with the classification or sensitivity of the information and conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides), including test, development, staging and production environments. • Configurations conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides) for test, development, staging and production environments. • Deviations to baseline configurations are required to have a risk assessment and business process owner approval of the risk(s) associated with the deviation. • Special baseline configurations are created for higher-risk environments or for systems, applications and services that store, process or transmit sensitive/regulated data. • An IT Asset Management (ITAM) function, or similar function, ensures compliance with requirements for asset management. • Logical Access Control (LAC) is used to limit the ability of non-administrators from making configuration changes to systems, applications and services, including the of installation of unauthorized software. • A Security Incident Event Manager (SIEM), or similar automated tool, monitors for unauthorized activities, accounts, connections, devices and software. Unauthorized configuration changes are responded to in accordance with an Incident Response Plan (IRP) to determine if the unauthorized configuration is malicious in nature.
Configuration Management (CFG) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
Configuration Management (CFG) efforts are “world-class” capabilities that leverage predictive analysis (e.g., machine learning, AI, etc.). In addition to CMM Level 4 criteria, CMM Level 5 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Stakeholders make time-sensitive decisions to support operational efficiency, which may include automated remediation actions. ▪ Based on predictive analysis, process improvements are implemented according to “continuous improvement” practices that affect process changes.
CC7.1
CC7.1-POF1
null
4.0 4.1
4.1
4.1
4.1
BAI10.01 BAI10.02 BAI10.03 BAI10.04 BAI10.05 DSS06.06
null
UEM-03 UEM-07
CCM-02 CCM-08
null
null
CR 7.6 (11.8.1)
null
null
null
null
9.4.1
8.3 8.9 8.12
9.4.1
null
null
null
null
null
T1001, T1001.001, T1001.002, T1001.003, T1003, T1003.001, T1003.002, T1003.003, T1003.004, T1003.005, T1003.006, T1003.007, T1003.008, T1008, T1011, T1011.001, T1020.001, T1021, T1021.001, T1021.002, T1021.003, T1021.004, T1021.005, T1021.006, T1027, T1029, T1030, T1036, T1036.001, T1036.003, T1036.005, T1036.007, T1037, T1037.002, T1037.003, T1037.004, T1037.005, T1046, T1047, T1048, T1048.001, T1048.002, T1048.003, T1052, T1052.001, T1053, T1053.002, T1053.005, T1055, T1055.008, T1056.003, T1059, T1059.001, T1059.002, T1059.003, T1059.004, T1059.005, T1059.006, T1059.007, T1059.008, T1068, T1070, T1070.001, T1070.002, T1070.003, T1071, T1071.001, T1071.002, T1071.003, T1071.004, T1072, T1078, T1078.002, T1078.003, T1078.004, T1087, T1087.001, T1087.002, T1090, T1090.001, T1090.002, T1090.003, T1091, T1092, T1095, T1098, T1098.001, T1098.002, T1098.003, T1098.004, T1102, T1102.001, T1102.002, T1102.003, T1104, T1105, T1106, T1110, T1110.001, T1110.002, T1110.003, T1110.004, T1111, T1114, T1114.002, T1114.003, T1119, T1127, T1127.001, T1132, T1132.001, T1132.002, T1133, T1134, T1134.001, T1134.002, T1134.003, T1134.005, T1135, T1136, T1136.001, T1136.002, T1136.003, T1137, T1137.001, T1137.002, T1137.003, T1137.004, T1137.005, T1137.006, T1176, T1187, T1189, T1190, T1197, T1199, T1201, T1204, T1204.001, T1204.002, T1204.003, T1205, T1205.001, T1210, T1211, T1212, T1213, T1213.001, T1213.002, T1216, T1216.001, T1218, T1218.001, T1218.002, T1218.003, T1218.004, T1218.005, T1218.007, T1218.008, T1218.009, T1218.012, T1218.013, T1218.014, T1219, T1220, T1221, T1222, T1222.001, T1222.002, T1482, T1484, T1489, T1490, T1495, T1498, T1498.001, T1498.002, T1499, T1499.001, T1499.002, T1499.003, T1499.004, T1505, T1505.001, T1505.002, T1505.003, T1505.004, T1525, T1528, T1530, T1537, T1539, T1542, T1542.001, T1542.003, T1542.004, T1542.005, T1543, T1543.002, T1546, T1546.002, T1546.003, T1546.004, T1546.006, T1546.008, T1546.013, T1546.014, T1547.002, T1547.003, T1547.005, T1547.006, T1547.007, T1547.008, T1547.011, T1547.013, T1548, T1548.001, T1548.002, T1548.003, T1548.004, T1550, T1550.001, T1550.002, T1550.003, T1552, T1552.001, T1552.002, T1552.003, T1552.004, T1552.005, T1552.006, T1552.007, T1553, T1553.001, T1553.003, T1553.004, T1553.005, T1554, T1555.004, T1555.005, T1556, T1556.001, T1556.002, T1556.003, T1556.004, T1557, T1557.001, T1557.002, T1558, T1558.001, T1558.002, T1558.003, T1558.004, T1559, T1559.001, T1559.002, T1562, T1562.001, T1562.002, T1562.003, T1562.004, T1562.006, T1562.009, T1562.010, T1563, T1563.001, T1563.002, T1564.002, T1564.006, T1564.007, T1564.009, T1565, T1565.001, T1565.002, T1565.003, T1566, T1566.001, T1566.002, T1569, T1569.002, T1570, T1571, T1572, T1573, T1573.001, T1573.002, T1574, T1574.001, T1574.004, T1574.005, T1574.006, T1574.007, T1574.008, T1574.009, T1574.010, T1598, T1598.002, T1598.003, T1599, T1599.001, T1601, T1601.001, T1601.002, T1602, T1602.001, T1602.002, T1609, T1610, T1611, T1612, T1613
TS-2.6
null
null
PR.PO-P1
null
null
null
CM-1 CM-9
CM-1
CM-1 CM-9
CM-1 CM-9
CM-1 CM-9
CM-1
CM-1
CM-1 CM-9
CM-1 CM-9
null
null
CM-1
CM-1 CM-9
CM-1 CM-9
3.3.5 3.4.7 3.4.8
CM-1 CM-9
CM-1
CM-9
CM-1
CM-1 CM-9
CM-1 CM-9
NFO - CM-1 NFO - CM-9
null
null
A.03.04.03.a
null
null
PR.IP-1
PR.PS PR.PS-01
A05:2021
1.1.5
2.1 8.5
null
null
null
null
null
null
null
null
null
D.1.1
null
null
null
null
null
null
TM:SG4.SP2
null
null
null
null
null
null
null
null
CM-1 CM-9
null
null
null
null
null
null
null
CM-1 CM-9
CM-1
CM-1 CM-9
CM-1 CM-9
CM-1
CM-1 CM-9
CM-1
CM-1 CM-9
CM-1 CM-9
CM-1
null
null
null
null
null
null
1.S.A 2.S.A 3.S.A 6.S.B 6.S.C
1.M.A 2.M.A 9.M.A 9.M.B
1.M.A 2.M.A 9.M.A 9.M.B 2.L.A
CM-1 CM-9
null
null
8-311 8-610
5.1 5.2
null
null
null
null
null
CM-1
CM-1 CM-9
CM-1 CM-9
null
null
null
null
null
6-1-1305(4)
null
null
null
null
null
null
null
null
null
null
null
CM-1
CM-1
CM-1 CM-9
null
null
null
null
Art 9.3(a) Art 9.3(b) Art 9.3(c) Art 9.3(d)
null
Art 32.1 Art 32.2
null
null
null
Sec 14 Sec 15
Art 16
null
null
null
null
null
6.8
AM-03
null
null
null
3.3 9.22 9.23 14.1
null
null
null
null
null
null
null
null
null
null
null
2-3-1-6
TPC-2
null
1-6-2-2 2-4-4 2-5-4
null
null
null
null
null
7.3.3 [OP.EXP.3]
null
null
null
null
B4.b
B4
2
null
null
null
Principle 1.1
Principle 1.1
null
null
null
null
null
null
null
null
null
null
null
null
null
9.4.1 9.4.1.8.PB
null
null
4.3.19.C.01 12.2.5.C.01 12.2.5.C.02 12.2.6.C.01 12.2.6.C.02 18.1.10.C.01 18.1.10.C.02 18.1.10.C.03 18.1.10.C.04
null
null
null
4.3(a)
7.2.1 7.2.2 7.3.1 7.3.2 7.3.3
null
null
null
null
null
6.1
null
null
3.2.3
null
null
null
null
null
null
null
null
null
null
x
null
x
x
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-1 R-AM-2 R-AM-3 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-GV-8 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1
R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
null
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-10 MT-11 MT-12 MT-13 MT-14 MT-15 MT-16
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15
MT-16
null
Configuration Management
Assignment of Responsibility
CFG-01.1
Mechanisms exist to implement a segregation of duties for configuration management that prevents developers from performing production configuration management duties.
- CimTrak Integrity Suite (https://www.cimcor.com/cimtrak/)
null
Does the organization implement a segregation of duties for configuration management that prevents developers from performing production configuration management duties?
5
Identify
null
X
X
There is no evidence of a capability to implement a segregation of duties for configuration management that prevents developers from performing production configuration management duties.
SP-CMM1 is N/A, since a structured process is required to implement a segregation of duties for configuration management that prevents developers from performing production configuration management duties.
Configuration Management (CFG) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Configuration management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for configuration management. • Technologies are configured to protect data with the strength and integrity commensurate with the classification or sensitivity of the information and mostly conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides), including cryptographic protections for sensitive/regulated data. • Special baseline configurations are created for higher-risk environments or for systems, applications and services that store, process or transmit sensitive/regulated data. • Apart from workstation and server operating system baselines, configuration management is decentralized. • Cybersecurity personnel use a structured process to design, build and maintain secure configurations for test, development, staging and production environments. • Deviations to baseline configurations are required to have a risk assessment and the business process owner acceptance of the risk(s) associated with the deviation. • Unauthorized configuration changes are investigated to determine if the unauthorized configuration is malicious in nature. • Logical Access Control (LAC) is enforced to prohibit non-administrative users from being able to install unauthorized software. • The Human Resources (HR) department ensures industry-recognized HR practices are implemented for hiring, managing, training, investigating and terminating employees, contractors and other personnel that work on behalf of the organization. • HR defines terms of employment, including acceptable and unacceptable rules of behavior for the use of technologies, including consequences for unacceptable behavior.
Configuration Management (CFG) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • The configuration management function is formally assigned with defined roles and responsibilities. • An IT infrastructure team, or similar function, ensures that statutory, regulatory and contractual cybersecurity & data privacy obligations are addressed to ensure secure configurations are designed, built and maintained. • Configuration management is centralized for all operating systems, applications, servers and other configurable technologies. • Technologies are configured to protect data with the strength and integrity commensurate with the classification or sensitivity of the information and conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides), including test, development, staging and production environments. • Configurations conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides) for test, development, staging and production environments. • Deviations to baseline configurations are required to have a risk assessment and business process owner approval of the risk(s) associated with the deviation. • Special baseline configurations are created for higher-risk environments or for systems, applications and services that store, process or transmit sensitive/regulated data. • An IT Asset Management (ITAM) function, or similar function, ensures compliance with requirements for asset management. • Logical Access Control (LAC) is used to limit the ability of non-administrators from making configuration changes to systems, applications and services, including the of installation of unauthorized software. • A Security Incident Event Manager (SIEM), or similar automated tool, monitors for unauthorized activities, accounts, connections, devices and software. • Unauthorized configuration changes are responded to in accordance with an Incident Response Plan (IRP) to determine if the unauthorized configuration is malicious in nature. • The Human Resources (HR) department ensures industry-recognized HR practices are implemented for hiring, managing, training, investigating and terminating employees, contractors and other personnel that work on behalf of the organization. • HR defines terms of employment, including acceptable and unacceptable rules of behavior for the use of technologies, including consequences for unacceptable behavior.
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to implement a segregation of duties for configuration management that prevents developers from performing production configuration management duties.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to implement a segregation of duties for configuration management that prevents developers from performing production configuration management duties.
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
8.9
null
null
null
null
null
null
null
null
null
null
null
null
null
null
CM-9(1)
null
null
null
CM-9(1)
null
null
null
null
CM-9(1)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
2.1
null
null
null
null
null
null
null
null
null
G.2.5.1
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
4.3.19.C.01
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
x
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-1 R-AM-2 R-AM-3 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1
R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
null
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-10 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Configuration Management
System Hardening Through Baseline Configurations
CFG-02
Mechanisms exist to develop, document and maintain secure baseline configurations for technology platforms that are consistent with industry-accepted system hardening standards.
- CimTrak Integrity Suite (https://www.cimcor.com/cimtrak/) - Defense Information Security Agency (DISA) Secure Technology Implementation Guides (STIGs) - Center for Internet Security (CIS) Benchmarks - NNT Change Tracker (https://www.newnettechnologies.com)
E-AST-12 E-AST-13 E-AST-14 E-AST-15 E-AST-16 E-AST-17 E-AST-18 E-AST-19 E-AST-20 E-AST-21
Does the organization develop, document and maintain secure baseline configurations for technology platforms that are consistent with industry-accepted system hardening standards?
10
Protect
X
X
X
There is no evidence of a capability to develop, document and maintain secure baseline configurations for technology platforms that are consistent with industry-accepted system hardening standards.
Configuration Management (CFG) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist: • IT personnel use an informal process to design, build and maintain secure configurations for test, development, staging and production environments. • Secure configurations are not: o Standardized across the organization. o Consistently aligned with industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides). • The review of any request for deviating from baseline configurations is documented and a risk assessment performed to determine if the deviation is acceptable.
Configuration Management (CFG) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Configuration management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for configuration management. • Technologies are configured to protect data with the strength and integrity commensurate with the classification or sensitivity of the information and mostly conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides), including cryptographic protections for sensitive/regulated data. • Special baseline configurations are created for higher-risk environments or for systems, applications and services that store, process or transmit sensitive/regulated data. • Apart from workstation and server operating system baselines, configuration management is decentralized. • Cybersecurity personnel use a structured process to design, build and maintain secure configurations for test, development, staging and production environments. • Deviations to baseline configurations are required to have a risk assessment and the business process owner acceptance of the risk(s) associated with the deviation. • Unauthorized configuration changes are investigated to determine if the unauthorized configuration is malicious in nature. • Logical Access Control (LAC) is enforced to prohibit non-administrative users from being able to install unauthorized software. • Secure baseline configurations: o Enforce logging to link system access to individual users or service accounts using a non-repudiation capability to protect against an individual falsely denying having performed a particular action. o Generate logs that contain sufficient information to establish necessary details of activity and allow for forensics analysis. o Restrict access to the management of event logs for privileged users to protect event logs and audit tools from unauthorized access, modification and deletion. o Retain security event logs for a time period consistent with records retention requirements to provide support for after-the-fact investigations of security incidents and to meet statutory, regulatory and contractual retention requirements. o Store logs locally and forward logs to a centralized log repository to provide an alternate audit capability in the event of a failure in the primary audit capability. o Use internal system clocks to generate time stamps for security event logs that are synchronized with an authoritative time source.
Configuration Management (CFG) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • The configuration management function is formally assigned with defined roles and responsibilities. • An IT infrastructure team, or similar function, ensures that statutory, regulatory and contractual cybersecurity & data privacy obligations are addressed to ensure secure configurations are designed, built and maintained. • Configuration management is centralized for all operating systems, applications, servers and other configurable technologies. • Technologies are configured to protect data with the strength and integrity commensurate with the classification or sensitivity of the information and conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides), including test, development, staging and production environments. • Configurations conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides) for test, development, staging and production environments. • Deviations to baseline configurations are required to have a risk assessment and business process owner approval of the risk(s) associated with the deviation. • Special baseline configurations are created for higher-risk environments or for systems, applications and services that store, process or transmit sensitive/regulated data. • An IT Asset Management (ITAM) function, or similar function, ensures compliance with requirements for asset management. • Logical Access Control (LAC) is used to limit the ability of non-administrators from making configuration changes to systems, applications and services, including the of installation of unauthorized software. • A Security Incident Event Manager (SIEM), or similar automated tool, monitors for unauthorized activities, accounts, connections, devices and software. • Unauthorized configuration changes are responded to in accordance with an Incident Response Plan (IRP) to determine if the unauthorized configuration is malicious in nature. • Secure baseline configurations: o Enforce logging that links system access to individual users or service accounts using non-repudiation to protect against an individual falsely denying having performed a particular action. o Generate logs that contain sufficient information to establish necessary details of activity and allow for forensic analysis. o Prevent sensitive/regulated data from being captured in log files. o Restrict access to the management of event logs for privileged users to protect event logs and audit tools from unauthorized access, modification and deletion. o Retain security event logs for a time period consistent with records retention requirements for investigations of security incidents and to meet statutory, regulatory and contractual retention requirements. o Store logs locally and forward logs to a centralized log repository to provide an alternate audit capability in the event of a failure in primary audit capability. o Use internal system clocks to generate time stamps for security event logs that are synchronized with an authoritative time source. o Verbosely log all traffic (both allowed and blocked) arriving at network boundary devices, including firewalls, Intrusion Detection / Prevention Systems (IDS/IPS) and inbound and outbound proxies.
Configuration Management (CFG) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
Configuration Management (CFG) efforts are “world-class” capabilities that leverage predictive analysis (e.g., machine learning, AI, etc.). In addition to CMM Level 4 criteria, CMM Level 5 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Stakeholders make time-sensitive decisions to support operational efficiency, which may include automated remediation actions. ▪ Based on predictive analysis, process improvements are implemented according to “continuous improvement” practices that affect process changes.
CC7.1 CC8.1
CC7.1-POF1
null
4.1 4.3 4.4 4.5 4.6 4.7 4.8 4.11 10.3 10.4 10.5 16.7
4.1 4.3 4.4 4.5 4.6 4.7 10.3
4.1 4.3 4.4 4.5 4.6 4.7 4.8 4.11 10.3 10.4 10.5 16.7
4.1 4.3 4.4 4.5 4.6 4.7 4.8 4.11 10.3 10.4 10.5 16.7
BAI10.02 DSS06.06
null
AIS-02 CCC-06 IVS-03 IVS-04 UEM-07
CLS-05 IOT-02 IOT-07 SWS-01 SWS-02
null
null
CR 2.2 (6.4.1) CR 7.6 (11.8.1)
null
null
null
null
9.4.1 14.1.1
8.3 8.5 8.9 8.12 8.25 8.26
9.4.1 CLD.9.5.2 14.1.1
null
6.11 6.11.1 6.11.1.1
null
null
null
T1001, T1001.001, T1001.002, T1001.003, T1003, T1003.001, T1003.002, T1003.003, T1003.004, T1003.005, T1003.006, T1003.007, T1003.008, T1008, T1011.001, T1020.001, T1021.001, T1021.002, T1021.003, T1021.004, T1021.005, T1021.006, T1027, T1029, T1030, T1036, T1036.001, T1036.003, T1036.005, T1036.007, T1037, T1037.002, T1037.003, T1037.004, T1037.005, T1046, T1047, T1048, T1048.001, T1048.002, T1048.003, T1052, T1052.001, T1053, T1053.002, T1053.005, T1059, T1059.001, T1059.002, T1059.003, T1059.004, T1059.005, T1059.006, T1059.007, T1059.008, T1068, T1070, T1070.001, T1070.002, T1070.003, T1071, T1071.001, T1071.002, T1071.003, T1071.004, T1072, T1080, T1090, T1090.001, T1090.002, T1091, T1092, T1095, T1098.004, T1102, T1102.001, T1102.002, T1102.003, T1104, T1105, T1106, T1110, T1110.001, T1110.002, T1110.003, T1110.004, T1111, T1114, T1114.002, T1119, T1127, T1127.001, T1129, T1132, T1132.001, T1132.002, T1133, T1134.005, T1137, T1137.001, T1137.002, T1137.003, T1137.004, T1137.005, T1137.006, T1176, T1185, T1187, T1189, T1201, T1204, T1204.001, T1204.002, T1204.003, T1205, T1210, T1211, T1212, T1213, T1213.001, T1213.002, T1216, T1216.001, T1218, T1218.001, T1218.002, T1218.003, T1218.004, T1218.005, T1218.007, T1218.008, T1218.009, T1218.012, T1218.013, T1218.014, T1219, T1220, T1221, T1484, T1485, T1486, T1490, T1491, T1491.001, T1491.002, T1505, T1505.001, T1505.002, T1505.003, T1505.004, T1525, T1528, T1530, T1539, T1542.004, T1542.005, T1543, T1543.001, T1543.002, T1543.003, T1543.004, T1546, T1546.002, T1546.003, T1546.004, T1546.006, T1546.010, T1546.013, T1546.014, T1547.003, T1547.007, T1547.008, T1547.011, T1547.013, T1548, T1548.002, T1548.003, T1548.004, T1550.001, T1550.003, T1552, T1552.001, T1552.004, T1552.006, T1553, T1553.001, T1553.003, T1553.005, T1554, T1555.004, T1555.005, T1556, T1556.004, T1557, T1557.001, T1557.002, T1558, T1558.001, T1558.002, T1558.003, T1558.004, T1559, T1559.001, T1559.002, T1561, T1561.001, T1561.002, T1562, T1562.001, T1562.002, T1562.003, T1562.004, T1562.006, T1562.010, T1563, T1563.001, T1563.002, T1564.006, T1564.007, T1564.009, T1565, T1565.001, T1565.002, T1566, T1566.001, T1566.002, T1569, T1569.002, T1570, T1571, T1572, T1573, T1573.001, T1573.002, T1574, T1574.001, T1574.004, T1574.005, T1574.007, T1574.008, T1574.009, T1574.010, T1598, T1598.002, T1598.003, T1599, T1599.001, T1601, T1601.001, T1601.002, T1602, T1602.001, T1602.002
TS-1.1 TS-2.3 TS-2.11
null
null
PR.PO-P1
null
I-2
null
CM-2 CM-6 SA-8
CM-2 CM-6
CM-2 CM-6 SA-8
CM-2 CM-6 SA-8
CM-2 CM-6 PL-10 SA-8 SA-15(5)
null
CM-2 CM-6 SA-8 PL-10
CM-2 CM-6 SA-8 PL-10
CM-2 CM-6 SA-8 PL-10
SA-15(5)
null
CM-2 CM-6 SA-8 PL-10
CM-2 CM-6 SA-8 PL-10
CM-2 CM-6 SA-8 PL-10
3.4.7 3.4.8
CM-2 CM-6 PL-10 SA-8
CM-2 CM-6 PL-10 SA-8
CM-2 CM-6
SA-8
CM-2 CM-6 PL-10 SA-8
CM-2 CM-6 PL-10 SA-8
3.4.1 3.4.2
3.1.12.a 3.1.16.a 3.1.18.a 3.1.18.c 3.4.1.a 3.4.2.a 3.4.6.a 3.4.6.b 3.4.6.a 3.4.6.b 3.4.6.d 3.5.7.e 3.5.7.f 3.5.12.d
3.4.1[a] 3.4.1[b] 3.4.1[c] 3.4.2[a] 3.4.2[b]
A.03.01.12.a[03] A.03.01.16.a[03] A.03.01.18.a[02] A.03.03.01.a A.03.03.07.b[01] A.03.04.01.a[01] A.03.04.01.a[02] A.03.04.02.a[01] A.03.04.02.a[02] A.03.04.02.ODP[01] A.03.04.06.ODP[01] A.03.04.06.ODP[02] A.03.04.06.ODP[03] A.03.04.06.ODP[04] A.03.04.06.ODP[05] A.03.04.06.ODP[06] A.03.04.06.ODP[07] A.03.04.06.ODP[08] A.03.04.06.ODP[09] A.03.04.06.ODP[10] A.03.05.07.f
3.4.1e 3.4.2e 3.14.3e
PO.5.2
PR.IP-1 PR.IP-3
PR.AA-05 PR.PS-01 PR.PS-02 PR.PS-03
A01:2021 A02:2021 A03:2021 A04:2021 A05:2021 A06:2021 A07:2021 A08:2021 A09:2021 A10:2021
1.1 1.1.1 2.2 2.2.1 2.2.2 2.2.3 2.2.4
1.1 1.2.1 1.2.6 2.2.1 8.3.2 8.5 10.2 10.2.1 10.2.1.1 10.2.1.2 10.2.1.3 10.2.1.4 10.2.1.5 10.2.1.6 10.2.1.7 10.2.2 10.6 10.6.1 10.6 10.6.1 10.6.2 10.6.3 11.2
null
1.2.1 1.2.6 2.2.1 8.3.2 10.2.1 10.2.1.1 10.2.1.2 10.2.1.3 10.2.1.4 10.2.1.5 10.2.1.6 10.2.1.7 10.2.2 10.6.1 10.6.2 10.6.3
null
1.2.6
2.2.1 8.3.2 10.2.1.2 10.2.1.4 10.2.1.5 10.2.2 10.6.1 10.6.2 10.6.3
null
1.2.1 1.2.6 2.2.1 8.3.2 10.2.1 10.2.1.1 10.2.1.2 10.2.1.3 10.2.1.4 10.2.1.5 10.2.1.6 10.2.1.7 10.2.2 10.6.1 10.6.2 10.6.3
1.2.1 1.2.6 2.2.1 8.3.2 10.2.1 10.2.1.1 10.2.1.2 10.2.1.3 10.2.1.4 10.2.1.5 10.2.1.6 10.2.1.7 10.2.2 10.6.1 10.6.2 10.6.3
null
N.9
1.3 2.3 2.10 4.1
null
null
null
null
ASSET-3.A.MIL1 ASSET-3.B.MIL2 ASSET-3.C.MIL2 ARCHITECTURE-3.E.MIL2 ARCHITECTURE-3.F.MIL2 ARCHITECTURE-3.G.MIL2 ARCHITECTURE-4.C.MIL2
TM:SG2.SP1 TM:SG4.SP2
2.1 2.2 2.4 2.5
5.13.1.3 5.13.1.4
null
CM.L2-3.4.1 CM.L2-3.4.2
CM.L2-3.4.2 TBD - 3.4.1e TBD - 3.4.2e TBD - 3.14.3e
null
CM.L2-3.4.1 CM.L2-3.4.2
CM.L2-3.4.1 CM.L2-3.4.2 CM.L3-3.4.1e CM.L3-3.4.2e SI.L3-3.14.3e
CM-2 CM-6 SA-8
null
252.204-7008
null
null
null
null
null
CM-2 CM-6 SA-8
CM-2 CM-6
CM-2 CM-6 SA-8
CM-2 CM-6 SA-8
CM-2 CM-6
CM-2 CM-6 PL-10 SA-8
CM-2 CM-6 PL-10
CM-2 CM-6 PL-10 SA-8
CM-2 CM-6 PL-10 SA-8
CM-2 CM-6 PL-10
null
D3.PC.Im.B.5 D1.G.IT.B.4
null
null
null
null
1.S.A 2.S.A 3.S.A 6.S.B 6.S.C
1.M.A 2.M.A 7.M.D 9.M.A 9.M.B
1.M.A 2.M.A 7.M.D 9.M.A 9.M.B 2.L.A
2.D.8 3.3.7 CM-2 CM-6 SA-8
null
null
8-202 8-311 8-610
1.2 3.1 5.1 5.2
6.10
null
null
null
null
CM-2 CM-6
CM-2 CM-6
CM-2 CM-6
null
null
null
null
null
6-1-1305(4)
null
null
null
null
null
null
null
null
null
null
null
CM-2 CM-6 SA-8
CM-2 CM-6
CM-2 CM-6 SA-8
null
null
null
3.4.4(36)(b)
Art 9.3(a) Art 9.3(b) Art 9.3(c) Art 9.3(d)
null
null
Article 21.5
null
null
null
null
null
null
null
null
null
6.8
AM-02 AM-03 OPS-23
null
null
null
3.3 4.9 4.12 4.15 6.1 9.21 12.13 12.24 12.29 13.5 13.6 14.2 15.6
null
null
null
null
null
null
null
null
null
null
null
1-3-2-3 2-3-1-7
TPC-10 TPC-13 TPC-14 TPC-15 TPC-16 TPC-17 TPC-22 TPC-38 TPC-56 TPC-63 TPC-87
null
1-3-3 2-4-1 2-4-2 5-1-3-7
2-2-1-5 2-3-1-1 2-3-1-7
null
null
null
null
7.3.2 [OP.EXP.2]
null
null
null
null
B4.b
B4
2
null
null
Principle 3.1 Principle 3.2 Principle 3.3 Principle 3.4 Principle 4.1 Principle 4.2 Principle 4.3 Principle 4.4
Principle 3.1 Principle 3.2 Principle 3.3 Principle 3.4 Principle 3.5 Principle 4.1 Principle 4.2 Principle 4.3 Principle 4.4 Principle 4.5 Principle 4.6 Principle 4.7 Principle 4.8 Principle 4.9 Principle 4.10 Principle 4.11 Principle 4.12 Principle 4.13
Principle 1.3 Principle 1.4 Principle 1.7 Principle 3.1 Principle 3.2 Principle 3.3 Principle 3.4 Principle 3.5 Principle 3.6 Principle 3.7 Principle 3.8 Principle 3.9 Principle 3.10 Principle 3.11 Principle 4.1 Principle 4.2 Principle 4.3 Principle 4.4 Principle 4.5 Principle 4.6 Principle 4.7 Principle 4.8 Principle 4.9 Principle 4.10 Principle 4.11 Principle 4.12 Principle 4.13 Principle 4.14 Principle 4.15 Principle 4.16 Principle 4.17 Principle 5.13
null
null
1562 0341 0343 1406 1608 1407 1408 1409 0383 0380 1584 1491 1492 1621 1622 1623 1624 1418 0345 1604 1745 1709 1710
null
null
null
null
null
null
null
null
null
null
9.4.1 9.4.1.8.PB 14.1.1
null
null
14.1.8.C.01 14.1.9.C.01 14.1.9.C.02 14.1.10.C.01 14.1.10.C.02 14.3.7.C.01 23.2.21.C.01
null
null
null
4.3(a)
11.2.5 11.3.1 11.3.2
null
null
null
null
null
null
null
4.16 4.20
3.2.3 3.2.8
null
null
null
null
null
null
null
null
null
null
x
null
x
x
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-1 R-AM-2 R-AM-3 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-GV-8 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1
R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
null
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-10 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Configuration Management
Reviews & Updates
CFG-02.1
Mechanisms exist to review and update baseline configurations: ▪ At least annually; ▪ When required due to so; or ▪ As part of system component installations and upgrades.
- CimTrak Integrity Suite (https://www.cimcor.com/cimtrak/) - Defense Information Security Agency (DISA) Secure Technology Implementation Guides (STIGs) - Center for Internet Security (CIS) Benchmarks - NNT Change Tracker (https://www.newnettechnologies.com)
null
Does the organization review and update baseline configurations: ▪ At least annually; ▪ When required due to so; or ▪ As part of system component installations and upgrades?
8
Detect
null
X
X
There is no evidence of a capability to review and update baseline configurations: ▪ At least annually; ▪ When required due to so; or ▪ As part of system component installations and upgrades.
Configuration Management (CFG) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist: • IT personnel use an informal process to design, build and maintain secure configurations for test, development, staging and production environments. • Secure configurations are not: o Standardized across the organization. o Consistently aligned with industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides). • Configurations are reviewed only when new operating systems or versions of applications are released.
Configuration Management (CFG) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Configuration management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for configuration management. • Technologies are configured to protect data with the strength and integrity commensurate with the classification or sensitivity of the information and mostly conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides), including cryptographic protections for sensitive/regulated data. • Special baseline configurations are created for higher-risk environments or for systems, applications and services that store, process or transmit sensitive/regulated data. • Apart from workstation and server operating system baselines, configuration management is decentralized. • Cybersecurity personnel use a structured process to design, build and maintain secure configurations for test, development, staging and production environments. • Deviations to baseline configurations are required to have a risk assessment and the business process owner acceptance of the risk(s) associated with the deviation. • Unauthorized configuration changes are investigated to determine if the unauthorized configuration is malicious in nature. • Logical Access Control (LAC) is enforced to prohibit non-administrative users from being able to install unauthorized software.
Configuration Management (CFG) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • The configuration management function is formally assigned with defined roles and responsibilities. • An IT infrastructure team, or similar function, ensures that statutory, regulatory and contractual cybersecurity & data privacy obligations are addressed to ensure secure configurations are designed, built and maintained. • Configuration management is centralized for all operating systems, applications, servers and other configurable technologies. • Technologies are configured to protect data with the strength and integrity commensurate with the classification or sensitivity of the information and conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides), including test, development, staging and production environments. • Configurations conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides) for test, development, staging and production environments. • Deviations to baseline configurations are required to have a risk assessment and business process owner approval of the risk(s) associated with the deviation. • Special baseline configurations are created for higher-risk environments or for systems, applications and services that store, process or transmit sensitive/regulated data. • An IT Asset Management (ITAM) function, or similar function, ensures compliance with requirements for asset management. • Logical Access Control (LAC) is used to limit the ability of non-administrators from making configuration changes to systems, applications and services, including the of installation of unauthorized software. • A Security Incident Event Manager (SIEM), or similar automated tool, monitors for unauthorized activities, accounts, connections, devices and software. • Unauthorized configuration changes are responded to in accordance with an Incident Response Plan (IRP) to determine if the unauthorized configuration is malicious in nature.
Configuration Management (CFG) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
Configuration Management (CFG) efforts are “world-class” capabilities that leverage predictive analysis (e.g., machine learning, AI, etc.). In addition to CMM Level 4 criteria, CMM Level 5 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Stakeholders make time-sensitive decisions to support operational efficiency, which may include automated remediation actions. ▪ Based on predictive analysis, process improvements are implemented according to “continuous improvement” practices that affect process changes.
CC8.1
null
null
4.1 4.2
4.1 4.2
4.1 4.2
4.1 4.2
BAI10.03 BAI10.05
null
CCC-06 IVS-03 IVS-04
null
null
null
null
null
null
null
null
null
8.9
null
null
null
null
null
null
T1001, T1001.001, T1001.002, T1001.003, T1003, T1003.001, T1003.002, T1003.003, T1003.004, T1003.005, T1003.006, T1003.007, T1003.008, T1008, T1011.001, T1020.001, T1021.001, T1021.002, T1021.003, T1021.004, T1021.005, T1021.006, T1027, T1029, T1030, T1036, T1036.001, T1036.003, T1036.005, T1036.007, T1037, T1037.002, T1037.003, T1037.004, T1037.005, T1046, T1047, T1048, T1048.001, T1048.002, T1048.003, T1052, T1052.001, T1053, T1053.002, T1053.005, T1059, T1059.001, T1059.002, T1059.003, T1059.004, T1059.005, T1059.006, T1059.007, T1059.008, T1068, T1070, T1070.001, T1070.002, T1070.003, T1071, T1071.001, T1071.002, T1071.003, T1071.004, T1072, T1080, T1090, T1090.001, T1090.002, T1091, T1092, T1095, T1098.004, T1102, T1102.001, T1102.002, T1102.003, T1104, T1105, T1106, T1110, T1110.001, T1110.002, T1110.003, T1110.004, T1111, T1114, T1114.002, T1119, T1127, T1127.001, T1129, T1132, T1132.001, T1132.002, T1133, T1134.005, T1137, T1137.001, T1137.002, T1137.003, T1137.004, T1137.005, T1137.006, T1176, T1185, T1187, T1189, T1201, T1204, T1204.001, T1204.002, T1204.003, T1205, T1210, T1211, T1212, T1213, T1213.001, T1213.002, T1216, T1216.001, T1218, T1218.001, T1218.002, T1218.003, T1218.004, T1218.005, T1218.007, T1218.008, T1218.009, T1218.012, T1218.013, T1218.014, T1219, T1220, T1221, T1484, T1485, T1486, T1490, T1491, T1491.001, T1491.002, T1505, T1505.001, T1505.002, T1505.003, T1505.004, T1525, T1528, T1530, T1539, T1542.004, T1542.005, T1543, T1543.001, T1543.002, T1543.003, T1543.004, T1546, T1546.002, T1546.003, T1546.004, T1546.006, T1546.010, T1546.013, T1546.014, T1547.003, T1547.007, T1547.008, T1547.011, T1547.013, T1548, T1548.002, T1548.003, T1548.004, T1550.001, T1550.003, T1552, T1552.001, T1552.004, T1552.006, T1553, T1553.001, T1553.003, T1553.005, T1554, T1555.004, T1555.005, T1556, T1556.004, T1557, T1557.001, T1557.002, T1558, T1558.001, T1558.002, T1558.003, T1558.004, T1559, T1559.001, T1559.002, T1561, T1561.001, T1561.002, T1562, T1562.001, T1562.002, T1562.003, T1562.004, T1562.006, T1562.010, T1563, T1563.001, T1563.002, T1564.006, T1564.007, T1564.009, T1565, T1565.001, T1565.002, T1566, T1566.001, T1566.002, T1569, T1569.002, T1570, T1571, T1572, T1573, T1573.001, T1573.002, T1574, T1574.001, T1574.004, T1574.005, T1574.007, T1574.008, T1574.009, T1574.010, T1598, T1598.002, T1598.003, T1599, T1599.001, T1601, T1601.001, T1601.002, T1602, T1602.001, T1602.002
TS-1.1
null
null
null
null
null
null
CM-2(1)
null
CM-2(1)
CM-2(1)
CM-2
null
CM-2
CM-2
CM-2
null
null
CM-2
CM-2
CM-2
null
CM-2
CM-2
CM-2
null
CM-2
CM-2
NFO - CM-2(1)
3.4.1.b
null
A.03.04.01.b[01] A.03.04.01.b[02] A.03.04.01.b[03] A.03.04.01.b[04]
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
M.1.8.1
null
null
null
null
null
ASSET-3.D.MIL2 ASSET-3.E.MIL3
null
null
null
null
null
null
null
null
null
CM-2(1)
null
null
null
null
null
null
null
CM-2(1)
null
CM-2(1)
CM-2(1)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
CM-2
null
null
null
null
null
null
null
null
null
null
CM-2(1)
CM-2(1)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
CM-2
null
CM-2(1)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
3.3 14.3
null
null
null
null
null
null
null
null
null
null
null
2-3-1-6
null
null
1-6-2-2
2-3-1-2
null
null
null
null
null
null
null
null
null
B4.b
null
null
null
null
null
null
Principle 1.5
null
null
1588 1407
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
11.2.5
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
x
null
null
x
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-1 R-AM-2 R-AM-3 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-GV-8 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1
R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
null
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-10 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Configuration Management
Automated Central Management & Verification
CFG-02.2
Automated mechanisms exist to govern and report on baseline configurations of the systems.
- CimTrak Integrity Suite (https://www.cimcor.com/cimtrak/) - NNT Change Tracker (https://www.newnettechnologies.com)
null
Does the organization use automated mechanisms to govern and report on baseline configurations of the systems?
7
Detect
null
null
X
There is no evidence of a capability to govern and report on baseline configurations of the systems.
SP-CMM1 is N/A, since a structured process is required to govern and report on baseline configurations of the systems.
Configuration Management (CFG) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Configuration management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for configuration management. • Technologies are configured to protect data with the strength and integrity commensurate with the classification or sensitivity of the information and mostly conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides), including cryptographic protections for sensitive/regulated data. • Special baseline configurations are created for higher-risk environments or for systems, applications and services that store, process or transmit sensitive/regulated data. • Apart from workstation and server operating system baselines, configuration management is decentralized. • Cybersecurity personnel use a structured process to design, build and maintain secure configurations for test, development, staging and production environments. • Deviations to baseline configurations are required to have a risk assessment and the business process owner acceptance of the risk(s) associated with the deviation. • Unauthorized configuration changes are investigated to determine if the unauthorized configuration is malicious in nature. • Logical Access Control (LAC) is enforced to prohibit non-administrative users from being able to install unauthorized software.
Configuration Management (CFG) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • The configuration management function is formally assigned with defined roles and responsibilities. • An IT infrastructure team, or similar function, ensures that statutory, regulatory and contractual cybersecurity & data privacy obligations are addressed to ensure secure configurations are designed, built and maintained. • Configuration management is centralized for all operating systems, applications, servers and other configurable technologies. • Technologies are configured to protect data with the strength and integrity commensurate with the classification or sensitivity of the information and conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides), including test, development, staging and production environments. • Configurations conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides) for test, development, staging and production environments. • Deviations to baseline configurations are required to have a risk assessment and business process owner approval of the risk(s) associated with the deviation. • Special baseline configurations are created for higher-risk environments or for systems, applications and services that store, process or transmit sensitive/regulated data. • An IT Asset Management (ITAM) function, or similar function, ensures compliance with requirements for asset management. • Logical Access Control (LAC) is used to limit the ability of non-administrators from making configuration changes to systems, applications and services, including the of installation of unauthorized software. • A Security Incident Event Manager (SIEM), or similar automated tool, monitors for unauthorized activities, accounts, connections, devices and software. • Unauthorized configuration changes are responded to in accordance with an Incident Response Plan (IRP) to determine if the unauthorized configuration is malicious in nature.
Configuration Management (CFG) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
Configuration Management (CFG) efforts are “world-class” capabilities that leverage predictive analysis (e.g., machine learning, AI, etc.). In addition to CMM Level 4 criteria, CMM Level 5 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Stakeholders make time-sensitive decisions to support operational efficiency, which may include automated remediation actions. ▪ Based on predictive analysis, process improvements are implemented according to “continuous improvement” practices that affect process changes.
CC8.1
null
null
null
null
null
null
DSS06.06
null
CCC-06 CCC-07 CCC-08 UEM-04
CCM-03
null
null
CR 7.6 (11.8.3(1))
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
CM-2(2) CM-6(1)
null
null
CM-2(2) CM-6(1)
CM-2(2) CM-6(1)
null
null
CM-2(2)
CM-2(2) CM-6(1)
null
null
null
CM-2(2)
CM-2(2) CM-6(1)
null
CM-6(1)
null
null
null
null
CM-6(1)
null
null
null
null
3.4.3e
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
D.1.1
null
null
null
null
null
null
null
null
null
null
null
TBD - 3.4.3e
null
null
CM.L3-3.4.3e
CM-6(1)
null
null
null
null
null
null
null
CM-2(2) CM-6(1)
null
CM-2(2) CM-6(1)
CM-2(2) CM-6(1)
null
CM-2(2) CM-6(1)
null
CM-2(2) CM-6(1)
CM-2(2) CM-6(1)
null
null
null
null
null
null
null
null
null
2.L.A
CM-2(2)
null
CIP-010-2 R2
null
null
null
null
null
null
null
null
CM-6(1)
CM-2(2) CM-6(1)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
CM-2(2) CM-6(1)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
3.3 6.2 6.4 9.22 9.23 14.3 14.4
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
B4.b
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
4.3(a) 4.3(b)
11.3.2
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
x
null
null
x
R-AM-3 R-BC-3 R-GV-1 R-GV-6 R-GV-7 R-SA-1
null
null
null
null
null
null
R-AM-3
null
null
R-BC-3
null
null
null
null
null
null
null
null
null
R-GV-1
null
null
null
null
R-GV-6
R-GV-7
null
null
null
null
null
R-SA-1
null
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-10 MT-11 MT-12 MT-13 MT-14
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
null
null
null
Configuration Management
Retention Of Previous Configurations
CFG-02.3
Mechanisms exist to retain previous versions of baseline configuration to support roll back.
- CimTrak Integrity Suite (https://www.cimcor.com/cimtrak/) - NNT Change Tracker (https://www.newnettechnologies.com)
null
Does the organization retain previous versions of baseline configuration to support roll back?
3
Identify
null
X
X
There is no evidence of a capability to retain previous versions of baseline configuration to support roll back.
Configuration Management (CFG) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist: • IT personnel use an informal process to design, build and maintain secure configurations for test, development, staging and production environments. • Secure configurations are not: o Standardized across the organization. o Consistently aligned with industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides).
Configuration Management (CFG) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Configuration management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for configuration management. • Technologies are configured to protect data with the strength and integrity commensurate with the classification or sensitivity of the information and mostly conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides), including cryptographic protections for sensitive/regulated data. • Special baseline configurations are created for higher-risk environments or for systems, applications and services that store, process or transmit sensitive/regulated data. • Apart from workstation and server operating system baselines, configuration management is decentralized. • Cybersecurity personnel use a structured process to design, build and maintain secure configurations for test, development, staging and production environments. • Deviations to baseline configurations are required to have a risk assessment and the business process owner acceptance of the risk(s) associated with the deviation. • Unauthorized configuration changes are investigated to determine if the unauthorized configuration is malicious in nature. • Logical Access Control (LAC) is enforced to prohibit non-administrative users from being able to install unauthorized software.
Configuration Management (CFG) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • The configuration management function is formally assigned with defined roles and responsibilities. • An IT infrastructure team, or similar function, ensures that statutory, regulatory and contractual cybersecurity & data privacy obligations are addressed to ensure secure configurations are designed, built and maintained. • Configuration management is centralized for all operating systems, applications, servers and other configurable technologies. • Technologies are configured to protect data with the strength and integrity commensurate with the classification or sensitivity of the information and conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides), including test, development, staging and production environments. • Configurations conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides) for test, development, staging and production environments. • Deviations to baseline configurations are required to have a risk assessment and business process owner approval of the risk(s) associated with the deviation. • Special baseline configurations are created for higher-risk environments or for systems, applications and services that store, process or transmit sensitive/regulated data. • An IT Asset Management (ITAM) function, or similar function, ensures compliance with requirements for asset management. • Logical Access Control (LAC) is used to limit the ability of non-administrators from making configuration changes to systems, applications and services, including the of installation of unauthorized software. • A Security Incident Event Manager (SIEM), or similar automated tool, monitors for unauthorized activities, accounts, connections, devices and software. • Unauthorized configuration changes are responded to in accordance with an Incident Response Plan (IRP) to determine if the unauthorized configuration is malicious in nature. • Historical versions of configurations are maintained for troubleshooting and forensics reasons.
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to retain previous versions of baseline configuration to support roll back.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to retain previous versions of baseline configuration to support roll back.
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
CM-2(3)
null
CM-2(3)
CM-2(3)
CM-2(3)
null
null
CM-2(3)
CM-2(3)
null
null
null
CM-2(3)
CM-2(3)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
G.2.10
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
CM-2(3)
null
null
null
null
null
null
null
CM-2(3)
null
CM-2(3)
CM-2(3)
null
CM-2(3)
null
CM-2(3)
CM-2(3)
null
null
null
null
null
null
null
null
null
null
CM-2(3)
null
null
null
null
null
null
null
null
null
null
CM-2(3)
CM-2(3)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
CM-2(3)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
14.5
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
1510
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
x
null
null
x
R-AM-3 R-BC-1 R-BC-3 R-EX-5 R-GV-1 R-GV-4 R-GV-6 R-GV-7 R-IR-1 R-IR-4 R-SA-1
null
null
null
null
null
null
R-AM-3
R-BC-1
null
R-BC-3
null
null
null
null
null
null
R-EX-5
null
null
R-GV-1
null
null
R-GV-4
null
R-GV-6
R-GV-7
null
R-IR-1
null
null
R-IR-4
R-SA-1
null
NT-2 NT-3 NT-4 NT-5 NT-6 NT-7 NT-8 NT-9 NT-10 NT-11 NT-12 NT-13 NT-14 MT-1 MT-2 MT-3 MT-4 MT-5 MT-6 MT-7 MT-8 MT-9 MT-10 MT-11 MT-12 MT-13 MT-14 MT-15
null
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Configuration Management
Development & Test Environment Configurations
CFG-02.4
Mechanisms exist to manage baseline configurations for development and test environments separately from operational baseline configurations to minimize the risk of unintentional changes.
- CimTrak Integrity Suite (https://www.cimcor.com/cimtrak/) - NNT Change Tracker (https://www.newnettechnologies.com)
null
Does the organization manage baseline configurations for development and test environments separately from operational baseline configurations to minimize the risk of unintentional changes?
5
Protect
null
X
X
There is no evidence of a capability to manage baseline configurations for development and test environments separately from operational baseline configurations to minimize the risk of unintentional changes.
Configuration Management (CFG) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist: • IT personnel use an informal process to design, build and maintain secure configurations for test, development, staging and production environments. • Secure configurations are not: o Standardized across the organization. o Consistently aligned with industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides).
Configuration Management (CFG) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Configuration management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for configuration management. • Technologies are configured to protect data with the strength and integrity commensurate with the classification or sensitivity of the information and mostly conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides), including cryptographic protections for sensitive/regulated data. • Special baseline configurations are created for higher-risk environments or for systems, applications and services that store, process or transmit sensitive/regulated data. • Apart from workstation and server operating system baselines, configuration management is decentralized. • Cybersecurity personnel use a structured process to design, build and maintain secure configurations for test, development, staging and production environments. • Deviations to baseline configurations are required to have a risk assessment and the business process owner acceptance of the risk(s) associated with the deviation. • Unauthorized configuration changes are investigated to determine if the unauthorized configuration is malicious in nature. • Logical Access Control (LAC) is enforced to prohibit non-administrative users from being able to install unauthorized software.
Configuration Management (CFG) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • The configuration management function is formally assigned with defined roles and responsibilities. • An IT infrastructure team, or similar function, ensures that statutory, regulatory and contractual cybersecurity & data privacy obligations are addressed to ensure secure configurations are designed, built and maintained. • Configuration management is centralized for all operating systems, applications, servers and other configurable technologies. • Technologies are configured to protect data with the strength and integrity commensurate with the classification or sensitivity of the information and conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides), including test, development, staging and production environments. • Configurations conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides) for test, development, staging and production environments. • Deviations to baseline configurations are required to have a risk assessment and business process owner approval of the risk(s) associated with the deviation. • Special baseline configurations are created for higher-risk environments or for systems, applications and services that store, process or transmit sensitive/regulated data. • An IT Asset Management (ITAM) function, or similar function, ensures compliance with requirements for asset management. • Logical Access Control (LAC) is used to limit the ability of non-administrators from making configuration changes to systems, applications and services, including the of installation of unauthorized software. • A Security Incident Event Manager (SIEM), or similar automated tool, monitors for unauthorized activities, accounts, connections, devices and software. • Unauthorized configuration changes are responded to in accordance with an Incident Response Plan (IRP) to determine if the unauthorized configuration is malicious in nature.
Configuration Management (CFG) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
Configuration Management (CFG) efforts are “world-class” capabilities that leverage predictive analysis (e.g., machine learning, AI, etc.). In addition to CMM Level 4 criteria, CMM Level 5 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Stakeholders make time-sensitive decisions to support operational efficiency, which may include automated remediation actions. ▪ Based on predictive analysis, process improvements are implemented according to “continuous improvement” practices that affect process changes.
null
null
null
null
null
null
null
null
null
AIS-02 IVS-05
null
null
null
null
null
null
null
null
null
8.25
null
null
null
null
null
null
null
TS-2.5
null
null
null
null
null
null
CM-2(6)
null
null
null
CM-2(6)
null
null
null
null
CM-2(6)
null
null
null
null
null
CM-2(6)
null
null
null
CM-2(6)
CM-2(6)
null
null
null
null
null
PO.5 PO.5.1 PO.5.2
null
null
null
6.4.1
6.5.6
null
null
null
null
null
null
6.5.6
6.5.6
null
I.1.1
null
5.2.2
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
6.S.A
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
10.1 10.2
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
0292
null
null
null
null
null
null
null
null
null
null
null
null
null
18.1.10.C.01 18.1.10.C.02 18.1.10.C.03 18.1.10.C.04
null
null
null
null
5.7.3
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
x
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-1 R-AM-2 R-AM-3 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-GV-8 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1
R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
null
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-10 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Configuration Management
Configure Systems, Components or Services for High-Risk Areas
CFG-02.5
Mechanisms exist to configure systems utilized in high-risk areas with more restrictive baseline configurations.
- NNT Change Tracker (https://www.newnettechnologies.com)
E-AST-12 E-AST-13 E-AST-14 E-AST-15 E-AST-16 E-AST-17 E-AST-18 E-AST-19 E-AST-20 E-AST-21
Does the organization configure systems utilized in high-risk areas with more restrictive baseline configurations?
8
Protect
null
X
X
There is no evidence of a capability to configure systems utilized in high-risk areas with more restrictive baseline configurations.
Configuration Management (CFG) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist: • IT personnel use an informal process to design, build and maintain secure configurations for test, development, staging and production environments. • Secure configurations are not: o Standardized across the organization. o Consistently aligned with industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides).
Configuration Management (CFG) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Configuration management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for configuration management. • Technologies are configured to protect data with the strength and integrity commensurate with the classification or sensitivity of the information and mostly conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides), including cryptographic protections for sensitive/regulated data. • Special baseline configurations are created for higher-risk environments or for systems, applications and services that store, process or transmit sensitive/regulated data. • Apart from workstation and server operating system baselines, configuration management is decentralized. • Cybersecurity personnel use a structured process to design, build and maintain secure configurations for test, development, staging and production environments. • Deviations to baseline configurations are required to have a risk assessment and the business process owner acceptance of the risk(s) associated with the deviation. • Unauthorized configuration changes are investigated to determine if the unauthorized configuration is malicious in nature. • Logical Access Control (LAC) is enforced to prohibit non-administrative users from being able to install unauthorized software.
Configuration Management (CFG) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • The configuration management function is formally assigned with defined roles and responsibilities. • An IT infrastructure team, or similar function, ensures that statutory, regulatory and contractual cybersecurity & data privacy obligations are addressed to ensure secure configurations are designed, built and maintained. • Configuration management is centralized for all operating systems, applications, servers and other configurable technologies. • Technologies are configured to protect data with the strength and integrity commensurate with the classification or sensitivity of the information and conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides), including test, development, staging and production environments. • Configurations conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides) for test, development, staging and production environments. • Deviations to baseline configurations are required to have a risk assessment and business process owner approval of the risk(s) associated with the deviation. • Special baseline configurations are created for higher-risk environments or for systems, applications and services that store, process or transmit sensitive/regulated data. • An IT Asset Management (ITAM) function, or similar function, ensures compliance with requirements for asset management. • Logical Access Control (LAC) is used to limit the ability of non-administrators from making configuration changes to systems, applications and services, including the of installation of unauthorized software. • A Security Incident Event Manager (SIEM), or similar automated tool, monitors for unauthorized activities, accounts, connections, devices and software. • Unauthorized configuration changes are responded to in accordance with an Incident Response Plan (IRP) to determine if the unauthorized configuration is malicious in nature. • Physical controls, administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
Configuration Management (CFG) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
Configuration Management (CFG) efforts are “world-class” capabilities that leverage predictive analysis (e.g., machine learning, AI, etc.). In addition to CMM Level 4 criteria, CMM Level 5 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Stakeholders make time-sensitive decisions to support operational efficiency, which may include automated remediation actions. ▪ Based on predictive analysis, process improvements are implemented according to “continuous improvement” practices that affect process changes.
null
null
null
16.7
null
16.7
16.7
DSS06.06
null
AIS-02 IVS-03 IVS-04 UEM-14
CLS-05 IOT-02 IOT-07 SAP-09 SWS-01 SWS-02 SWS-03
null
null
CR 2.2 (6.4.1) CR 7.6 (11.8.1)
null
null
null
null
null
8.12
CLD.9.5.2
null
null
null
null
null
null
TS-1.1 TS-2.3 TS-2.11
null
null
null
null
P-6
null
CM-2(7)
null
CM-2(7)
CM-2(7)
CM-2(7) CM-7(6) CM-7(7) CM-7(9)
null
null
CM-2(7)
CM-2(7)
null
null
null
CM-2(7)
CM-2(7)
null
CM-7(6) CM-7(7) CM-7(9)
null
null
null
CM-7(6) CM-7(9)
CM-7(6) CM-7(7) CM-7(9)
NFO - CM-2(7)
3.4.1.a 3.4.12.a 3.4.12.b
null
A.03.04.12.ODP[01] A.03.04.12.ODP[02]
null
PO.5 PO.5.1 PO.5.2
null
null
null
null
1.2.1 1.5 1.5.1 8.5 10.2 10.2.1 10.2.1.1 10.2.1.2 10.2.1.3 10.2.1.4 10.2.1.5 10.2.1.6 10.2.1.7 10.2.2 10.6 10.6.1 10.6.2 10.6.3
null
1.2.1 1.2.6 1.5.1 10.2.1 10.2.1.1 10.2.1.2 10.2.1.3 10.2.1.4 10.2.1.5 10.2.1.6 10.2.1.7 10.2.2 10.6.1 10.6.2 10.6.3
null
1.2.6
10.2.1.2 10.2.1.4 10.2.1.5 10.2.2 10.6.1 10.6.2 10.6.3
1.5.1
1.2.1 1.2.6 1.5.1 10.2.1 10.2.1.1 10.2.1.2 10.2.1.3 10.2.1.4 10.2.1.5 10.2.1.6 10.2.1.7 10.2.2 10.6.1 10.6.2 10.6.3
1.2.1 1.2.6 1.5.1 10.2.1 10.2.1.1 10.2.1.2 10.2.1.3 10.2.1.4 10.2.1.5 10.2.1.6 10.2.1.7 10.2.2 10.6.1 10.6.2 10.6.3
null
I.1.7.6
1.3 2.3 2.6 2.10 4.1
null
null
null
null
ARCHITECTURE-3.G.MIL2 ARCHITECTURE-3.K.MIL2
OPD:SG1.SP2
2.4 2.5
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
CM-2(7)
null
CM-2(7)
CM-2(7)
null
CM-2(7)
null
CM-2(7)
CM-2(7)
null
null
null
null
null
null
null
6.S.A
null
null
3.3.7 CM-2(7) CM-7(9)
null
null
null
1.2 5.1 5.2
null
null
null
null
null
null
null
CM-2(7)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
CM-2(7)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
4.12 9.21 10.7
null
null
null
null
null
null
null
null
null
null
null
1-3-2-3 2-3-1-7
TPC-10 TPC-13 TPC-14 TPC-15 TPC-16 TPC-17 TPC-22 TPC-38 TPC-56 TPC-63 TPC-87
null
5-1-3-7
2-2-1-5 2-3-1-7
null
null
null
null
null
null
null
null
null
B4.b
B4
null
null
null
null
null
null
null
null
1656 1657 1658 1659 1666 1667 1668 1669 1670 1748 1671 1672 1673 1674 1675 1676 1677 1678 1749 1800 0534
null
null
null
null
null
null
null
null
null
null
null
null
null
18.1.10.C.01 18.1.10.C.02 18.1.10.C.03 18.1.10.C.04 23.2.21.C.01
null
null
null
null
null
null
null
null
null
null
null
null
null
3.2.3
null
null
null
null
null
null
null
null
null
null
x
null
null
x
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-1 R-AM-2 R-AM-3 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-GV-8 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1
R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
null
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-10 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Configuration Management
Network Device Configuration File Synchronization
CFG-02.6
Mechanisms exist to configure network devices to synchronize startup and running configuration files.
- CimTrak Integrity Suite (https://www.cimcor.com/cimtrak/) - NNT Change Tracker (https://www.newnettechnologies.com)
null
Does the organization configure network devices to synchronize startup and running configuration files?
7
Protect
null
null
X
There is no evidence of a capability to configure network devices to synchronize startup and running configuration files.
SP-CMM1 is N/A, since a structured process is required to configure network devices to synchronize startup and running configuration files.
Configuration Management (CFG) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Configuration management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for configuration management. • Technologies are configured to protect data with the strength and integrity commensurate with the classification or sensitivity of the information and mostly conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides), including cryptographic protections for sensitive/regulated data. • Special baseline configurations are created for higher-risk environments or for systems, applications and services that store, process or transmit sensitive/regulated data. • Apart from workstation and server operating system baselines, configuration management is decentralized. • Cybersecurity personnel use a structured process to design, build and maintain secure configurations for test, development, staging and production environments. • Deviations to baseline configurations are required to have a risk assessment and the business process owner acceptance of the risk(s) associated with the deviation. • Unauthorized configuration changes are investigated to determine if the unauthorized configuration is malicious in nature. • Logical Access Control (LAC) is enforced to prohibit non-administrative users from being able to install unauthorized software. • IT infrastructure personnel configure network devices to synchronize startup and running configuration files.
Configuration Management (CFG) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • The configuration management function is formally assigned with defined roles and responsibilities. • An IT infrastructure team, or similar function, ensures that statutory, regulatory and contractual cybersecurity & data privacy obligations are addressed to ensure secure configurations are designed, built and maintained. • Configuration management is centralized for all operating systems, applications, servers and other configurable technologies. • Technologies are configured to protect data with the strength and integrity commensurate with the classification or sensitivity of the information and conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides), including test, development, staging and production environments. • Configurations conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides) for test, development, staging and production environments. • Deviations to baseline configurations are required to have a risk assessment and business process owner approval of the risk(s) associated with the deviation. • Special baseline configurations are created for higher-risk environments or for systems, applications and services that store, process or transmit sensitive/regulated data. • An IT Asset Management (ITAM) function, or similar function, ensures compliance with requirements for asset management. • Logical Access Control (LAC) is used to limit the ability of non-administrators from making configuration changes to systems, applications and services, including the of installation of unauthorized software. • A Security Incident Event Manager (SIEM), or similar automated tool, monitors for unauthorized activities, accounts, connections, devices and software. • Unauthorized configuration changes are responded to in accordance with an Incident Response Plan (IRP) to determine if the unauthorized configuration is malicious in nature. • IT infrastructure personnel configure network devices to synchronize startup and running configuration files.
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to configure network devices to synchronize startup and running configuration files.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to configure network devices to synchronize startup and running configuration files.
null
null
null
null
null
null
null
null
null
IVS-03
null
null
null
CR 7.6 (11.8.1)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
1.2.2
1.2.8
null
1.2.8
null
null
null
null
1.2.8
1.2.8
null
M.1.8
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
9.22
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
18.1.10.C.01 18.1.10.C.02 18.1.10.C.03 18.1.10.C.04
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
x
null
null
null
R-AC-2 R-AC-3 R-AC-4 R-AM-2 R-AM-3 R-BC-1 R-BC-3 R-BC-4 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-IR-3 R-SA-1
null
R-AC-2
R-AC-3
R-AC-4
null
R-AM-2
R-AM-3
R-BC-1
null
R-BC-3
R-BC-4
null
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
null
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
null
null
R-IR-3
null
R-SA-1
null
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-10 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Configuration Management
Approved Configuration Deviations
CFG-02.7
Mechanisms exist to document, assess risk and approve or deny deviations to standardized configurations.
- CimTrak Integrity Suite (https://www.cimcor.com/cimtrak/) - NNT Change Tracker (https://www.newnettechnologies.com)
null
Does the organization document, assess risk and approve or deny deviations to standardized configurations?
9
Protect
null
X
X
There is no evidence of a capability to document, assess risk and approve or deny deviations to standardized configurations.
Configuration Management (CFG) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist: • IT personnel use an informal process to design, build and maintain secure configurations for test, development, staging and production environments. • Secure configurations are not: o Standardized across the organization. o Consistently aligned with industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides). • The review of any request for deviating from baseline configurations is documented and a risk assessment performed to determine if the deviation is acceptable.
Configuration Management (CFG) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Configuration management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for configuration management. • Technologies are configured to protect data with the strength and integrity commensurate with the classification or sensitivity of the information and mostly conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides), including cryptographic protections for sensitive/regulated data. • Special baseline configurations are created for higher-risk environments or for systems, applications and services that store, process or transmit sensitive/regulated data. • Apart from workstation and server operating system baselines, configuration management is decentralized. • Cybersecurity personnel use a structured process to design, build and maintain secure configurations for test, development, staging and production environments. • Deviations to baseline configurations are required to have a risk assessment and the business process owner acceptance of the risk(s) associated with the deviation. • Unauthorized configuration changes are investigated to determine if the unauthorized configuration is malicious in nature. • Logical Access Control (LAC) is enforced to prohibit non-administrative users from being able to install unauthorized software. • Deviations to baseline for embedded technologies configurations are required to have a risk assessment and the business process owner accepts the risk(s) associated with the deviation.
Configuration Management (CFG) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • The configuration management function is formally assigned with defined roles and responsibilities. • An IT infrastructure team, or similar function, ensures that statutory, regulatory and contractual cybersecurity & data privacy obligations are addressed to ensure secure configurations are designed, built and maintained. • Configuration management is centralized for all operating systems, applications, servers and other configurable technologies. • Technologies are configured to protect data with the strength and integrity commensurate with the classification or sensitivity of the information and conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides), including test, development, staging and production environments. • Configurations conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides) for test, development, staging and production environments. • Deviations to baseline configurations are required to have a risk assessment and business process owner approval of the risk(s) associated with the deviation. • Special baseline configurations are created for higher-risk environments or for systems, applications and services that store, process or transmit sensitive/regulated data. • An IT Asset Management (ITAM) function, or similar function, ensures compliance with requirements for asset management. • Logical Access Control (LAC) is used to limit the ability of non-administrators from making configuration changes to systems, applications and services, including the of installation of unauthorized software. • A Security Incident Event Manager (SIEM), or similar automated tool, monitors for unauthorized activities, accounts, connections, devices and software. • Unauthorized configuration changes are responded to in accordance with an Incident Response Plan (IRP) to determine if the unauthorized configuration is malicious in nature. • Deviations to baseline for embedded technologies configurations are required to have a risk assessment and the business process owner accepts the risk(s) associated with the deviation. • Unauthorized configuration changes are immediately reverted to approved configurations.
Configuration Management (CFG) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
Configuration Management (CFG) efforts are “world-class” capabilities that leverage predictive analysis (e.g., machine learning, AI, etc.). In addition to CMM Level 4 criteria, CMM Level 5 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Stakeholders make time-sensitive decisions to support operational efficiency, which may include automated remediation actions. ▪ Based on predictive analysis, process improvements are implemented according to “continuous improvement” practices that affect process changes.
null
null
null
null
null
null
null
null
null
AIS-02 CCC-08
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
CM-6
CM-6
null
null
CM-6
null
CM-6
CM-6
CM-6
null
null
CM-6
CM-6
CM-6
null
CM-6
CM-6
CM-6
null
CM-6
CM-6
null
3.4.2.b
null
null
null
PO.5.2
null
null
null
null
null
null
null
null
null
null
null
null
null
null
M.1.42
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
CM-6
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
CM-6
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
CM-6
CM-6
CM-6
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
B4.b
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
4.3(c)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
x
null
null
x
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-1 R-AM-2 R-AM-3 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1
R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
null
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-10 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Configuration Management
Respond To Unauthorized Changes
CFG-02.8
Mechanisms exist to respond to unauthorized changes to configuration settings as security incidents.
- CimTrak Integrity Suite (https://www.cimcor.com/cimtrak/) - Service Level Agreements (SLAs) - NNT Change Tracker (https://www.newnettechnologies.com)
null
Does the organization respond to unauthorized changes to configuration settings as security incidents?
9
Respond
null
null
X
There is no evidence of a capability to respond to unauthorized changes to configuration settings as security incidents.
SP-CMM1 is N/A, since a structured process is required to respond to unauthorized changes to configuration settings as security incidents.
Configuration Management (CFG) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Configuration management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for configuration management. • Technologies are configured to protect data with the strength and integrity commensurate with the classification or sensitivity of the information and mostly conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides), including cryptographic protections for sensitive/regulated data. • Special baseline configurations are created for higher-risk environments or for systems, applications and services that store, process or transmit sensitive/regulated data. • Apart from workstation and server operating system baselines, configuration management is decentralized. • Cybersecurity personnel use a structured process to design, build and maintain secure configurations for test, development, staging and production environments. • Deviations to baseline configurations are required to have a risk assessment and the business process owner acceptance of the risk(s) associated with the deviation. • Unauthorized configuration changes are investigated to determine if the unauthorized configuration is malicious in nature. • Logical Access Control (LAC) is enforced to prohibit non-administrative users from being able to install unauthorized software. • Unauthorized configuration changes are responded to in accordance with an Incident Response Plan (IRP) to determine if the unauthorized configuration is malicious in nature.
Configuration Management (CFG) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • The configuration management function is formally assigned with defined roles and responsibilities. • An IT infrastructure team, or similar function, ensures that statutory, regulatory and contractual cybersecurity & data privacy obligations are addressed to ensure secure configurations are designed, built and maintained. • Configuration management is centralized for all operating systems, applications, servers and other configurable technologies. • Technologies are configured to protect data with the strength and integrity commensurate with the classification or sensitivity of the information and conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides), including test, development, staging and production environments. • Configurations conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides) for test, development, staging and production environments. • Deviations to baseline configurations are required to have a risk assessment and business process owner approval of the risk(s) associated with the deviation. • Special baseline configurations are created for higher-risk environments or for systems, applications and services that store, process or transmit sensitive/regulated data. • An IT Asset Management (ITAM) function, or similar function, ensures compliance with requirements for asset management. • Logical Access Control (LAC) is used to limit the ability of non-administrators from making configuration changes to systems, applications and services, including the of installation of unauthorized software. • A Security Incident Event Manager (SIEM), or similar automated tool, monitors for unauthorized activities, accounts, connections, devices and software. • Unauthorized configuration changes are responded to in accordance with an Incident Response Plan (IRP) to determine if the unauthorized configuration is malicious in nature. • Unauthorized configuration changes are responded to in accordance with an Incident Response Plan (IRP) to determine if the unauthorized configuration is malicious in nature. • Unauthorized configuration changes are immediately reverted to approved configurations.
Configuration Management (CFG) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
Configuration Management (CFG) efforts are “world-class” capabilities that leverage predictive analysis (e.g., machine learning, AI, etc.). In addition to CMM Level 4 criteria, CMM Level 5 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Stakeholders make time-sensitive decisions to support operational efficiency, which may include automated remediation actions. ▪ Based on predictive analysis, process improvements are implemented according to “continuous improvement” practices that affect process changes.
null
null
null
2.3
2.3
2.3
2.3
null
null
CCC-09
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
CM-6(2)
null
null
CM-6(2)
CM-6(2)
null
null
null
CM-6(2)
null
null
null
null
CM-6(2)
null
CM-6(2)
null
null
null
null
CM-6(2)
null
null
null
A.03.04.02.b[01] A.03.04.02.b[02]
null
null
null
null
null
null
10.7 10.7.1 10.7.2 10.7.3
null
null
null
null
null
null
10.7.2 10.7.3
10.7.1 10.7.2 10.7.3
null
J.2.31
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
CM-6(2)
null
null
CM-6(2)
null
CM-6(2)
null
null
CM-6(2)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
8.6
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
2-3-1-11
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
4.19 4.20
null
null
null
null
null
null
null
null
null
null
null
x
null
null
x
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-1 R-AM-2 R-AM-3 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1
R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
null
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
null
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-10 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Configuration Management
Baseline Tailoring
CFG-02.9
Mechanisms exist to allow baseline controls to be specialized or customized by applying a defined set of tailoring actions that are specific to: ▪ Mission / business functions; ▪ Operational environment; ▪ Specific threats or vulnerabilities; or ▪ Other conditions or situations that could affect mission / business success.
- DISA STIGs - CIS Benchmarks
null
Does the organization allow baseline controls to be specialized or customized by applying a defined set of tailoring actions that are specific to: ▪ Mission / business functions; ▪ Operational environment; ▪ Specific threats or vulnerabilities; or ▪ Other conditions or situations that could affect mission / business success?
9
Protect
null
X
X
There is no evidence of a capability to allow baseline controls to be specialized or customized by applying a defined set of tailoring actions that are specific to: ▪ Mission / business functions; ▪ Operational environment; ▪ Specific threats or vulnerabilities; or ▪ Other conditions or situations that could affect mission / business success.
Configuration Management (CFG) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist: • IT personnel use an informal process to design, build and maintain secure configurations for test, development, staging and production environments. • Secure configurations are not: o Standardized across the organization. o Consistently aligned with industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides).
Configuration Management (CFG) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Configuration management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for configuration management. • Technologies are configured to protect data with the strength and integrity commensurate with the classification or sensitivity of the information and mostly conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides), including cryptographic protections for sensitive/regulated data. • Special baseline configurations are created for higher-risk environments or for systems, applications and services that store, process or transmit sensitive/regulated data. • Apart from workstation and server operating system baselines, configuration management is decentralized. • Cybersecurity personnel use a structured process to design, build and maintain secure configurations for test, development, staging and production environments. • Deviations to baseline configurations are required to have a risk assessment and the business process owner acceptance of the risk(s) associated with the deviation. • Unauthorized configuration changes are investigated to determine if the unauthorized configuration is malicious in nature. • Logical Access Control (LAC) is enforced to prohibit non-administrative users from being able to install unauthorized software.
Configuration Management (CFG) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • The configuration management function is formally assigned with defined roles and responsibilities. • An IT infrastructure team, or similar function, ensures that statutory, regulatory and contractual cybersecurity & data privacy obligations are addressed to ensure secure configurations are designed, built and maintained. • Configuration management is centralized for all operating systems, applications, servers and other configurable technologies. • Technologies are configured to protect data with the strength and integrity commensurate with the classification or sensitivity of the information and conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides), including test, development, staging and production environments. • Configurations conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides) for test, development, staging and production environments. • Deviations to baseline configurations are required to have a risk assessment and business process owner approval of the risk(s) associated with the deviation. • Special baseline configurations are created for higher-risk environments or for systems, applications and services that store, process or transmit sensitive/regulated data. • An IT Asset Management (ITAM) function, or similar function, ensures compliance with requirements for asset management. • Logical Access Control (LAC) is used to limit the ability of non-administrators from making configuration changes to systems, applications and services, including the of installation of unauthorized software. • A Security Incident Event Manager (SIEM), or similar automated tool, monitors for unauthorized activities, accounts, connections, devices and software. • Unauthorized configuration changes are responded to in accordance with an Incident Response Plan (IRP) to determine if the unauthorized configuration is malicious in nature.
Configuration Management (CFG) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
Configuration Management (CFG) efforts are “world-class” capabilities that leverage predictive analysis (e.g., machine learning, AI, etc.). In addition to CMM Level 4 criteria, CMM Level 5 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Stakeholders make time-sensitive decisions to support operational efficiency, which may include automated remediation actions. ▪ Based on predictive analysis, process improvements are implemented according to “continuous improvement” practices that affect process changes.
null
null
null
null
null
null
null
null
null
AIS-02 IVS-03
null
null
null
null
PM-06-13 RQ-06-14
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
P-4
null
null
null
null
null
PL-11
null
PL-11
PL-11
PL-11
null
null
PL-11
PL-11
PL-11
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
A01:2021 A05:2021
null
null
null
null
null
null
null
null
null
null
null
N.9
null
null
null
null
null
null
null
2.5
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
PL-11
PL-11
PL-11
PL-11
PL-11
null
null
null
null
null
null
1.S.A
1.M.A
1.M.A
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
10.7
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
2-3-1-7
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
16.1.50.C.01 16.1.50.C.02
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
x
null
x
null
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-1 R-AM-2 R-AM-3 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1
R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
null
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-10 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Configuration Management
Least Functionality
CFG-03
Mechanisms exist to configure systems to provide only essential capabilities by specifically prohibiting or restricting the use of ports, protocols, and/or services.
- CimTrak Integrity Suite (https://www.cimcor.com/cimtrak/) - NNT Change Tracker (https://www.newnettechnologies.com)
null
Does the organization configure systems to provide only essential capabilities by specifically prohibiting or restricting the use of ports, protocols, and/or services?
10
Protect
null
null
X
There is no evidence of a capability to configure systems to provide only essential capabilities by specifically prohibiting or restricting the use of ports, protocols, and/ or services.
Configuration Management (CFG) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist: • IT personnel use an informal process to design, build and maintain secure configurations for test, development, staging and production environments. • Secure configurations are not: o Standardized across the organization. o Consistently aligned with industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides).
Configuration Management (CFG) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Configuration management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for configuration management. • Technologies are configured to protect data with the strength and integrity commensurate with the classification or sensitivity of the information and mostly conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides), including cryptographic protections for sensitive/regulated data. • Special baseline configurations are created for higher-risk environments or for systems, applications and services that store, process or transmit sensitive/regulated data. • Apart from workstation and server operating system baselines, configuration management is decentralized. • Cybersecurity personnel use a structured process to design, build and maintain secure configurations for test, development, staging and production environments. • Deviations to baseline configurations are required to have a risk assessment and the business process owner acceptance of the risk(s) associated with the deviation. • Unauthorized configuration changes are investigated to determine if the unauthorized configuration is malicious in nature. • Logical Access Control (LAC) is enforced to prohibit non-administrative users from being able to install unauthorized software. • Administrative processes exist to prevent unauthorized access by limiting and reviewing permissions to change hardware, software and firmware components within a production/operational environment
Configuration Management (CFG) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • The configuration management function is formally assigned with defined roles and responsibilities. • An IT infrastructure team, or similar function, ensures that statutory, regulatory and contractual cybersecurity & data privacy obligations are addressed to ensure secure configurations are designed, built and maintained. • Configuration management is centralized for all operating systems, applications, servers and other configurable technologies. • Technologies are configured to protect data with the strength and integrity commensurate with the classification or sensitivity of the information and conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides), including test, development, staging and production environments. • Configurations conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides) for test, development, staging and production environments. • Deviations to baseline configurations are required to have a risk assessment and business process owner approval of the risk(s) associated with the deviation. • Special baseline configurations are created for higher-risk environments or for systems, applications and services that store, process or transmit sensitive/regulated data. • An IT Asset Management (ITAM) function, or similar function, ensures compliance with requirements for asset management. • Logical Access Control (LAC) is used to limit the ability of non-administrators from making configuration changes to systems, applications and services, including the of installation of unauthorized software. • A Security Incident Event Manager (SIEM), or similar automated tool, monitors for unauthorized activities, accounts, connections, devices and software. • Unauthorized configuration changes are responded to in accordance with an Incident Response Plan (IRP) to determine if the unauthorized configuration is malicious in nature. • Administrative processes exist to prevent unauthorized access by limiting and reviewing permissions to change hardware, software and firmware components within a production/operational environment.
Configuration Management (CFG) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
Configuration Management (CFG) efforts are “world-class” capabilities that leverage predictive analysis (e.g., machine learning, AI, etc.). In addition to CMM Level 4 criteria, CMM Level 5 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Stakeholders make time-sensitive decisions to support operational efficiency, which may include automated remediation actions. ▪ Based on predictive analysis, process improvements are implemented according to “continuous improvement” practices that affect process changes.
null
CC6.1-POF6
null
4.8
null
4.8
4.8
null
null
AIS-02 UEM-02
null
null
null
CR 2.2 (6.4.1) CR 7.7 (11.9.1)
null
null
null
null
9.4.1
8.3 8.9 8.12
9.4.1
null
null
null
null
null
T1003, T1003.001, T1003.002, T1003.005, T1008, T1011, T1011.001, T1021.001, T1021.002, T1021.003, T1021.005, T1021.006, T1036, T1036.005, T1036.007, T1037, T1037.001, T1046, T1047, T1048, T1048.001, T1048.002, T1048.003, T1052, T1052.001, T1053, T1053.002, T1053.005, T1059, T1059.005, T1059.007, T1068, T1071, T1071.001, T1071.002, T1071.003, T1071.004, T1072, T1080, T1087, T1087.001, T1087.002, T1090, T1090.001, T1090.002, T1090.003, T1092, T1095, T1098, T1098.001, T1098.004, T1102, T1102.001, T1102.002, T1102.003, T1104, T1105, T1106, T1112, T1127, T1129, T1133, T1135, T1136, T1136.002, T1136.003, T1176, T1187, T1190, T1195, T1195.001, T1195.002, T1197, T1199, T1204, T1204.001, T1204.002, T1204.003, T1205, T1205.001, T1210, T1213, T1213.001, T1213.002, T1216, T1216.001, T1218, T1218.001, T1218.002, T1218.003, T1218.004, T1218.005, T1218.007, T1218.008, T1218.009, T1218.012, T1218.013, T1218.014, T1219, T1220, T1221, T1482, T1484, T1489, T1490, T1498, T1498.001, T1498.002, T1499, T1499.001, T1499.002, T1499.003, T1499.004, T1505.004, T1525, T1530, T1537, T1542.004, T1542.005, T1543, T1546.002, T1546.006, T1546.008, T1546.009, T1546.010, T1547.004, T1547.006, T1547.007, T1547.011, T1548, T1548.001, T1548.003, T1548.004, T1552, T1552.003, T1552.005, T1552.007, T1553, T1553.001, T1553.003, T1553.004, T1553.005, T1553.006, T1555.004, T1556, T1556.002, T1557, T1557.001, T1557.002, T1559, T1559.002, T1562, T1562.001, T1562.002, T1562.003, T1562.004, T1562.006, T1562.009, T1563, T1563.001, T1563.002, T1564.002, T1564.003, T1564.006, T1564.008, T1564.009, T1565, T1565.003, T1569, T1569.002, T1570, T1571, T1572, T1573, T1573.001, T1573.002, T1574, T1574.001, T1574.006, T1574.007, T1574.008, T1574.009, T1574.012, T1599, T1599.001, T1601, T1601.001, T1601.002, T1602, T1602.001, T1602.002, T1609, T1610, T1611, T1612, T1613
TS-1.1 TS-2.3
null
null
PR.PT-P2
null
null
null
CM-7
CM-7
CM-7
CM-7
CM-7
null
CM-7
CM-7
CM-7
null
null
CM-7
CM-7
CM-7
null
CM-7
CM-7
CM-7
null
null
CM-7
3.4.6
3.4.2.a 3.4.6.a 3.4.6.b 3.4.6.d
3.4.6[a] 3.4.6[b]
A.03.04.06.a A.03.04.06.b[01] A.03.04.06.b[02] A.03.04.06.b[03] A.03.04.06.b[04] A.03.04.06.b[05] A.03.04.06.c A.03.04.06.d[01] A.03.04.06.d[02] A.03.04.06.d[03] A.03.04.06.d[04] A.03.04.06.d[05] A.03.04.06.ODP[01] A.03.04.06.ODP[02] A.03.04.06.ODP[03] A.03.04.06.ODP[04] A.03.04.06.ODP[05] A.03.04.06.ODP[06] A.03.04.06.ODP[07] A.03.04.06.ODP[08] A.03.04.06.ODP[09] A.03.04.06.ODP[10]
null
null
PR.PT-3
null
A05:2021
1.1.5 1.2.1 2.2.2 2.2.4 2.2.5
1.2.6 1.4 1.4.1 1.4.2 2.2.4
null
1.4.1 1.4.2 2.2.4
null
null
2.2.4
2.2.4
1.4.1 1.4.2 2.2.4
1.4.1 1.4.2 2.2.4
null
M.2.3
2.10
null
null
null
null
ARCHITECTURE-2.E.MIL2 ARCHITECTURE-3.D.MIL2
TM:SG2.SP1 TM:SG2.SP2
null
5.7.1.1
null
CM.L2-3.4.6
CM.L2-3.4.6
AC.L1-b.1.ii
CM.L2-3.4.6
CM.L2-3.4.6
CM-7
null
null
null
52.204-21(b)(1)(ii)
null
null
null
CM-7
CM-7
CM-7
CM-7
CM-7
CM-7
CM-7
CM-7
CM-7
CM-7
null
D3.PC.Am.B.7 D3.PC.Am.B.4 D3.PC.Am.B.3 D4.RM.Om.Int.1
null
null
null
null
1.S.A 6.S.A 6.S.B
1.M.A
1.M.A
CM-7
null
null
null
1.2
6.3
null
null
null
5.3
CM-7
CM-7
CM-7
null
null
null
null
null
null
null
null
null
17.03(2)(a) 17.03(2)(g)
null
null
null
null
null
null
null
CM-7
CM-7
CM-7
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
4.8 4.9 12.9 12.13
null
null
null
null
null
null
null
null
null
null
null
null
null
null
2-5-3-5
2-2-1-5 2-3-1-4
null
null
null
null
null
null
null
null
null
B4.b
null
null
null
null
null
null
null
null
null
1487 1488 1489 0385 1479 1006 1311 1312
null
null
null
null
null
null
null
null
null
null
9.4.1 9.4.1.8.PB
null
null
18.1.15.C.01 18.1.15.C.02 18.1.15.C.03 18.1.15.C.04
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
x
FAR 52.204-21 MA 201 CMR 17
x
x
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-1 R-AM-2 R-AM-3 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1
R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
null
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-10 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Configuration Management
Periodic Review
CFG-03.1
Mechanisms exist to periodically review system configurations to identify and disable unnecessary and/or non-secure functions, ports, protocols and services.
- NNT Change Tracker (https://www.newnettechnologies.com)
null
Does the organization periodically review system configurations to identify and disable unnecessary and/or non-secure functions, ports, protocols and services?
8
Detect
null
X
X
There is no evidence of a capability to periodically review system configurations to identify and disable unnecessary and/ or non-secure functions, ports, protocols and services.
Configuration Management (CFG) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist: • IT personnel use an informal process to design, build and maintain secure configurations for test, development, staging and production environments. • Secure configurations are not: o Standardized across the organization. o Consistently aligned with industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides).
Configuration Management (CFG) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Configuration management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for configuration management. • Technologies are configured to protect data with the strength and integrity commensurate with the classification or sensitivity of the information and mostly conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides), including cryptographic protections for sensitive/regulated data. • Special baseline configurations are created for higher-risk environments or for systems, applications and services that store, process or transmit sensitive/regulated data. • Apart from workstation and server operating system baselines, configuration management is decentralized. • Cybersecurity personnel use a structured process to design, build and maintain secure configurations for test, development, staging and production environments. • Deviations to baseline configurations are required to have a risk assessment and the business process owner acceptance of the risk(s) associated with the deviation. • Unauthorized configuration changes are investigated to determine if the unauthorized configuration is malicious in nature. • Logical Access Control (LAC) is enforced to prohibit non-administrative users from being able to install unauthorized software. • Cybersecurity personnel perform an annual review of existing configurations to ensure security objectives are still being met.
Configuration Management (CFG) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • The configuration management function is formally assigned with defined roles and responsibilities. • An IT infrastructure team, or similar function, ensures that statutory, regulatory and contractual cybersecurity & data privacy obligations are addressed to ensure secure configurations are designed, built and maintained. • Configuration management is centralized for all operating systems, applications, servers and other configurable technologies. • Technologies are configured to protect data with the strength and integrity commensurate with the classification or sensitivity of the information and conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides), including test, development, staging and production environments. • Configurations conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides) for test, development, staging and production environments. • Deviations to baseline configurations are required to have a risk assessment and business process owner approval of the risk(s) associated with the deviation. • Special baseline configurations are created for higher-risk environments or for systems, applications and services that store, process or transmit sensitive/regulated data. • An IT Asset Management (ITAM) function, or similar function, ensures compliance with requirements for asset management. • Logical Access Control (LAC) is used to limit the ability of non-administrators from making configuration changes to systems, applications and services, including the of installation of unauthorized software. • A Security Incident Event Manager (SIEM), or similar automated tool, monitors for unauthorized activities, accounts, connections, devices and software. • Unauthorized configuration changes are responded to in accordance with an Incident Response Plan (IRP) to determine if the unauthorized configuration is malicious in nature. • Cybersecurity personnel perform an annual review of existing configurations to ensure security objectives are still being accomplished, or up on the release of a new application or service that requires additional configuration settings.
Configuration Management (CFG) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
Configuration Management (CFG) efforts are “world-class” capabilities that leverage predictive analysis (e.g., machine learning, AI, etc.). In addition to CMM Level 4 criteria, CMM Level 5 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Stakeholders make time-sensitive decisions to support operational efficiency, which may include automated remediation actions. ▪ Based on predictive analysis, process improvements are implemented according to “continuous improvement” practices that affect process changes.
null
null
null
null
null
null
null
null
null
AIS-02 IVS-03 IVS-04
null
null
null
null
null
null
null
null
9.2.5 9.2.6 12.6.1 14.2.5
5.18 8.8 8.27
9.2.5 9.2.6 12.6.1 14.2.5
null
6.6.2.5 6.6.2.6
null
null
null
null
null
null
null
null
null
null
null
CM-7(1)
null
CM-7(1)
CM-7(1)
CM-7(1)
null
null
CM-7(1)
CM-7(1)
null
null
null
CM-7(1)
CM-7(1)
null
CM-7(1)
null
null
null
CM-7(1)
CM-7(1)
3.4.7
3.4.6.c
3.4.7[a] 3.4.7[b] 3.4.7[c] 3.4.7[d] 3.4.7[e] 3.4.7[f] 3.4.7[g] 3.4.7[h] 3.4.7[i] 3.4.7[j] 3.4.7[k] 3.4.7[l] 3.4.7[m] 3.4.7[n] 3.4.7[o]
null
null
null
null
null
null
null
1.2.7
null
1.2.7
null
null
null
null
1.2.7
1.2.7
null
N.2.2
2.2
null
null
null
null
null
null
null
null
null
CM.L2-3.4.7
CM.L2-3.4.7
null
CM.L2-3.4.7
CM.L2-3.4.7
CM-7(1)
null
null
null
null
null
null
null
CM-7(1)
null
CM-7(1)
CM-7(1)
null
CM-7(1)
null
CM-7(1)
CM-7(1)
null
null
null
null
null
null
null
null
null
null
CM-7(1)
null
null
null
null
null
null
null
null
null
null
null
CM-7(1)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
CM-7(1)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
B4.b
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
9.2.5 9.2.6 12.6.1 12.6.1.18.PB 14.2.5
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
x
null
null
x
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-1 R-AM-2 R-AM-3 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1
R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
null
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-10 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Configuration Management
Prevent Unauthorized Software Execution
CFG-03.2
Mechanisms exist to configure systems to prevent the execution of unauthorized software programs.
- CimTrak Integrity Suite (https://www.cimcor.com/cimtrak/) - NNT Change Tracker (https://www.newnettechnologies.com)
null
Does the organization configure systems to prevent the execution of unauthorized software programs?
7
Protect
null
null
X
There is no evidence of a capability to configure systems to prevent the execution of unauthorized software programs.
Configuration Management (CFG) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist: • IT personnel use an informal process to design, build and maintain secure configurations for test, development, staging and production environments. • Secure configurations are not: o Standardized across the organization. o Consistently aligned with industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides). • Terms of employment and rules of behavior address the requirement for users to comply with applicable software usage requirements and copyright laws.
Configuration Management (CFG) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Configuration management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for configuration management. • Technologies are configured to protect data with the strength and integrity commensurate with the classification or sensitivity of the information and mostly conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides), including cryptographic protections for sensitive/regulated data. • Special baseline configurations are created for higher-risk environments or for systems, applications and services that store, process or transmit sensitive/regulated data. • Apart from workstation and server operating system baselines, configuration management is decentralized. • Cybersecurity personnel use a structured process to design, build and maintain secure configurations for test, development, staging and production environments. • Deviations to baseline configurations are required to have a risk assessment and the business process owner acceptance of the risk(s) associated with the deviation. • Unauthorized configuration changes are investigated to determine if the unauthorized configuration is malicious in nature. • Logical Access Control (LAC) is enforced to prohibit non-administrative users from being able to install unauthorized software. • An “acceptable use policy”, or similar control, addresses the requirement for users to comply with applicable software usage requirements and copyright laws.
Configuration Management (CFG) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • The configuration management function is formally assigned with defined roles and responsibilities. • An IT infrastructure team, or similar function, ensures that statutory, regulatory and contractual cybersecurity & data privacy obligations are addressed to ensure secure configurations are designed, built and maintained. • Configuration management is centralized for all operating systems, applications, servers and other configurable technologies. • Technologies are configured to protect data with the strength and integrity commensurate with the classification or sensitivity of the information and conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides), including test, development, staging and production environments. • Configurations conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides) for test, development, staging and production environments. • Deviations to baseline configurations are required to have a risk assessment and business process owner approval of the risk(s) associated with the deviation. • Special baseline configurations are created for higher-risk environments or for systems, applications and services that store, process or transmit sensitive/regulated data. • An IT Asset Management (ITAM) function, or similar function, ensures compliance with requirements for asset management. • Logical Access Control (LAC) is used to limit the ability of non-administrators from making configuration changes to systems, applications and services, including the of installation of unauthorized software. • A Security Incident Event Manager (SIEM), or similar automated tool, monitors for unauthorized activities, accounts, connections, devices and software. • Unauthorized configuration changes are responded to in accordance with an Incident Response Plan (IRP) to determine if the unauthorized configuration is malicious in nature. • Administrative processes exist to prevent unauthorized access by limiting and reviewing developer permissions to change hardware, software and firmware components within a production/operational environment.
Configuration Management (CFG) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
Configuration Management (CFG) efforts are “world-class” capabilities that leverage predictive analysis (e.g., machine learning, AI, etc.). In addition to CMM Level 4 criteria, CMM Level 5 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Stakeholders make time-sensitive decisions to support operational efficiency, which may include automated remediation actions. ▪ Based on predictive analysis, process improvements are implemented according to “continuous improvement” practices that affect process changes.
null
null
null
null
null
null
null
null
null
UEM-02
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
CM-7(2)
null
CM-7(2)
CM-7(2)
CM-7(2)
null
null
CM-7(2)
CM-7(2)
null
null
null
CM-7(2)
CM-7(2)
null
null
null
null
null
null
null
3.4.7
3.4.8.a 3.4.8.b 3.4.8.c
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
M.1.37
null
null
null
null
null
null
null
null
null
null
CM.L2-3.4.7
null
null
CM.L2-3.4.7
CM.L2-3.4.7
CM-7(2)
null
null
null
null
null
null
null
CM-7(2)
null
CM-7(2)
CM-7(2)
null
CM-7(2)
null
CM-7(2)
CM-7(2)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
CM-7(2)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
2-3-1-11
null
null
null
null
null
null
null
null
null
B4.b
null
null
null
null
Principle 1.1
Principle 1.1 Principle 1.2
Principle 1.1 Principle 1.2
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
4.19 4.20
null
null
null
null
null
null
null
null
null
null
null
x
null
null
x
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-1 R-AM-2 R-AM-3 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1
R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
null
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-10 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Configuration Management
Unauthorized or Authorized Software (Blacklisting or Whitelisting)
CFG-03.3
Mechanisms exist to whitelist or blacklist applications in an order to limit what is authorized to execute on systems.
- Microsoft Windows Defender Application Control (WDAC) (replaced AppLocker) - CimTrak Integrity Suite (https://www.cimcor.com/cimtrak/) - NNT Change Tracker (https://www.newnettechnologies.com)
null
Does the organization whitelist or blacklist applications in an order to limit what is authorized to execute on systems?
5
Protect
null
X
X
There is no evidence of a capability to whitelist or blacklist applications in an order to limit what is authorized to execute on systems.
Configuration Management (CFG) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist: • IT personnel use an informal process to design, build and maintain secure configurations for test, development, staging and production environments. • Secure configurations are not: o Standardized across the organization. o Consistently aligned with industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides). • Terms of employment and rules of behavior address the requirement for users to comply with applicable software usage requirements and copyright laws.
Configuration Management (CFG) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Configuration management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for configuration management. • Technologies are configured to protect data with the strength and integrity commensurate with the classification or sensitivity of the information and mostly conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides), including cryptographic protections for sensitive/regulated data. • Special baseline configurations are created for higher-risk environments or for systems, applications and services that store, process or transmit sensitive/regulated data. • Apart from workstation and server operating system baselines, configuration management is decentralized. • Cybersecurity personnel use a structured process to design, build and maintain secure configurations for test, development, staging and production environments. • Deviations to baseline configurations are required to have a risk assessment and the business process owner acceptance of the risk(s) associated with the deviation. • Unauthorized configuration changes are investigated to determine if the unauthorized configuration is malicious in nature. • Logical Access Control (LAC) is enforced to prohibit non-administrative users from being able to install unauthorized software.
Configuration Management (CFG) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • The configuration management function is formally assigned with defined roles and responsibilities. • An IT infrastructure team, or similar function, ensures that statutory, regulatory and contractual cybersecurity & data privacy obligations are addressed to ensure secure configurations are designed, built and maintained. • Configuration management is centralized for all operating systems, applications, servers and other configurable technologies. • Technologies are configured to protect data with the strength and integrity commensurate with the classification or sensitivity of the information and conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides), including test, development, staging and production environments. • Configurations conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides) for test, development, staging and production environments. • Deviations to baseline configurations are required to have a risk assessment and business process owner approval of the risk(s) associated with the deviation. • Special baseline configurations are created for higher-risk environments or for systems, applications and services that store, process or transmit sensitive/regulated data. • An IT Asset Management (ITAM) function, or similar function, ensures compliance with requirements for asset management. • Logical Access Control (LAC) is used to limit the ability of non-administrators from making configuration changes to systems, applications and services, including the of installation of unauthorized software. • A Security Incident Event Manager (SIEM), or similar automated tool, monitors for unauthorized activities, accounts, connections, devices and software. • Unauthorized configuration changes are responded to in accordance with an Incident Response Plan (IRP) to determine if the unauthorized configuration is malicious in nature. • A Software Asset Management (SWAM) solution is used to provide oversight of unmanaged or unauthorized software executables that are on a network.
Configuration Management (CFG) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
Configuration Management (CFG) efforts are “world-class” capabilities that leverage predictive analysis (e.g., machine learning, AI, etc.). In addition to CMM Level 4 criteria, CMM Level 5 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Stakeholders make time-sensitive decisions to support operational efficiency, which may include automated remediation actions. ▪ Based on predictive analysis, process improvements are implemented according to “continuous improvement” practices that affect process changes.
null
null
null
2.3 2.5 2.6 2.7
2.3
2.3 2.5 2.6
2.3 2.5 2.6 2.7
null
null
UEM-02
CLS-02
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
CM-7(4) CM-7(5) SC-18(4)
null
CM-7(4)
CM-7(5)
CM-7(4) CM-7(5) SC-18(4)
null
null
CM-7(5)
CM-7(5)
CM-7(4) SC-18(4)
null
null
CM-7(5)
CM-7(5)
null
CM-7(4) CM-7(5)
null
null
null
CM-7(4)
CM-7(4) CM-7(5)
3.4.8
3.4.8.a 3.4.8.b 3.4.8.c 3.13.13.a 3.13.13.b
3.4.8[a] 3.4.8[b] 3.4.8[c]
A.03.04.08.a A.03.04.08.b A.03.04.08.c[01] A.03.04.08.c[02]
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
M.1.45
null
null
8.5
null
null
ARCHITECTURE-3.M.MIL3
null
null
null
null
CM.L2-3.4.8
CM.L2-3.4.8
null
CM.L2-3.4.8
CM.L2-3.4.8
CM-7(4)
null
null
null
null
null
null
null
CM-7(5)
null
CM-7(5)
CM-7(5)
null
CM-7(5)
null
CM-7(5)
CM-7(5)
null
null
null
null
null
null
null
null
9.M.B
9.M.B 2.L.E
CM-7(5)
null
null
null
null
null
null
null
null
null
null
null
CM-7(5)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
CM-7(5)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
AM-02
null
null
null
6.7
null
null
null
null
null
null
null
null
null
null
null
2-3-1-1
null
null
null
2-3-1-6
null
null
null
null
null
null
null
null
null
null
null
4
null
null
null
Principle 1.3
Principle 1.3 Principle 1.4 Principle 1.6
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
14.2.4.C.01 14.2.5.C.01 14.2.5.C.02 14.2.5.C.03 14.2.5.C.04 14.2.6.C.01 14.2.7.C.01 14.2.7.C.02 14.2.7.C.03 14.2.7.C.04 14.2.7.C.05 14.2.7.C.06 14.2.7.C.07
null
null
null
null
11.3.6
null
null
null
null
null
null
null
4.19 4.20
null
null
null
null
null
null
null
null
null
null
null
x
null
null
x
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-1 R-AM-2 R-AM-3 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-GV-8 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1 R-SA-2
R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
R-SA-2
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-10 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Configuration Management
Split Tunneling
CFG-03.4
Mechanisms exist to prevent split tunneling for remote devices unless the split tunnel is securely provisioned using organization-defined safeguards.
null
null
Does the organization prevent split tunneling for remote devices unless the split tunnel is securely provisioned using organization-defined safeguards? Prevent split tunneling for remote devices unless the split tunnel is securely provisioned using organization-defined safeguards?
8
Protect
null
null
X
There is no evidence of a capability to prevent split tunneling for remote devices unless the split tunnel is securely provisioned using organization-defined safeguards.
Configuration Management (CFG) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist: • IT personnel use an informal process to design, build and maintain secure configurations for test, development, staging and production environments. • Secure configurations are not: o Standardized across the organization. o Consistently aligned with industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides).
Configuration Management (CFG) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Configuration management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for configuration management. • Technologies are configured to protect data with the strength and integrity commensurate with the classification or sensitivity of the information and mostly conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides), including cryptographic protections for sensitive/regulated data. • Special baseline configurations are created for higher-risk environments or for systems, applications and services that store, process or transmit sensitive/regulated data. • Apart from workstation and server operating system baselines, configuration management is decentralized. • Cybersecurity personnel use a structured process to design, build and maintain secure configurations for test, development, staging and production environments. • Deviations to baseline configurations are required to have a risk assessment and the business process owner acceptance of the risk(s) associated with the deviation. • Unauthorized configuration changes are investigated to determine if the unauthorized configuration is malicious in nature. • Logical Access Control (LAC) is enforced to prohibit non-administrative users from being able to install unauthorized software.
Configuration Management (CFG) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • The configuration management function is formally assigned with defined roles and responsibilities. • An IT infrastructure team, or similar function, ensures that statutory, regulatory and contractual cybersecurity & data privacy obligations are addressed to ensure secure configurations are designed, built and maintained. • Configuration management is centralized for all operating systems, applications, servers and other configurable technologies. • Technologies are configured to protect data with the strength and integrity commensurate with the classification or sensitivity of the information and conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides), including test, development, staging and production environments. • Configurations conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides) for test, development, staging and production environments. • Deviations to baseline configurations are required to have a risk assessment and business process owner approval of the risk(s) associated with the deviation. • Special baseline configurations are created for higher-risk environments or for systems, applications and services that store, process or transmit sensitive/regulated data. • An IT Asset Management (ITAM) function, or similar function, ensures compliance with requirements for asset management. • Logical Access Control (LAC) is used to limit the ability of non-administrators from making configuration changes to systems, applications and services, including the of installation of unauthorized software. • A Security Incident Event Manager (SIEM), or similar automated tool, monitors for unauthorized activities, accounts, connections, devices and software. • Unauthorized configuration changes are responded to in accordance with an Incident Response Plan (IRP) to determine if the unauthorized configuration is malicious in nature.
Configuration Management (CFG) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
Configuration Management (CFG) efforts are “world-class” capabilities that leverage predictive analysis (e.g., machine learning, AI, etc.). In addition to CMM Level 4 criteria, CMM Level 5 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Stakeholders make time-sensitive decisions to support operational efficiency, which may include automated remediation actions. ▪ Based on predictive analysis, process improvements are implemented according to “continuous improvement” practices that affect process changes.
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
TS-1.15 TS-2.5
null
null
null
null
null
null
SC-7(7)
null
SC-7(7)
SC-7(7)
SC-7(7)
null
null
SC-7(7)
SC-7(7)
null
null
null
SC-7(7)
SC-7(7)
null
CM-7(7)
null
null
null
null
CM-7(7)
3.13.7
null
3.13.7
null
null
null
null
null
null
null
1.5.1
null
1.5.1
null
null
null
1.5.1
1.5.1
1.5.1
null
N.4.3
null
null
null
null
null
null
null
null
null
null
SC.L2-3.13.7
SC.L2-3.13.7
null
SC.L2-3.13.7
SC.L2-3.13.7
SC-7(7)
null
null
null
null
null
null
null
SC-7(7)
null
SC-7(7)
SC-7(7)
null
SC-7(7)
null
SC-7(7)
SC-7(7)
null
null
null
null
null
null
null
null
null
null
SC-7(7)
null
null
null
null
null
null
null
null
null
null
SC-7(7)
SC-7(7)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
SC-7(7)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
4.15 9.13
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
0705
null
null
null
null
null
null
null
null
null
null
null
null
null
18.7.14.C.01 18.7.14.C.02
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
x
null
null
x
R-AC-4 R-AM-1 R-AM-3 R-BC-2 R-BC-4 R-EX-7 R-GV-2 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-IR-1 R-IR-4 R-SA-1
null
null
null
R-AC-4
R-AM-1
null
R-AM-3
null
R-BC-2
null
R-BC-4
null
null
null
null
null
null
null
R-EX-7
null
R-GV-2
null
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
R-IR-1
null
null
R-IR-4
R-SA-1
null
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-10 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15
null
- wordsmithed control
Configuration Management
Software Usage Restrictions
CFG-04
Mechanisms exist to enforce software usage restrictions to comply with applicable contract agreements and copyright laws.
null
null
Does the organization enforce software usage restrictions to comply with applicable contract agreements and copyright laws?
9
Protect
null
X
X
There is no evidence of a capability to enforce software usage restrictions to comply with applicable contract agreements and copyright laws.
Configuration Management (CFG) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist: • IT personnel use an informal process to design, build and maintain secure configurations for test, development, staging and production environments. • Secure configurations are not: o Standardized across the organization. o Consistently aligned with industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides). • Terms of employment and rules of behavior address the requirement for users to comply with applicable software usage requirements and copyright laws.
Configuration Management (CFG) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Configuration management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for configuration management. • Technologies are configured to protect data with the strength and integrity commensurate with the classification or sensitivity of the information and mostly conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides), including cryptographic protections for sensitive/regulated data. • Special baseline configurations are created for higher-risk environments or for systems, applications and services that store, process or transmit sensitive/regulated data. • Apart from workstation and server operating system baselines, configuration management is decentralized. • Cybersecurity personnel use a structured process to design, build and maintain secure configurations for test, development, staging and production environments. • Deviations to baseline configurations are required to have a risk assessment and the business process owner acceptance of the risk(s) associated with the deviation. • Unauthorized configuration changes are investigated to determine if the unauthorized configuration is malicious in nature. • Logical Access Control (LAC) is enforced to prohibit non-administrative users from being able to install unauthorized software.
Configuration Management (CFG) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • The configuration management function is formally assigned with defined roles and responsibilities. • An IT infrastructure team, or similar function, ensures that statutory, regulatory and contractual cybersecurity & data privacy obligations are addressed to ensure secure configurations are designed, built and maintained. • Configuration management is centralized for all operating systems, applications, servers and other configurable technologies. • Technologies are configured to protect data with the strength and integrity commensurate with the classification or sensitivity of the information and conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides), including test, development, staging and production environments. • Configurations conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides) for test, development, staging and production environments. • Deviations to baseline configurations are required to have a risk assessment and business process owner approval of the risk(s) associated with the deviation. • Special baseline configurations are created for higher-risk environments or for systems, applications and services that store, process or transmit sensitive/regulated data. • An IT Asset Management (ITAM) function, or similar function, ensures compliance with requirements for asset management. • Logical Access Control (LAC) is used to limit the ability of non-administrators from making configuration changes to systems, applications and services, including the of installation of unauthorized software. • A Security Incident Event Manager (SIEM), or similar automated tool, monitors for unauthorized activities, accounts, connections, devices and software. • Unauthorized configuration changes are responded to in accordance with an Incident Response Plan (IRP) to determine if the unauthorized configuration is malicious in nature.
Configuration Management (CFG) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
Configuration Management (CFG) efforts are “world-class” capabilities that leverage predictive analysis (e.g., machine learning, AI, etc.). In addition to CMM Level 4 criteria, CMM Level 5 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Stakeholders make time-sensitive decisions to support operational efficiency, which may include automated remediation actions. ▪ Based on predictive analysis, process improvements are implemented according to “continuous improvement” practices that affect process changes.
null
null
null
null
null
null
null
null
null
UEM-03
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
T1546.008, T1546.013, T1550.001, T1553, T1553.004, T1559, T1559.002, T1562.006, T1562.009
null
null
null
null
null
null
null
CM-10
CM-10
CM-10
CM-10
CM-10
null
CM-10
CM-10
CM-10
null
null
CM-10
CM-10
CM-10
null
CM-10
CM-10
null
null
CM-10
CM-10
null
3.13.13.a 3.13.13.b
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
M.1.49
null
null
null
null
null
null
COMP:SG2.SP1 COMP:SG2.SP2 COMP:SG3.SP1
null
null
null
null
null
null
null
null
CM-10
null
null
null
null
null
null
null
CM-10
CM-10
CM-10
CM-10
CM-10
CM-10
CM-10
CM-10
CM-10
CM-10
null
null
null
null
null
null
null
null
null
CM-10
null
null
null
null
null
null
null
null
null
null
CM-10
CM-10
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
CM-10
CM-10
CM-10
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
3
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
x
null
null
x
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-1 R-AM-2 R-AM-3 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-GV-8 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1 R-SA-2
R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
R-SA-2
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-10 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Configuration Management
Open Source Software
CFG-04.1
Mechanisms exist to establish parameters for the secure use of open source software.
- Acceptable Use Policy (AUP)
null
Does the organization establish parameters for the secure use of open source software?
9
Protect
null
X
X
There is no evidence of a capability to establish parameters for the secure use of open source software.
Configuration Management (CFG) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist: • IT personnel use an informal process to design, build and maintain secure configurations for test, development, staging and production environments. • Secure configurations are not: o Standardized across the organization. o Consistently aligned with industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides). • Terms of employment and rules of behavior address the requirement for users to comply with applicable software usage requirements and copyright laws.
Configuration Management (CFG) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Configuration management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for configuration management. • Technologies are configured to protect data with the strength and integrity commensurate with the classification or sensitivity of the information and mostly conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides), including cryptographic protections for sensitive/regulated data. • Special baseline configurations are created for higher-risk environments or for systems, applications and services that store, process or transmit sensitive/regulated data. • Apart from workstation and server operating system baselines, configuration management is decentralized. • Cybersecurity personnel use a structured process to design, build and maintain secure configurations for test, development, staging and production environments. • Deviations to baseline configurations are required to have a risk assessment and the business process owner acceptance of the risk(s) associated with the deviation. • Unauthorized configuration changes are investigated to determine if the unauthorized configuration is malicious in nature. • Logical Access Control (LAC) is enforced to prohibit non-administrative users from being able to install unauthorized software.
Configuration Management (CFG) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • The configuration management function is formally assigned with defined roles and responsibilities. • An IT infrastructure team, or similar function, ensures that statutory, regulatory and contractual cybersecurity & data privacy obligations are addressed to ensure secure configurations are designed, built and maintained. • Configuration management is centralized for all operating systems, applications, servers and other configurable technologies. • Technologies are configured to protect data with the strength and integrity commensurate with the classification or sensitivity of the information and conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides), including test, development, staging and production environments. • Configurations conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides) for test, development, staging and production environments. • Deviations to baseline configurations are required to have a risk assessment and business process owner approval of the risk(s) associated with the deviation. • Special baseline configurations are created for higher-risk environments or for systems, applications and services that store, process or transmit sensitive/regulated data. • An IT Asset Management (ITAM) function, or similar function, ensures compliance with requirements for asset management. • Logical Access Control (LAC) is used to limit the ability of non-administrators from making configuration changes to systems, applications and services, including the of installation of unauthorized software. • A Security Incident Event Manager (SIEM), or similar automated tool, monitors for unauthorized activities, accounts, connections, devices and software. • Unauthorized configuration changes are responded to in accordance with an Incident Response Plan (IRP) to determine if the unauthorized configuration is malicious in nature.
Configuration Management (CFG) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
Configuration Management (CFG) efforts are “world-class” capabilities that leverage predictive analysis (e.g., machine learning, AI, etc.). In addition to CMM Level 4 criteria, CMM Level 5 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Stakeholders make time-sensitive decisions to support operational efficiency, which may include automated remediation actions. ▪ Based on predictive analysis, process improvements are implemented according to “continuous improvement” practices that affect process changes.
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
CM-10(1)
null
null
null
CM-10(1)
null
null
null
null
CM-10(1)
null
null
null
null
null
CM-10(1)
null
null
null
CM-10(1)
CM-10(1)
null
3.13.13.a 3.13.13.b
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
M.1.47
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
CM-10(1)
null
null
null
null
null
null
null
CM-10(1)
null
CM-10(1)
CM-10(1)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
CM-10(1)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
CM-10(1)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
6.1.3
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
x
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-1 R-AM-2 R-AM-3 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-GV-8 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1 R-SA-2
R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
R-SA-2
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-10 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Configuration Management
Unsupported Internet Browsers & Email Clients
CFG-04.2
Mechanisms exist to allow only approved Internet browsers and email clients to run on systems.
null
null
Does the organization allow only approved Internet browsers and email clients to run on systems?
7
Protect
null
X
X
There is no evidence of a capability to allow only approved Internet browsers and email clients to run on systems.
Configuration Management (CFG) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist: • IT personnel use an informal process to design, build and maintain secure configurations for test, development, staging and production environments. • Secure configurations are not: o Standardized across the organization. o Consistently aligned with industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides).
Configuration Management (CFG) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Configuration management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for configuration management. • Technologies are configured to protect data with the strength and integrity commensurate with the classification or sensitivity of the information and mostly conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides), including cryptographic protections for sensitive/regulated data. • Special baseline configurations are created for higher-risk environments or for systems, applications and services that store, process or transmit sensitive/regulated data. • Apart from workstation and server operating system baselines, configuration management is decentralized. • Cybersecurity personnel use a structured process to design, build and maintain secure configurations for test, development, staging and production environments. • Deviations to baseline configurations are required to have a risk assessment and the business process owner acceptance of the risk(s) associated with the deviation. • Unauthorized configuration changes are investigated to determine if the unauthorized configuration is malicious in nature. • Logical Access Control (LAC) is enforced to prohibit non-administrative users from being able to install unauthorized software.
Configuration Management (CFG) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • The configuration management function is formally assigned with defined roles and responsibilities. • An IT infrastructure team, or similar function, ensures that statutory, regulatory and contractual cybersecurity & data privacy obligations are addressed to ensure secure configurations are designed, built and maintained. • Configuration management is centralized for all operating systems, applications, servers and other configurable technologies. • Technologies are configured to protect data with the strength and integrity commensurate with the classification or sensitivity of the information and conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides), including test, development, staging and production environments. • Configurations conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides) for test, development, staging and production environments. • Deviations to baseline configurations are required to have a risk assessment and business process owner approval of the risk(s) associated with the deviation. • Special baseline configurations are created for higher-risk environments or for systems, applications and services that store, process or transmit sensitive/regulated data. • An IT Asset Management (ITAM) function, or similar function, ensures compliance with requirements for asset management. • Logical Access Control (LAC) is used to limit the ability of non-administrators from making configuration changes to systems, applications and services, including the of installation of unauthorized software. • A Security Incident Event Manager (SIEM), or similar automated tool, monitors for unauthorized activities, accounts, connections, devices and software. • Unauthorized configuration changes are responded to in accordance with an Incident Response Plan (IRP) to determine if the unauthorized configuration is malicious in nature.
Configuration Management (CFG) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
Configuration Management (CFG) efforts are “world-class” capabilities that leverage predictive analysis (e.g., machine learning, AI, etc.). In addition to CMM Level 4 criteria, CMM Level 5 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Stakeholders make time-sensitive decisions to support operational efficiency, which may include automated remediation actions. ▪ Based on predictive analysis, process improvements are implemented according to “continuous improvement” practices that affect process changes.
CC6.7
null
null
9.0 9.1 9.4
9.1
9.1 9.4
9.1 9.4
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
M.1.49
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
1.S.A
1.M.A
1.M.A
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
2-4-1 2-5-3-3
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
0824 1412 1485 1486 1542 1470 1235 1601 1585 1654 1655
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
4.6 4.9
null
null
null
null
null
null
null
null
null
null
null
x
null
null
null
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-1 R-AM-2 R-AM-3 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-GV-8 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1 R-SA-2
R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
R-SA-2
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-10 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Configuration Management
User-Installed Software
CFG-05
Mechanisms exist to restrict the ability of non-privileged users to install unauthorized software.
- Privileged Account Management (PAM)
null
Does the organization restrict the ability of non-privileged users to install unauthorized software?
10
Protect
X
X
X
There is no evidence of a capability to restrict the ability of non-privileged users to install unauthorized software.
Configuration Management (CFG) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist: • IT personnel use an informal process to design, build and maintain secure configurations for test, development, staging and production environments. • Secure configurations are not: o Standardized across the organization. o Consistently aligned with industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides). • Terms of employment and rules of behavior address the requirement for users to comply with applicable software usage requirements and copyright laws.
Configuration Management (CFG) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Configuration management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for configuration management. • Technologies are configured to protect data with the strength and integrity commensurate with the classification or sensitivity of the information and mostly conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides), including cryptographic protections for sensitive/regulated data. • Special baseline configurations are created for higher-risk environments or for systems, applications and services that store, process or transmit sensitive/regulated data. • Apart from workstation and server operating system baselines, configuration management is decentralized. • Cybersecurity personnel use a structured process to design, build and maintain secure configurations for test, development, staging and production environments. • Deviations to baseline configurations are required to have a risk assessment and the business process owner acceptance of the risk(s) associated with the deviation. • Unauthorized configuration changes are investigated to determine if the unauthorized configuration is malicious in nature. • Logical Access Control (LAC) is enforced to prohibit non-administrative users from being able to install unauthorized software.
Configuration Management (CFG) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • The configuration management function is formally assigned with defined roles and responsibilities. • An IT infrastructure team, or similar function, ensures that statutory, regulatory and contractual cybersecurity & data privacy obligations are addressed to ensure secure configurations are designed, built and maintained. • Configuration management is centralized for all operating systems, applications, servers and other configurable technologies. • Technologies are configured to protect data with the strength and integrity commensurate with the classification or sensitivity of the information and conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides), including test, development, staging and production environments. • Configurations conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides) for test, development, staging and production environments. • Deviations to baseline configurations are required to have a risk assessment and business process owner approval of the risk(s) associated with the deviation. • Special baseline configurations are created for higher-risk environments or for systems, applications and services that store, process or transmit sensitive/regulated data. • An IT Asset Management (ITAM) function, or similar function, ensures compliance with requirements for asset management. • Logical Access Control (LAC) is used to limit the ability of non-administrators from making configuration changes to systems, applications and services, including the of installation of unauthorized software. • A Security Incident Event Manager (SIEM), or similar automated tool, monitors for unauthorized activities, accounts, connections, devices and software. • Unauthorized configuration changes are responded to in accordance with an Incident Response Plan (IRP) to determine if the unauthorized configuration is malicious in nature.
Configuration Management (CFG) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
Configuration Management (CFG) efforts are “world-class” capabilities that leverage predictive analysis (e.g., machine learning, AI, etc.). In addition to CMM Level 4 criteria, CMM Level 5 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Stakeholders make time-sensitive decisions to support operational efficiency, which may include automated remediation actions. ▪ Based on predictive analysis, process improvements are implemented according to “continuous improvement” practices that affect process changes.
null
CC6.8-POF1
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
T1021.005, T1059, T1059.006, T1176, T1195, T1195.001, T1195.002, T1218, T1218.001, T1218.002, T1218.003, T1218.004, T1218.005, T1218.008, T1218.009, T1218.012, T1218.013, T1218.014, T1505, T1505.001, T1505.002, T1505.004, T1543, T1543.001, T1543.002, T1543.003, T1543.004, T1547.013, T1550.001, T1564.009, T1569, T1569.001
null
null
null
null
null
null
null
CM-11
CM-11
CM-11
CM-11
CM-11 CM-11(2)
null
CM-11
CM-11
CM-11
CM-11(2)
null
CM-11
CM-11
CM-11
null
CM-11
CM-11
null
null
CM-11
CM-11
3.4.9
3.13.13.b
3.4.9[b] 3.4.9[c]
null
null
null
null
PR.PS-05
null
null
null
null
null
null
null
null
null
null
null
null
M.1.31
null
null
null
null
null
null
AM:SG1.SP1 COMP:SG3.SP2 MON:SG2.SP3
null
null
null
CM.L2-3.4.9
CM.L2-3.4.9
null
CM.L2-3.4.9
CM.L2-3.4.9
CM-11
null
null
null
null
null
null
null
CM-11
CM-11
CM-11
CM-11
CM-11
CM-11
CM-11
CM-11
CM-11
CM-11
null
null
null
null
null
null
null
2.M.A
2.M.A
CM-11
null
null
null
null
null
null
null
null
null
CM-11
CM-11
CM-11
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
CM-11
CM-11
CM-11
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
6.3
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
B4.b
null
3
null
null
null
null
null
null
null
1592 0382 1655
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
4.19 4.20
null
null
null
null
null
null
null
null
null
null
null
null
null
null
x
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-1 R-AM-2 R-AM-3 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-GV-8 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1 R-SA-2
R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
R-SA-2
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-10 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Configuration Management
Unauthorized Installation Alerts
CFG-05.1
Mechanisms exist to configure systems to generate an alert when the unauthorized installation of software is detected.
- CimTrak Integrity Suite (https://www.cimcor.com/cimtrak/) - NNT Change Tracker (https://www.newnettechnologies.com)
null
Does the organization configure systems to generate an alert when the unauthorized installation of software is detected?
8
Detect
null
null
X
There is no evidence of a capability to configure systems to generate an alert when the unauthorized installation of software is detected.
Configuration Management (CFG) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist: • IT personnel use an informal process to design, build and maintain secure configurations for test, development, staging and production environments. • Secure configurations are not: o Standardized across the organization. o Consistently aligned with industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides).
Configuration Management (CFG) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Configuration management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for configuration management. • Technologies are configured to protect data with the strength and integrity commensurate with the classification or sensitivity of the information and mostly conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides), including cryptographic protections for sensitive/regulated data. • Special baseline configurations are created for higher-risk environments or for systems, applications and services that store, process or transmit sensitive/regulated data. • Apart from workstation and server operating system baselines, configuration management is decentralized. • Cybersecurity personnel use a structured process to design, build and maintain secure configurations for test, development, staging and production environments. • Deviations to baseline configurations are required to have a risk assessment and the business process owner acceptance of the risk(s) associated with the deviation. • Unauthorized configuration changes are investigated to determine if the unauthorized configuration is malicious in nature. • Logical Access Control (LAC) is enforced to prohibit non-administrative users from being able to install unauthorized software.
Configuration Management (CFG) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • The configuration management function is formally assigned with defined roles and responsibilities. • An IT infrastructure team, or similar function, ensures that statutory, regulatory and contractual cybersecurity & data privacy obligations are addressed to ensure secure configurations are designed, built and maintained. • Configuration management is centralized for all operating systems, applications, servers and other configurable technologies. • Technologies are configured to protect data with the strength and integrity commensurate with the classification or sensitivity of the information and conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides), including test, development, staging and production environments. • Configurations conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides) for test, development, staging and production environments. • Deviations to baseline configurations are required to have a risk assessment and business process owner approval of the risk(s) associated with the deviation. • Special baseline configurations are created for higher-risk environments or for systems, applications and services that store, process or transmit sensitive/regulated data. • An IT Asset Management (ITAM) function, or similar function, ensures compliance with requirements for asset management. • Logical Access Control (LAC) is used to limit the ability of non-administrators from making configuration changes to systems, applications and services, including the of installation of unauthorized software. • A Security Incident Event Manager (SIEM), or similar automated tool, monitors for unauthorized activities, accounts, connections, devices and software. • Unauthorized configuration changes are responded to in accordance with an Incident Response Plan (IRP) to determine if the unauthorized configuration is malicious in nature.
Configuration Management (CFG) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
Configuration Management (CFG) efforts are “world-class” capabilities that leverage predictive analysis (e.g., machine learning, AI, etc.). In addition to CMM Level 4 criteria, CMM Level 5 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Stakeholders make time-sensitive decisions to support operational efficiency, which may include automated remediation actions. ▪ Based on predictive analysis, process improvements are implemented according to “continuous improvement” practices that affect process changes.
null
CC6.8-POF2
null
2.3
2.3
2.3
2.3
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
CM-11(1)
null
null
null
CM-8(3) CM-11(3)
null
null
CM-8(3)
CM-8(3)
CM-11(3)
null
null
CM-8(3)
CM-8(3)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
N.19
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
CM-11(1)
null
null
CM-11(1)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
III.D.2.c
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
2-3-1-11
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
4.19 4.20
null
null
null
null
null
null
null
null
null
null
null
null
null
null
x
R-AC-4 R-AM-1 R-AM-3 R-BC-2 R-BC-4 R-EX-7 R-GV-2 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-IR-1 R-IR-4 R-SA-1
null
null
null
R-AC-4
R-AM-1
null
R-AM-3
null
R-BC-2
null
R-BC-4
null
null
null
null
null
null
null
R-EX-7
null
R-GV-2
null
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
R-IR-1
null
null
R-IR-4
R-SA-1
null
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-10 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Configuration Management
Restrict Roles Permitted To Install Software
CFG-05.2
Mechanisms exist to configure systems to prevent the installation of software, unless the action is performed by a privileged user or service.
null
null
Does the organization configure systems to prevent the installation of software, unless the action is performed by a privileged user or service?
9
Protect
null
null
X
There is no evidence of a capability to configure systems to prevent the installation of software, unless the action is performed by a privileged user or service.
Configuration Management (CFG) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist: • IT personnel use an informal process to design, build and maintain secure configurations for test, development, staging and production environments. • Secure configurations are not: o Standardized across the organization. o Consistently aligned with industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides).
Configuration Management (CFG) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Configuration management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for configuration management. • Technologies are configured to protect data with the strength and integrity commensurate with the classification or sensitivity of the information and mostly conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides), including cryptographic protections for sensitive/regulated data. • Special baseline configurations are created for higher-risk environments or for systems, applications and services that store, process or transmit sensitive/regulated data. • Apart from workstation and server operating system baselines, configuration management is decentralized. • Cybersecurity personnel use a structured process to design, build and maintain secure configurations for test, development, staging and production environments. • Deviations to baseline configurations are required to have a risk assessment and the business process owner acceptance of the risk(s) associated with the deviation. • Unauthorized configuration changes are investigated to determine if the unauthorized configuration is malicious in nature. • Logical Access Control (LAC) is enforced to prohibit non-administrative users from being able to install unauthorized software.
Configuration Management (CFG) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • The configuration management function is formally assigned with defined roles and responsibilities. • An IT infrastructure team, or similar function, ensures that statutory, regulatory and contractual cybersecurity & data privacy obligations are addressed to ensure secure configurations are designed, built and maintained. • Configuration management is centralized for all operating systems, applications, servers and other configurable technologies. • Technologies are configured to protect data with the strength and integrity commensurate with the classification or sensitivity of the information and conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides), including test, development, staging and production environments. • Configurations conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides) for test, development, staging and production environments. • Deviations to baseline configurations are required to have a risk assessment and business process owner approval of the risk(s) associated with the deviation. • Special baseline configurations are created for higher-risk environments or for systems, applications and services that store, process or transmit sensitive/regulated data. • An IT Asset Management (ITAM) function, or similar function, ensures compliance with requirements for asset management. • Logical Access Control (LAC) is used to limit the ability of non-administrators from making configuration changes to systems, applications and services, including the of installation of unauthorized software. • A Security Incident Event Manager (SIEM), or similar automated tool, monitors for unauthorized activities, accounts, connections, devices and software. • Unauthorized configuration changes are responded to in accordance with an Incident Response Plan (IRP) to determine if the unauthorized configuration is malicious in nature.
Configuration Management (CFG) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
Configuration Management (CFG) efforts are “world-class” capabilities that leverage predictive analysis (e.g., machine learning, AI, etc.). In addition to CMM Level 4 criteria, CMM Level 5 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Stakeholders make time-sensitive decisions to support operational efficiency, which may include automated remediation actions. ▪ Based on predictive analysis, process improvements are implemented according to “continuous improvement” practices that affect process changes.
null
CC6.8-POF1
null
9.4
null
9.4
9.4
null
null
IAM-09
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
CM-11(2)
null
null
null
CM-11(2)
null
null
null
null
CM-11(2)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
PR.PS-05
null
null
null
null
null
null
null
null
null
null
null
null
M.1.14
null
null
null
null
null
null
null
2.1 2.2
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
1.2
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
6.3
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
1592 0382
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
4.19 4.20
null
null
null
null
null
null
null
null
null
null
null
x
null
null
x
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-1 R-AM-2 R-AM-3 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-GV-8 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1 R-SA-2
R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
R-SA-2
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-10 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Configuration Management
Configuration Enforcement
CFG-06
Automated mechanisms exist to monitor, enforce and report on configurations for endpoint devices.
null
null
Does the organization use automated mechanisms to monitor, enforce and report on configurations for endpoint devices?
7
Protect
null
X
X
There is no evidence of a capability to monitor, enforce and report on configurations for endpoint devices.
SP-CMM1 is N/A, since a structured process is required to monitor, enforce and report on configurations for endpoint devices.
SP-CMM2 is N/A, since a well-defined process is required to monitor, enforce and report on configurations for endpoint devices.
Configuration Management (CFG) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • The configuration management function is formally assigned with defined roles and responsibilities. • An IT infrastructure team, or similar function, ensures that statutory, regulatory and contractual cybersecurity & data privacy obligations are addressed to ensure secure configurations are designed, built and maintained. • Configuration management is centralized for all operating systems, applications, servers and other configurable technologies. • Technologies are configured to protect data with the strength and integrity commensurate with the classification or sensitivity of the information and conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides), including test, development, staging and production environments. • Configurations conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides) for test, development, staging and production environments. • Deviations to baseline configurations are required to have a risk assessment and business process owner approval of the risk(s) associated with the deviation. • Special baseline configurations are created for higher-risk environments or for systems, applications and services that store, process or transmit sensitive/regulated data. • An IT Asset Management (ITAM) function, or similar function, ensures compliance with requirements for asset management. • Logical Access Control (LAC) is used to limit the ability of non-administrators from making configuration changes to systems, applications and services, including the of installation of unauthorized software. • A Security Incident Event Manager (SIEM), or similar automated tool, monitors for unauthorized activities, accounts, connections, devices and software. • Unauthorized configuration changes are responded to in accordance with an Incident Response Plan (IRP) to determine if the unauthorized configuration is malicious in nature. • Unauthorized configuration changes are immediately reverted to approved configurations. • Configuration monitoring software monitors, reports on and enforces configurations for endpoint devices. • An Identity & Access Management (IAM) function, or similar function, centrally manages permissions and implements “least privileges” practices the management of user, group and system accounts, including privileged accounts. • ITAM leverages a Configuration Management Database (CMDB), or similar tool, as the authoritative source of IT assets. • A formal Change Management (CM) program ensures that no unauthorized changes are made, all changes are documented, services are not disrupted and that resources are used efficiently.
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to monitor, enforce and report on configurations for endpoint devices.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to monitor, enforce and report on configurations for endpoint devices.
null
null
null
null
null
null
null
null
null
null
CCM-03
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
CM-3(8) CM-11(3)
null
null
null
null
CM-3(8) CM-11(3)
null
null
null
null
null
CM-3(8)
null
null
null
CM-3(8)
CM-3(8)
null
3.4.2.a 3.4.3.a 3.4.3.b 3.4.3.c 3.4.3.d
null
A.03.04.03.d[01] A.03.04.03.d[02]
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
M.1.43
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
0843 1490 0955 1582 1471 1392 1544 0846
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
4.19 4.20
null
null
null
null
null
null
null
null
null
null
null
null
null
null
x
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-1 R-AM-2 R-AM-3 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-GV-8 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1 R-SA-2
R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
R-SA-2
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-10 MT-11 MT-12 MT-13 MT-14
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
null
null
null
Configuration Management
Zero-Touch Provisioning (ZTP)
CFG-07
Mechanisms exist to implement Zero-Touch Provisioning (ZTP), or similar technology, to automatically and securely configure devices upon being added to a network.
null
null
Does the organization implement Zero-Touch Provisioning (ZTP), or similar technology, to automatically and securely configure devices upon being added to a network?
8
Protect
null
null
X
There is no evidence of a capability to implement Zero-Touch Provisioning (ZTP), or similar technology, to automatically and securely configure devices up on being added to a network.
SP-CMM1 is N/A, since a structured process is required to implement Zero-Touch Provisioning (ZTP), or similar technology, to automatically and securely configure devices up on being added to a network.
SP-CMM2 is N/A, since a well-defined process is required to implement Zero-Touch Provisioning (ZTP), or similar technology, to automatically and securely configure devices up on being added to a network.
Configuration Management (CFG) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • The configuration management function is formally assigned with defined roles and responsibilities. • An IT infrastructure team, or similar function, ensures that statutory, regulatory and contractual cybersecurity & data privacy obligations are addressed to ensure secure configurations are designed, built and maintained. • Configuration management is centralized for all operating systems, applications, servers and other configurable technologies. • Technologies are configured to protect data with the strength and integrity commensurate with the classification or sensitivity of the information and conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides), including test, development, staging and production environments. • Configurations conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides) for test, development, staging and production environments. • Deviations to baseline configurations are required to have a risk assessment and business process owner approval of the risk(s) associated with the deviation. • Special baseline configurations are created for higher-risk environments or for systems, applications and services that store, process or transmit sensitive/regulated data. • An IT Asset Management (ITAM) function, or similar function, ensures compliance with requirements for asset management. • Logical Access Control (LAC) is used to limit the ability of non-administrators from making configuration changes to systems, applications and services, including the of installation of unauthorized software. • A Security Incident Event Manager (SIEM), or similar automated tool, monitors for unauthorized activities, accounts, connections, devices and software. • Unauthorized configuration changes are responded to in accordance with an Incident Response Plan (IRP) to determine if the unauthorized configuration is malicious in nature. • Zero-Touch Provisioning (ZTP), or similar technology, is used to automatically and securely configure devices up on being added to a network.
Configuration Management (CFG) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to implement Zero-Touch Provisioning (ZTP), or similar technology, to automatically and securely configure devices up on being added to a network.
null
null
null
null
null
null
null
null
null
null
IAM-07
null
null
EDR 3.13 (13.8.1(b)) HDR 3.13 (14.8.1(b)) NDR 3.13 (15.10.1(b))
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
N.11
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-1 R-AM-2 R-AM-3 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-6 R-EX-7 R-GV-1 R-GV-4
R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
null
null
null
null
R-EX-6
R-EX-7
R-GV-1
null
null
R-GV-4
null
null
null
null
null
null
null
null
null
null
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-10 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Configuration Management
Sensitive / Regulated Data Access Enforcement
CFG-08
Mechanisms exist to configure systems, applications and processes to restrict access to sensitive/regulated data.
null
E-DCH-08
Does the organization configure systems, applications and processes to restrict access to sensitive/regulated data?
7
Protect
null
X
X
There is no evidence of a capability to configure systems, applications and processes to restrict access to sensitive/regulated data.
SP-CMM1 is N/A, since a structured process is required to configure systems, applications and processes to restrict access to sensitive/regulated data.
Configuration Management (CFG) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Configuration management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for configuration management. • Technologies are configured to protect data with the strength and integrity commensurate with the classification or sensitivity of the information and mostly conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides), including cryptographic protections for sensitive/regulated data. • Special baseline configurations are created for higher-risk environments or for systems, applications and services that store, process or transmit sensitive/regulated data. • Apart from workstation and server operating system baselines, configuration management is decentralized. • Cybersecurity personnel use a structured process to design, build and maintain secure configurations for test, development, staging and production environments. • Deviations to baseline configurations are required to have a risk assessment and the business process owner acceptance of the risk(s) associated with the deviation. • Unauthorized configuration changes are investigated to determine if the unauthorized configuration is malicious in nature. • Logical Access Control (LAC) is enforced to prohibit non-administrative users from being able to install unauthorized software.
Configuration Management (CFG) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • The configuration management function is formally assigned with defined roles and responsibilities. • An IT infrastructure team, or similar function, ensures that statutory, regulatory and contractual cybersecurity & data privacy obligations are addressed to ensure secure configurations are designed, built and maintained. • Configuration management is centralized for all operating systems, applications, servers and other configurable technologies. • Technologies are configured to protect data with the strength and integrity commensurate with the classification or sensitivity of the information and conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides), including test, development, staging and production environments. • Configurations conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides) for test, development, staging and production environments. • Deviations to baseline configurations are required to have a risk assessment and business process owner approval of the risk(s) associated with the deviation. • Special baseline configurations are created for higher-risk environments or for systems, applications and services that store, process or transmit sensitive/regulated data. • An IT Asset Management (ITAM) function, or similar function, ensures compliance with requirements for asset management. • Logical Access Control (LAC) is used to limit the ability of non-administrators from making configuration changes to systems, applications and services, including the of installation of unauthorized software. • A Security Incident Event Manager (SIEM), or similar automated tool, monitors for unauthorized activities, accounts, connections, devices and software. • Unauthorized configuration changes are responded to in accordance with an Incident Response Plan (IRP) to determine if the unauthorized configuration is malicious in nature.
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to configure systems, applications and processes to restrict access to sensitive/regulated data.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to configure systems, applications and processes to restrict access to sensitive/regulated data.
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
AC-3(11)
null
null
null
null
AC-3(11)
null
null
null
AC-3(11)
null
null
null
null
null
null
null
null
3.1.2
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
AC-3(11)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
AC-3(11)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
1733
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-1 R-AM-2 R-AM-3 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1
R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
null
NT-2 NT-3 NT-4 NT-5 NT-6 NT-7 NT-8 NT-9 NT-10 NT-11 NT-12 NT-13 NT-14 MT-1 MT-2 MT-3 MT-4 MT-5 MT-6 MT-7 MT-8 MT-9 MT-10 MT-11 MT-12 MT-13 MT-14 MT-15
null
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15
null
- Added NIST 800-53 R5 mapping for AC-3(11)
Configuration Management
Sensitive / Regulated Data Actions
CFG-08.1
Automated mechanisms exist to generate event logs whenever sensitive/regulated data is collected, created, updated, deleted and/or archived.
null
null
Does the organization use automated mechanisms to generate event logs whenever sensitive/regulated data is collected, created, updated, deleted and/or archived?
7
Protect
null
null
X
There is no evidence of a capability to generate event logs whenever sensitive/regulated data is collected, created, updated, deleted and/ or archived.
SP-CMM1 is N/A, since a structured process is required to generate event logs whenever sensitive/regulated data is collected, created, updated, deleted and/ or archived.
Configuration Management (CFG) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Configuration management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for configuration management. • Technologies are configured to protect data with the strength and integrity commensurate with the classification or sensitivity of the information and mostly conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides), including cryptographic protections for sensitive/regulated data. • Special baseline configurations are created for higher-risk environments or for systems, applications and services that store, process or transmit sensitive/regulated data. • Apart from workstation and server operating system baselines, configuration management is decentralized. • Cybersecurity personnel use a structured process to design, build and maintain secure configurations for test, development, staging and production environments. • Deviations to baseline configurations are required to have a risk assessment and the business process owner acceptance of the risk(s) associated with the deviation. • Unauthorized configuration changes are investigated to determine if the unauthorized configuration is malicious in nature. • Logical Access Control (LAC) is enforced to prohibit non-administrative users from being able to install unauthorized software.
Configuration Management (CFG) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • The configuration management function is formally assigned with defined roles and responsibilities. • An IT infrastructure team, or similar function, ensures that statutory, regulatory and contractual cybersecurity & data privacy obligations are addressed to ensure secure configurations are designed, built and maintained. • Configuration management is centralized for all operating systems, applications, servers and other configurable technologies. • Technologies are configured to protect data with the strength and integrity commensurate with the classification or sensitivity of the information and conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides), including test, development, staging and production environments. • Configurations conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides) for test, development, staging and production environments. • Deviations to baseline configurations are required to have a risk assessment and business process owner approval of the risk(s) associated with the deviation. • Special baseline configurations are created for higher-risk environments or for systems, applications and services that store, process or transmit sensitive/regulated data. • An IT Asset Management (ITAM) function, or similar function, ensures compliance with requirements for asset management. • Logical Access Control (LAC) is used to limit the ability of non-administrators from making configuration changes to systems, applications and services, including the of installation of unauthorized software. • A Security Incident Event Manager (SIEM), or similar automated tool, monitors for unauthorized activities, accounts, connections, devices and software. • Unauthorized configuration changes are responded to in accordance with an Incident Response Plan (IRP) to determine if the unauthorized configuration is malicious in nature.
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to generate event logs whenever sensitive/regulated data is collected, created, updated, deleted and/ or archived.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to generate event logs whenever sensitive/regulated data is collected, created, updated, deleted and/ or archived.
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
DM-2(1)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
DM-2(1)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
7101(a) 7101(b) 7101(c) 7101(d) 7101(e)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-1 R-AM-2 R-AM-3 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1
R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
null
NT-2 NT-3 NT-4 NT-5 NT-6 NT-7 NT-8 NT-9 NT-10 NT-11 NT-12 NT-13 NT-14 MT-1 MT-2 MT-3 MT-4 MT-5 MT-6 MT-7 MT-8 MT-9 MT-10 MT-11 MT-12 MT-13 MT-14
null
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
null
null
null
Continuous Monitoring
Continuous Monitoring
MON-01
Mechanisms exist to facilitate the implementation of enterprise-wide monitoring controls.
- Splunk - CimTrak Integrity Suite (https://www.cimcor.com/cimtrak/) - NNT Change Tracker (https://www.newnettechnologies.com)
null
Does the organization facilitate the implementation of enterprise-wide monitoring controls?
10
Detect
X
X
X
There is no evidence of a capability to facilitate the implementation of enterprise-wide monitoring controls.
Continuous Monitoring (MON) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Generating event logs and the review of event logs is narrowly-focused to business-critical systems and/ or systems that store, processes and/ or transmit sensitive/regulated data. • Secure baseline configurations generate logs that contain sufficient information to establish necessary details of activity and allow for forensics analysis.
Continuous Monitoring (MON) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Situational awareness management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • Secure baseline configurations generate logs that contain sufficient information to establish necessary details of activity and allow for forensics analysis. • IT/cybersecurity personnel: o Identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for situational awareness management. o Configure alerts for critical or sensitive data that is stored, transmitted and processed on assets. o Use a structured process to review and analyze logs. • A log aggregator, or similar automated tool, provides an event log report generation capability to aid in detecting and assessing anomalous activities on business-critical systems.
Continuous Monitoring (MON) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • The Chief Information Security Officer (CISO), or similar function, analyzes the organization’s business strategy to determine prioritized and authoritative guidance for continuous monitoring (e.g., event log collection and analysis) practices, within the broader scope of cybersecurity and data protection operations. • The CISO, or similar function, develops a security-focused Concept of Operations (CONOPS) that documents management, operational and technical measures to apply defense-in-depth techniques across the organization for security monitoring. • A Governance, Risk & Compliance (GRC) function, or similar function, provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls for continuous security monitoring. • A steering committee is formally established to provide executive oversight of the cybersecurity & data privacy program, including continuous monitoring. • An IT Asset Management (ITAM) function, or similar function: o Governs asset management that ensures compliance with requirements for asset management. o Leverages a Configuration Management Database (CMDB), or similar tool, as the authoritative source of IT assets. • A Security Incident Event Manager (SIEM), or similar automated tool: o Centrally collects logs and is protected according to the manufacturer’s security guidelines to protect the integrity of the event logs with cryptographic mechanisms. o Monitors the organization for Indicators of Compromise (IoC) and provides 24x7x365 near real-time alerting capability. o Is configured to alert incident response personnel of detected suspicious events such that incident responders can look to terminate suspicious events. • A Security Operations Center (SOC), or similar function, enables incident management operations covering preparation, detection and analysis, containment, eradication and recovery. • Both inbound and outbound network traffic is monitored for unauthorized activities to identify prohibited activities and assist incident handlers with identifying potentially compromised systems.
Continuous Monitoring (MON) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to facilitate the implementation of enterprise-wide monitoring controls.
CC7.2
CC7.2-POF1
null
8.0 8.2 8.4 13.0 13.6
8.2
8.2 8.4 13.6
8.2 8.4 13.6
DSS01.03 DSS05.07 DSS06.05 MEA01.01
null
LOG-01 LOG-07
CLS-08 MON-01 MON-03 MON-05 MON-07 SNT-03
SO21
null
CR 2.8 (6.10.1) CR 6.2 (10.4.1)
RQ-08-03 RQ-08-04
null
null
null
12.4.1
8.15 8.16
12.4.1 CLD.12.4.5
null
6.9.4 6.9.4.1
null
null
null
T1001, T1001.001, T1001.002, T1001.003, T1003, T1003.001, T1003.002, T1003.003, T1003.004, T1003.005, T1003.006, T1003.007, T1003.008, T1005, T1008, T1011, T1011.001, T1020.001, T1021, T1021.001, T1021.002, T1021.003, T1021.004, T1021.005, T1021.006, T1025, T1027, T1027.002, T1029, T1030, T1036, T1036.001, T1036.003, T1036.005, T1036.007, T1037, T1037.002, T1037.003, T1037.004, T1037.005, T1040, T1041, T1046, T1047, T1048, T1048.001, T1048.002, T1048.003, T1052, T1052.001, T1053, T1053.001, T1053.002, T1053.003, T1053.005, T1053.006, T1055, T1055.001, T1055.002, T1055.003, T1055.004, T1055.005, T1055.008, T1055.009, T1055.011, T1055.012, T1055.013, T1055.014, T1056.002, T1059, T1059.001, T1059.002, T1059.003, T1059.004, T1059.005, T1059.006, T1059.007, T1059.008, T1068, T1070, T1070.001, T1070.002, T1070.003, T1071, T1071.001, T1071.002, T1071.003, T1071.004, T1072, T1078, T1078.001, T1078.002, T1078.003, T1078.004, T1080, T1087, T1087.001, T1087.002, T1090, T1090.001, T1090.002, T1091, T1092, T1095, T1098, T1098.001, T1098.002, T1098.003, T1098.004, T1102, T1102.001, T1102.002, T1102.003, T1104, T1105, T1106, T1110, T1110.001, T1110.002, T1110.003, T1110.004, T1111, T1114, T1114.001, T1114.002, T1114.003, T1119, T1127, T1127.001, T1129, T1132, T1132.001, T1132.002, T1133, T1135, T1136, T1136.001, T1136.002, T1136.003, T1137, T1137.001, T1176, T1185, T1187, T1189, T1190, T1197, T1201, T1203, T1204, T1204.001, T1204.002, T1204.003, T1205, T1205.001, T1210, T1211, T1212, T1213, T1213.001, T1213.002, T1216, T1216.001, T1218, T1218.001, T1218.002, T1218.003, T1218.004, T1218.005, T1218.008, T1218.009, T1218.010, T1218.011, T1218.012, T1218.013, T1218.014, T1219, T1220, T1221, T1222, T1222.001, T1222.002, T1484, T1485, T1486, T1489, T1490, T1491, T1491.001, T1491.002, T1499, T1499.001, T1499.002, T1499.003, T1499.004, T1505, T1505.002, T1505.003, T1505.004, T1525, T1528, T1530, T1537, T1539, T1542.004, T1542.005, T1543, T1543.002, T1546.002, T1546.003, T1546.004, T1546.006, T1546.008, T1546.013, T1546.014, T1547.002, T1547.003, T1547.004, T1547.005, T1547.006, T1547.007, T1547.008, T1547.009, T1547.011, T1547.012, T1547.013, T1548, T1548.001, T1548.002, T1548.003, T1548.004, T1550.001, T1550.003, T1552, T1552.001, T1552.002, T1552.003, T1552.004, T1552.005, T1552.006, T1553, T1553.001, T1553.003, T1553.004, T1553.005, T1555, T1555.001, T1555.002, T1555.004, T1555.005, T1556, T1556.001, T1556.002, T1556.003, T1556.004, T1557, T1557.001, T1557.002, T1558, T1558.002, T1558.003, T1558.004, T1559, T1559.002, T1560, T1560.001, T1561, T1561.001, T1561.002, T1562, T1562.001, T1562.002, T1562.003, T1562.004, T1562.006, T1562.010, T1563, T1563.001, T1563.002, T1564.002, T1564.004, T1564.006, T1564.007, T1564.008, T1564.009, T1565, T1565.001, T1565.002, T1565.003, T1566, T1566.001, T1566.002, T1566.003, T1567, T1568, T1568.002, T1569, T1569.002, T1570, T1571, T1572, T1573, T1573.001, T1573.002, T1574, T1574.001, T1574.004, T1574.005, T1574.007, T1574.008, T1574.009, T1574.010, T1578, T1578.001, T1578.002, T1578.003, T1598, T1598.001, T1598.002, T1598.003, T1599, T1599.001, T1601, T1601.001, T1601.002, T1602, T1602.001, T1602.002, T1610, T1611, T1612, T1613
null
Sec 4(D)(2)(h) Sec 4(D)(2)(i)
null
CT.DM-P8
null
P-7 S-5
null
AU-1 SI-4
AU-1 SI-4
AU-1 SI-4
AU-1 SI-4
AU-1 PM-31 SI-4
AU-1 PM-31
AU-1 SI-4
AU-1 SI-4
AU-1 SI-4
null
null
AU-1 SI-4
AU-1 SI-4
AU-1 SI-4
null
AU-1 PM-31 SI-4
AU-1 SI-4
SI-4
AU-1 PM-31 SI-4
AU-1 PM-31 SI-4
AU-1 PM-31 SI-4
NFO - AU-1
3.3.1.a 3.3.1.b 3.12.3
null
A.03.03.05.a A.03.12.03[01] A.03.12.03[02] A.03.12.03[03] A.03.14.06.a.01
null
null
DE.CM-1 DE.DP-1 DE.DP-2 PR.PT-1
DE.CM DE.CM-01 DE.CM-03 DE.AE
A01:2021 A07:2021 A09:2021
10.1 10.6 10.6.1 10.6.2 10.6.3 10.8 10.8.1
10.1 10.4.3 10.7 10.7.1 10.7.2 10.7.3 A3.3.1
null
10.4.3
null
null
10.4.3
null
10.4.3 10.7.2 10.7.3
10.4.3 10.7.1 10.7.2 10.7.3
null
J.3.3
6.4
5.2.4
null
null
null
SITUATION-1.A.MIL1 SITUATION-3.G.MIL3
COMP:SG1.SP2 MON:SG1.SP3 COMP:SG2.SP1 MON:SG2.SP3 MON:SG2.SP4
8.2
5.4 5.4.3
null
null
null
null
null
null
AU-1 SI-4
null
null
null
null
null
null
§ 11.10 § 11.10(e)
AU-1 SI-4
AU-1 SI-4
AU-1 SI-4
AU-1 SI-4
AU-1 SI-4
AU-1 SI-4
AU-1 SI-4
AU-1 SI-4
AU-1 SI-4
AU-1 SI-4
null
D3.DC.An.B.2 D3.DC.An.B.3 D1.G.SP.B.3 D2.MA.Ma.B.1 D2.MA.Ma.B.2 D3.DC.Ev.B.4 D1.G.Ov.E.2
null
null
null
164.312(b)
null
6.M.C
6.M.C 6.L.B 8.L.E 9.L.B
AU-1 SI-4
null
CIP-007-6 R4
8-602
3.1
null
null
null
null
5.4 5.6
AU-1 SI-4
AU-1 SI-4
AU-1 SI-4
III.D III.D.3.a III.D.3.b
null
null
null
null
null
null
null
null
null
null
500.06
Sec 4(2)(b)(ii)(C)(2)
null
38-99-20(D)(2)(h) 38-99-20(D)(2)(i)
null
null
AU-1 SI-4
AU-1 SI-4
AU-1 SI-4
null
null
§ 2447(b)(2)(C) § 2447(b)(8) § 2447(b)(8)(A)
3.4.5(39) 3.4.5(40) 3.5(52)
null
null
Art 32.1 Art 32.2
null
null
null
Sec 14 Sec 15
Art 16
null
null
null
null
null
5.5 6.3 6.7
OPS-10
null
null
null
4.6 6.8 9.10 11.11 12.31 13.9 21.1
null
null
null
null
null
null
null
null
null
null
null
2-11
TPC-40 TPC-80
3.3.14
2-3-4 2-12-1 2-12-2 2-12-3 2-12-4 5-1-3-3
2-11 2-11-1 2-11-2
null
null
Sec 19.1 Sec 19.2
null
7.3.8 [OP.EXP.8]
null
null
null
null
B2.d C1.a C1.e C2.a
C1
null
null
null
null
null
null
null
null
0120 1163 0580 0109 1586 1294 0660
null
null
null
null
null
null
null
null
null
null
12.4.1 12.4.1.15.PB 12.4.5.P
null
null
16.6.6.C.01 16.6.6.C.02 16.6.8.C.01 16.6.10.C.01 16.6.10.C.02
null
null
null
null
12.2.1 12.2.2 12.2.3
null
null
null
null
null
6.21
null
3.5
3.3 3.3.1
null
null
null
null
null
null
null
null
null
null
x
NAIC
x
x
R-AC-4 R-AM-1 R-AM-2 R-AM-3 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1
null
null
null
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
null
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-10 MT-11 MT-12 MT-13 MT-14 MT-15 MT-16
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15
MT-16
null
Continuous Monitoring
Intrusion Detection & Prevention Systems (IDS & IPS)
MON-01.1
Mechanisms exist to implement Intrusion Detection / Prevention Systems (IDS / IPS) technologies on critical systems, key network segments and network choke points.
- CimTrak Integrity Suite (https://www.cimcor.com/cimtrak/) - NNT Change Tracker (https://www.newnettechnologies.com)
null
Does the organization implement Intrusion Detection / Prevention Systems (IDS / IPS) technologies on critical systems, key network segments and network choke points?
9
Detect
null
null
X
There is no evidence of a capability to implement Intrusion Detection / Prevention Systems (IDS / IPS) technologies on critical systems, key network segments and network choke points.
Continuous Monitoring (MON) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Generating event logs and the review of event logs is narrowly-focused to business-critical systems and/ or systems that store, processes and/ or transmit sensitive/regulated data. • Secure baseline configurations generate logs that contain sufficient information to establish necessary details of activity and allow for forensics analysis.
Continuous Monitoring (MON) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Situational awareness management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • Secure baseline configurations generate logs that contain sufficient information to establish necessary details of activity and allow for forensics analysis. • IT/cybersecurity personnel: o Identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for situational awareness management. o Configure alerts for critical or sensitive data that is stored, transmitted and processed on assets. o Use a structured process to review and analyze logs. • A log aggregator, or similar automated tool, provides an event log report generation capability to aid in detecting and assessing anomalous activities on business-critical systems.
Continuous Monitoring (MON) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • An IT Asset Management (ITAM) function, or similar function: o Governs asset management that ensures compliance with requirements for asset management. o Leverages a Configuration Management Database (CMDB), or similar tool, as the authoritative source of IT assets. • A Security Incident Event Manager (SIEM), or similar automated tool: o Centrally collects logs and is protected according to the manufacturer’s security guidelines to protect the integrity of the event logs with cryptographic mechanisms. o Monitors the organization for Indicators of Compromise (IoC) and provides 24x7x365 near real-time alerting capability. o Is configured to alert incident response personnel of detected suspicious events such that incident responders can look to terminate suspicious events. • Both inbound and outbound network traffic is monitored for unauthorized activities to identify prohibited activities and assist incident handlers with identifying potentially compromised systems.
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to implement Intrusion Detection / Prevention Systems (IDS / IPS) technologies on critical systems, key network segments and network choke points.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to implement Intrusion Detection / Prevention Systems (IDS / IPS) technologies on critical systems, key network segments and network choke points.
CC7.2
CC7.2-POF2 CC7.2-POF3
null
null
null
null
null
DSS05.07
null
null
OPA-04
null
null
NDR 3.2 (15.6.1)
null
null
null
null
null
8.16
null
null
null
null
null
null
null
TS-2.7
Sec 4(D)(2)(h)
null
null
null
null
null
SI-4(1)
null
null
null
SI-4(1) SI-4(25)
null
null
null
null
SI-4(1) SI-4(25)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
A01:2021 A07:2021 A09:2021
null
1.4.3 11.5 11.5.1 11.5.1.1
null
1.4.3 11.5.1
null
1.4.3
null
null
1.4.3 11.5.1
1.4.3 11.5.1 11.5.1.1
null
N.6
6.5A
null
null
null
null
null
null
null
5.10.1.3
null
null
null
null
null
null
SI-4(1)
null
null
null
null
null
null
null
SI-4(1)
null
SI-4(1)
SI-4(1)
null
SI-4(1)
null
SI-4(1)
SI-4(1)
null
null
null
null
null
null
null
6.S.C
6.M.C
6.M.C 1.L.A
SI-4(1)
null
null
null
null
null
null
null
null
5.6
null
null
SI-4(1)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
38-99-20(D)(2)(h)
null
null
null
null
SI-4(1)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
7.4 11.11 12.18 23.6
null
null
null
null
null
null
null
null
null
null
null
null
null
null
2-5-3-6
null
null
null
null
null
7.6.1 [OP.MON.1]
null
null
null
null
C1.a C1.c
null
null
null
null
null
null
null
null
null
0576
null
null
null
null
null
null
null
null
null
null
null
null
null
16.6.10.C.01 16.6.10.C.02 18.4.7.C.01 18.4.7.C.02 18.4.7.C.03 18.4.8.C.01 18.4.8.C.02 18.4.8.C.03 18.4.9.C.01 18.4.9.C.02 18.4.10.C.01 18.4.11.C.01 18.4.11.C.02 18.4.11.C.03 18.4.12.C.01 18.4.14.C.01
null
null
null
null
null
null
null
null
null
null
null
null
3.3 4.3 4.4
null
null
null
null
null
null
null
null
null
null
null
x
NAIC
x
x
R-AC-4 R-AM-1 R-AM-2 R-AM-3 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1
null
null
null
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
null
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-10 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Continuous Monitoring
Automated Tools for Real-Time Analysis
MON-01.2
Mechanisms exist to utilize a Security Incident Event Manager (SIEM), or similar automated tool, to support near real-time analysis and incident escalation.
- CimTrak Integrity Suite (https://www.cimcor.com/cimtrak/) - NNT Change Tracker (https://www.newnettechnologies.com)
E-MON-01 E-MON-05
Does the organization utilize a Security Incident Event Manager (SIEM), or similar automated tool, to support near real-time analysis and incident escalation?
9
Detect
null
null
X
There is no evidence of a capability to utilize a Security Incident Event Manager (SIEM), or similar automated tool, to support near real-time analysis and incident escalation.
SP-CMM1 is N/A, since a structured process is required to utilize a Security Incident Event Manager (SIEM), or similar automated tool, to support near real-time analysis and incident escalation.
Continuous Monitoring (MON) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Situational awareness management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • Secure baseline configurations generate logs that contain sufficient information to establish necessary details of activity and allow for forensics analysis. • IT/cybersecurity personnel: o Identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for situational awareness management. o Configure alerts for critical or sensitive data that is stored, transmitted and processed on assets. o Use a structured process to review and analyze logs. • A log aggregator, or similar automated tool, provides an event log report generation capability to aid in detecting and assessing anomalous activities on business-critical systems.
Continuous Monitoring (MON) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • An IT Asset Management (ITAM) function, or similar function: o Governs asset management that ensures compliance with requirements for asset management. o Leverages a Configuration Management Database (CMDB), or similar tool, as the authoritative source of IT assets. • A Security Incident Event Manager (SIEM), or similar automated tool: o Centrally collects logs and is protected according to the manufacturer’s security guidelines to protect the integrity of the event logs with cryptographic mechanisms. o Monitors the organization for Indicators of Compromise (IoC) and provides 24x7x365 near real-time alerting capability. o Is configured to alert incident response personnel of detected suspicious events such that incident responders can look to terminate suspicious events. • Both inbound and outbound network traffic is monitored for unauthorized activities to identify prohibited activities and assist incident handlers with identifying potentially compromised systems. • A Security Operations Center (SOC), or similar function, enables cybersecurity operations covering preparation, detection and analysis, containment, eradication and recovery.
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to utilize a Security Incident Event Manager (SIEM), or similar automated tool, to support near real-time analysis and incident escalation.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to utilize a Security Incident Event Manager (SIEM), or similar automated tool, to support near real-time analysis and incident escalation.
CC7.2
null
null
null
null
null
null
DSS06.05
null
LOG-03
MON-03 OPA-04
null
null
null
null
null
null
null
null
8.16
null
null
null
null
null
null
null
null
null
null
null
null
null
null
SI-4(2)
null
SI-4(2)
SI-4(2)
SI-4(2) SC-48
null
null
SI-4(2)
SI-4(2)
SC-48
null
null
SI-4(2)
SI-4(2)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
A01:2021 A07:2021 A09:2021
10.6 10.6.1 10.6.2 10.6.3
10.4 10.4.1 10.4.1.1
null
10.4.1 10.4.1.1
null
null
10.4.1 10.4.1.1
null
10.4.1 10.4.1.1
10.4.1 10.4.1.1
null
J.3.2
null
null
null
null
null
null
null
null
5.4.1
null
null
null
null
null
null
SI-4(2)
null
null
null
null
null
null
null
SI-4(2)
null
SI-4(2)
SI-4(2)
null
SI-4(2)
null
SI-4(2)
SI-4(2)
null
null
null
null
null
null
null
null
null
null
SI-4(2)
null
null
null
null
null
null
null
null
5.6
null
null
SI-4(2)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
SI-4(2)
null
null
null
3.4.5(39) 3.4.5(40)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
OPS-13
null
null
null
11.11 12.31
null
null
null
null
null
null
null
null
null
null
null
2-11-1-3 2-11-1-4
null
3.3.14
2-12-3-3 5-1-3-3
null
null
null
null
null
null
null
null
null
null
C1.a C1.c
null
null
null
null
null
null
Principle 5.17
null
null
null
null
null
null
null
null
null
null
null
null
null
12.4.5.P
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
3.4
null
null
null
null
null
null
null
null
null
null
null
x
null
x
x
R-AC-4 R-AM-1 R-AM-2 R-AM-3 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1
null
null
null
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
null
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-10 MT-11 MT-12 MT-13 MT-14
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
null
null
null
Continuous Monitoring
Inbound & Outbound Communications Traffic
MON-01.3
Mechanisms exist to continuously monitor inbound and outbound communications traffic for unusual or unauthorized activities or conditions.
- CimTrak Integrity Suite (https://www.cimcor.com/cimtrak/) - NNT Change Tracker (https://www.newnettechnologies.com)
null
Does the organization continuously monitor inbound and outbound communications traffic for unusual or unauthorized activities or conditions?
9
Detect
null
X
X
There is no evidence of a capability to continuously monitor inbound and outbound communications traffic for unusual or unauthorized activities or conditions.
SP-CMM1 is N/A, since a structured process is required to continuously monitor inbound and outbound communications traffic for unusual or unauthorized activities or conditions.
Continuous Monitoring (MON) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Situational awareness management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • Secure baseline configurations generate logs that contain sufficient information to establish necessary details of activity and allow for forensics analysis. • IT/cybersecurity personnel: o Identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for situational awareness management. o Configure alerts for critical or sensitive data that is stored, transmitted and processed on assets. o Use a structured process to review and analyze logs. • A log aggregator, or similar automated tool, provides an event log report generation capability to aid in detecting and assessing anomalous activities on business-critical systems.
Continuous Monitoring (MON) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • An IT Asset Management (ITAM) function, or similar function: o Governs asset management that ensures compliance with requirements for asset management. o Leverages a Configuration Management Database (CMDB), or similar tool, as the authoritative source of IT assets. • A Security Incident Event Manager (SIEM), or similar automated tool: o Centrally collects logs and is protected according to the manufacturer’s security guidelines to protect the integrity of the event logs with cryptographic mechanisms. o Monitors the organization for Indicators of Compromise (IoC) and provides 24x7x365 near real-time alerting capability. o Is configured to alert incident response personnel of detected suspicious events such that incident responders can look to terminate suspicious events. • Both inbound and outbound network traffic is monitored for unauthorized activities to identify prohibited activities and assist incident handlers with identifying potentially compromised systems. • A Security Operations Center (SOC), or similar function, enables cybersecurity operations covering preparation, detection and analysis, containment, eradication and recovery.
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to continuously monitor inbound and outbound communications traffic for unusual or unauthorized activities or conditions.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to continuously monitor inbound and outbound communications traffic for unusual or unauthorized activities or conditions.
CC7.2
null
null
null
null
null
null
null
null
null
OPA-04
null
null
null
null
null
null
null
null
8.16
null
null
null
null
null
null
null
null
null
null
null
null
null
null
SI-4(4)
null
SI-4(4)
SI-4(4)
SI-4(4)
null
null
SI-4(4)
SI-4(4)
null
null
null
SI-4(4)
SI-4(4)
null
null
null
null
null
null
null
3.14.6
3.14.6.c
3.14.6[a] 3.14.6[b] 3.14.6[c]
null
3.14.2e
null
DE.AE-1
DE.CM-01 DE.CM-03 DE.CM-06
A01:2021 A07:2021 A09:2021
null
null
null
null
null
null
null
null
null
null
null
J.7
null
null
null
null
null
null
null
null
5.4.1
null
SI.L2-3.14.6
SI.L2-3.14.6 TBD - 3.14.2e
null
SI.L2-3.14.6
SI.L2-3.14.6
SI-4(4)
null
null
null
null
null
null
null
SI-4(4)
null
SI-4(4)
SI-4(4)
null
SI-4(4)
null
SI-4(4)
SI-4(4)
null
null
null
null
null
null
null
null
null
null
SI-4(4)
null
null
null
null
null
null
null
null
null
null
null
SI-4(4)
III.D.2.b
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
SI-4(4)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
9.9 9.10 10.9
null
null
null
null
null
null
null
null
null
null
null
null
TPC-40
null
null
null
null
null
null
null
null
null
null
null
null
C1.a C1.c C2.a
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
16.6.10.C.01 16.6.10.C.02 18.4.8.C.01 18.4.8.C.02 18.4.8.C.03
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
x
null
x
x
R-AC-4 R-AM-1 R-AM-2 R-AM-3 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1
null
null
null
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
null
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-10 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Continuous Monitoring
System Generated Alerts
MON-01.4
Mechanisms exist to monitor, correlate and respond to alerts from physical, cybersecurity, data privacy and supply chain activities to achieve integrated situational awareness.
- CimTrak Integrity Suite (https://www.cimcor.com/cimtrak/) - NNT Change Tracker (https://www.newnettechnologies.com)
null
Does the organization monitor, correlate and respond to alerts from physical, cybersecurity, data privacy and supply chain activities to achieve integrated situational awareness?
7
Detect
null
null
X
There is no evidence of a capability to monitor, correlate and respond to alerts from physical, cybersecurity, data privacy and supply chain activities to achieve integrated situational awareness.
Continuous Monitoring (MON) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Generating event logs and the review of event logs is narrowly-focused to business-critical systems and/ or systems that store, processes and/ or transmit sensitive/regulated data. • Secure baseline configurations generate logs that contain sufficient information to establish necessary details of activity and allow for forensics analysis.
Continuous Monitoring (MON) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Situational awareness management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • Secure baseline configurations generate logs that contain sufficient information to establish necessary details of activity and allow for forensics analysis. • IT/cybersecurity personnel: o Identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for situational awareness management. o Configure alerts for critical or sensitive data that is stored, transmitted and processed on assets. o Use a structured process to review and analyze logs. • A log aggregator, or similar automated tool, provides an event log report generation capability to aid in detecting and assessing anomalous activities on business-critical systems.
Continuous Monitoring (MON) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • An IT Asset Management (ITAM) function, or similar function: o Governs asset management that ensures compliance with requirements for asset management. o Leverages a Configuration Management Database (CMDB), or similar tool, as the authoritative source of IT assets. • A Security Incident Event Manager (SIEM), or similar automated tool: o Centrally collects logs and is protected according to the manufacturer’s security guidelines to protect the integrity of the event logs with cryptographic mechanisms. o Monitors the organization for Indicators of Compromise (IoC) and provides 24x7x365 near real-time alerting capability. o Is configured to alert incident response personnel of detected suspicious events such that incident responders can look to terminate suspicious events. • Both inbound and outbound network traffic is monitored for unauthorized activities to identify prohibited activities and assist incident handlers with identifying potentially compromised systems.
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to monitor, correlate and respond to alerts from physical, cybersecurity, data privacy and supply chain activities to achieve integrated situational awareness.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to monitor, correlate and respond to alerts from physical, cybersecurity, data privacy and supply chain activities to achieve integrated situational awareness.
CC7.2
null
null
8.4
null
8.4
8.4
DSS06.05
null
LOG-03
CLS-08 MON-03
null
null
CR 2.8 (6.10.1)
null
null
null
null
12.4.1
8.15
12.4.1
null
null
null
null
null
null
null
null
null
null
null
null
null
SI-4(5)
null
SI-4(5)
SI-4(5)
SI-4(5)
null
null
SI-4(5)
SI-4(5)
null
null
null
SI-4(5)
SI-4(5)
null
null
null
null
null
null
null
NFO - SI-4(5)
3.3.1.a 3.14.6.a 3.14.6.a.1 3.14.6.a.2 3.14.6.b 3.14.6.c
null
A.03.03.01.ODP[01] A.03.03.02.a.01 A.03.03.02.a.02 A.03.03.02.a.03 A.03.03.02.a.04 A.03.03.02.a.05 A.03.03.02.a.06 A.03.03.02.b.07 A.03.03.03.a
null
null
null
PR.PS-04 DE.CM-02 DE.CM-03 DE.CM-09
A01:2021 A07:2021 A09:2021
null
10.2 10.4 10.4.1 10.4.1.1 10.4.3
null
10.4.1 10.4.1.1 10.4.3
null
null
10.4.1 10.4.1.1 10.4.3
null
10.4.1 10.4.1.1 10.4.3
10.4.1 10.4.1.1 10.4.3
null
J.2.10
null
5.2.4
null
null
null
SITUATION-1.A.MIL1 SITUATION-1.B.MIL2 SITUATION-1.C.MIL2 SITUATION-1.D.MIL2 SITUATION-1.F.MIL3
null
null
5.4.1 5.4.1.1 5.4.1.1.1
null
null
null
null
null
null
SI-4(5)
null
null
null
null
null
null
null
SI-4(5)
null
SI-4(5)
SI-4(5)
null
SI-4(5)
null
SI-4(5)
SI-4(5)
null
null
null
null
null
null
164.312(b)
null
null
null
SI-4(5)
null
null
null
null
null
null
null
null
5.4 5.6
null
null
SI-4(5)
III.D.3.a
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
SI-4(5)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
OPS-13
null
null
null
21.2 21.4
null
null
null
null
null
null
null
null
null
null
null
2-11-1-1
TPC-80 TPC-87
null
2-12-3-1
null
null
null
null
null
7.3.8 [OP.EXP.8]
null
null
null
null
B2.d C1.a C1.c
null
null
null
null
null
null
Principle 1.7 Principle 7.8
null
null
null
null
null
null
null
null
null
null
null
null
null
12.4.1 12.4.1.15.PB
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
3.6
null
null
null
null
null
null
null
null
null
null
null
x
null
x
x
R-AC-4 R-AM-1 R-AM-2 R-AM-3 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1
null
null
null
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
null
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-10 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Continuous Monitoring
Wireless Intrusion Detection System (WIDS)
MON-01.5
Mechanisms exist to utilize Wireless Intrusion Detection / Protection Systems (WIDS / WIPS) to identify rogue wireless devices and to detect attack attempts via wireless networks.
- CimTrak Integrity Suite (https://www.cimcor.com/cimtrak/) - NNT Change Tracker (https://www.newnettechnologies.com)
null
Does the organization utilize Wireless Intrusion Detection / Protection Systems (WIDS / WIPS) to identify rogue wireless devices and to detect attack attempts via wireless networks?
5
Detect
null
null
X
There is no evidence of a capability to utilize Wireless Intrusion Detection / Protection Systems (WIDS / WIPS) to identify rogue wireless devices and to detect attack attempts via wireless networks.
SP-CMM1 is N/A, since a structured process is required to utilize Wireless Intrusion Detection / Protection Systems (WIDS / WIPS) to identify rogue wireless devices and to detect attack attempts via wireless networks.
Continuous Monitoring (MON) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Situational awareness management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • Secure baseline configurations generate logs that contain sufficient information to establish necessary details of activity and allow for forensics analysis. • IT/cybersecurity personnel: o Identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for situational awareness management. o Configure alerts for critical or sensitive data that is stored, transmitted and processed on assets. o Use a structured process to review and analyze logs. • A log aggregator, or similar automated tool, provides an event log report generation capability to aid in detecting and assessing anomalous activities on business-critical systems.
Continuous Monitoring (MON) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • An IT Asset Management (ITAM) function, or similar function: o Governs asset management that ensures compliance with requirements for asset management. o Leverages a Configuration Management Database (CMDB), or similar tool, as the authoritative source of IT assets. • A Security Incident Event Manager (SIEM), or similar automated tool: o Centrally collects logs and is protected according to the manufacturer’s security guidelines to protect the integrity of the event logs with cryptographic mechanisms. o Monitors the organization for Indicators of Compromise (IoC) and provides 24x7x365 near real-time alerting capability. o Is configured to alert incident response personnel of detected suspicious events such that incident responders can look to terminate suspicious events. • Both inbound and outbound network traffic is monitored for unauthorized activities to identify prohibited activities and assist incident handlers with identifying potentially compromised systems.
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to utilize Wireless Intrusion Detection / Protection Systems (WIDS / WIPS) to identify rogue wireless devices and to detect attack attempts via wireless networks.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to utilize Wireless Intrusion Detection / Protection Systems (WIDS / WIPS) to identify rogue wireless devices and to detect attack attempts via wireless networks.
CC7.2
null
null
null
null
null
null
null
null
null
MON-08 MON-10
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
SI-4(14) SI-4(15)
null
null
null
SI-4(14) SI-4(15)
null
null
null
SI-4(14)
SI-4(15)
null
null
null
SI-4(14)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
11.1
11.2
null
null
null
null
null
null
null
null
null
N.8.5
6.5A
null
null
null
null
null
null
null
null
null
null
null
null
null
null
SI-4(14)
null
null
null
null
null
null
null
SI-4(14)
null
SI-4(14)
SI-4(14)
null
SI-4(14)
null
null
SI-4(14)
null
null
null
null
null
null
null
null
6.M.C
6.M.C
null
null
null
null
null
null
null
null
null
null
null
null
SI-4(14)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
SI-4(14)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
7.6
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
C1.a C1.c
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
16.6.10.C.01 16.6.10.C.02 18.4.8.C.01 18.4.8.C.02 18.4.8.C.03
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
x
R-AC-4 R-AM-1 R-AM-2 R-AM-3 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1
null
null
null
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
null
NT-2 NT-3 NT-4 NT-5 NT-6 NT-7 NT-8 NT-9 NT-10 NT-11 NT-12 NT-13 NT-14 MT-1 MT-2 MT-3 MT-4 MT-5 MT-6 MT-7 MT-8 MT-9 MT-10 MT-11 MT-12 MT-13 MT-14 MT-15
null
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Continuous Monitoring
Host-Based Devices
MON-01.6
Mechanisms exist to utilize Host-based Intrusion Detection / Prevention Systems (HIDS / HIPS) to actively alert on or block unwanted activities and send logs to a Security Incident Event Manager (SIEM), or similar automated tool, to maintain situational awareness.
- CimTrak Integrity Suite (https://www.cimcor.com/cimtrak/) - NNT Change Tracker (https://www.newnettechnologies.com)
null
Does the organization utilize Host-based Intrusion Detection / Prevention Systems (HIDS / HIPS) to actively alert on or block unwanted activities and send logs to a Security Incident Event Manager (SIEM), or similar automated tool, to maintain situational awareness?
8
Detect
null
null
X
There is no evidence of a capability to utilize Host-based Intrusion Detection / Prevention Systems (HIDS / HIPS) to actively alert on or block unwanted activities and send logs to a Security Incident Event Manager (SIEM), or similar automated tool, to maintain situational awareness.
Continuous Monitoring (MON) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Generating event logs and the review of event logs is narrowly-focused to business-critical systems and/ or systems that store, processes and/ or transmit sensitive/regulated data. • Secure baseline configurations generate logs that contain sufficient information to establish necessary details of activity and allow for forensics analysis.
Continuous Monitoring (MON) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Situational awareness management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • Secure baseline configurations generate logs that contain sufficient information to establish necessary details of activity and allow for forensics analysis. • IT/cybersecurity personnel: o Identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for situational awareness management. o Configure alerts for critical or sensitive data that is stored, transmitted and processed on assets. o Use a structured process to review and analyze logs. • A log aggregator, or similar automated tool, provides an event log report generation capability to aid in detecting and assessing anomalous activities on business-critical systems.
Continuous Monitoring (MON) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • An IT Asset Management (ITAM) function, or similar function: o Governs asset management that ensures compliance with requirements for asset management. o Leverages a Configuration Management Database (CMDB), or similar tool, as the authoritative source of IT assets. • A Security Incident Event Manager (SIEM), or similar automated tool: o Centrally collects logs and is protected according to the manufacturer’s security guidelines to protect the integrity of the event logs with cryptographic mechanisms. o Monitors the organization for Indicators of Compromise (IoC) and provides 24x7x365 near real-time alerting capability. o Is configured to alert incident response personnel of detected suspicious events such that incident responders can look to terminate suspicious events. • Both inbound and outbound network traffic is monitored for unauthorized activities to identify prohibited activities and assist incident handlers with identifying potentially compromised systems.
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to utilize Host-based Intrusion Detection / Prevention Systems (HIDS / HIPS) to actively alert on or block unwanted activities and send logs to a Security Incident Event Manager (SIEM), or similar automated tool, to maintain situational awareness.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to utilize Host-based Intrusion Detection / Prevention Systems (HIDS / HIPS) to actively alert on or block unwanted activities and send logs to a Security Incident Event Manager (SIEM), or similar automated tool, to maintain situational awareness.
CC7.2
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
SI-4(23)
null
null
null
SI-4(23)
null
null
null
null
SI-4(23)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
N.6.2
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
SI-4(23)
null
SI-4(23)
SI-4(23)
null
SI-4(23)
null
SI-4(23)
SI-4(23)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
SI-4(23)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
SI-4(23)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
C1.a C1.c
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
x
R-AC-4 R-AM-1 R-AM-2 R-AM-3 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1
null
null
null
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
null
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-10 MT-11 MT-12 MT-13 MT-14
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
null
null
null
Continuous Monitoring
File Integrity Monitoring (FIM)
MON-01.7
Mechanisms exist to utilize a File Integrity Monitor (FIM), or similar change-detection technology, on critical assets to generate alerts for unauthorized modifications.
- CimTrak Integrity Suite (https://www.cimcor.com/cimtrak/) - NNT Change Tracker (https://www.newnettechnologies.com)
null
Does the organization utilize a File Integrity Monitor (FIM), or similar change-detection technology, on critical assets to generate alerts for unauthorized modifications?
9
Detect
null
null
X
There is no evidence of a capability to utilize a File Integrity monitor (FIM), or similar change-detection technology, on critical assets to generate alerts for unauthorized modifications.
Continuous Monitoring (MON) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Generating event logs and the review of event logs is narrowly-focused to business-critical systems and/ or systems that store, processes and/ or transmit sensitive/regulated data. • Secure baseline configurations generate logs that contain sufficient information to establish necessary details of activity and allow for forensics analysis.
Continuous Monitoring (MON) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Situational awareness management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • Secure baseline configurations generate logs that contain sufficient information to establish necessary details of activity and allow for forensics analysis. • IT/cybersecurity personnel: o Identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for situational awareness management. o Configure alerts for critical or sensitive data that is stored, transmitted and processed on assets. o Use a structured process to review and analyze logs. • A log aggregator, or similar automated tool, provides an event log report generation capability to aid in detecting and assessing anomalous activities on business-critical systems.
Continuous Monitoring (MON) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • An IT Asset Management (ITAM) function, or similar function: o Governs asset management that ensures compliance with requirements for asset management. o Leverages a Configuration Management Database (CMDB), or similar tool, as the authoritative source of IT assets. • A Security Incident Event Manager (SIEM), or similar automated tool: o Centrally collects logs and is protected according to the manufacturer’s security guidelines to protect the integrity of the event logs with cryptographic mechanisms. o Monitors the organization for Indicators of Compromise (IoC) and provides 24x7x365 near real-time alerting capability. o Is configured to alert incident response personnel of detected suspicious events such that incident responders can look to terminate suspicious events. • Both inbound and outbound network traffic is monitored for unauthorized activities to identify prohibited activities and assist incident handlers with identifying potentially compromised systems.
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to utilize a File Integrity monitor (FIM), or similar change-detection technology, on critical assets to generate alerts for unauthorized modifications.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to utilize a File Integrity monitor (FIM), or similar change-detection technology, on critical assets to generate alerts for unauthorized modifications.
CC6.8 CC7.1
CC7.1-POF2 CC7.1-POF3 CC7.1-POF4
null
null
null
null
null
null
null
null
SAP-06
SO12
null
FR 3 (7.1) CR 3.4 (7.6.3(2))
null
null
null
null
null
null
null
null
null
null
null
null
T1003, T1003.003, T1020.001, T1027, T1027.002, T1036, T1036.001, T1036.005, T1037, T1037.002, T1037.003, T1037.004, T1037.005, T1040, T1047, T1053.006, T1056.002, T1059, T1059.001, T1059.002, T1059.003, T1059.004, T1059.005, T1059.006, T1059.007, T1059.008, T1068, T1070, T1070.001, T1070.002, T1070.003, T1072, T1080, T1098.001, T1098.002, T1098.003, T1114, T1114.001, T1114.002, T1114.003, T1119, T1127, T1129, T1133, T1136, T1136.001, T1136.002, T1136.003, T1176, T1185, T1189, T1190, T1195.003, T1203, T1204, T1204.002, T1204.003, T1210, T1211, T1212, T1213, T1213.001, T1213.002, T1216, T1216.001, T1218, T1218.001, T1218.002, T1218.003, T1218.004, T1218.005, T1218.008, T1218.009, T1218.010, T1218.011, T1218.012, T1218.013, T1218.014, T1219, T1220, T1221, T1222, T1222.001, T1222.002, T1485, T1486, T1490, T1491, T1491.001, T1491.002, T1495, T1505, T1505.001, T1505.002, T1505.004, T1525, T1530, T1542, T1542.001, T1542.003, T1542.004, T1542.005, T1543, T1543.002, T1546, T1546.002, T1546.004, T1546.006, T1546.008, T1546.009, T1546.010, T1546.013, T1547.002, T1547.003, T1547.004, T1547.005, T1547.006, T1547.008, T1547.011, T1547.013, T1548, T1548.004, T1550.001, T1550.004, T1552, T1552.004, T1553, T1553.001, T1553.003, T1553.005, T1553.006, T1554, T1556, T1556.001, T1556.003, T1556.004, T1557, T1557.002, T1558, T1558.002, T1558.003, T1558.004, T1561, T1561.001, T1561.002, T1562, T1562.001, T1562.002, T1562.004, T1562.006, T1562.009, T1564.003, T1564.004, T1564.006, T1564.008, T1564.009, T1565, T1565.001, T1565.002, T1569, T1569.002, T1574, T1574.001, T1574.004, T1574.006, T1574.007, T1574.008, T1574.009, T1574.012, T1599, T1599.001, T1601, T1601.001, T1601.002, T1602, T1602.001, T1602.002, T1609, T1611
TS-2.6
null
null
PR.DS-P6
null
null
null
null
null
null
null
SI-4(24)
null
null
null
null
SI-4(24)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
PR.DS-8
DE.CM-09
A01:2021 A02:2021 A05:2021 A08:2021 A09:2021
11.5 11.5.1
10.3.4 11.5 11.5.2
null
10.3.4 11.5.2
null
null
10.3.4 11.5.2
null
10.3.4 11.5.2
10.3.4 11.5.2
null
1.2.5.11
6.2
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
164.312(c) 164.312(c)(1) 164.312(c)(2)
null
null
2.L.D
SI-4(24)
null
null
8-613
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
3.4.4(36)(e)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
6.4 12.19
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
1-5-4
null
null
null
null
null
null
null
null
null
C1.a C1.c
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
16.6.10.C.01 16.6.10.C.02
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
x
null
x
x
R-AC-4 R-AM-1 R-AM-2 R-AM-3 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1
null
null
null
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
null
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-10 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Continuous Monitoring
Reviews & Updates
MON-01.8
Mechanisms exist to review event logs on an ongoing basis and escalate incidents in accordance with established timelines and procedures.
- Security Incident Event Manager (SIEM) - Splunk
E-MON-01 E-MON-02 E-MON-05
Does the organization review event logs on an ongoing basis and escalate incidents in accordance with established timelines and procedures?
10
Detect
X
X
X
There is no evidence of a capability to review event logs on an ongoing basis and escalate incidents in accordance with established timelines and procedures.
Continuous Monitoring (MON) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Generating event logs and the review of event logs is narrowly-focused to business-critical systems and/ or systems that store, processes and/ or transmit sensitive/regulated data. • Secure baseline configurations generate logs that contain sufficient information to establish necessary details of activity and allow for forensics analysis.
Continuous Monitoring (MON) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Situational awareness management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • Secure baseline configurations generate logs that contain sufficient information to establish necessary details of activity and allow for forensics analysis. • IT/cybersecurity personnel: o Identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for situational awareness management. o Configure alerts for critical or sensitive data that is stored, transmitted and processed on assets. o Use a structured process to review and analyze logs. • A log aggregator, or similar automated tool, provides an event log report generation capability to aid in detecting and assessing anomalous activities on business-critical systems.
Continuous Monitoring (MON) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • An IT Asset Management (ITAM) function, or similar function: o Governs asset management that ensures compliance with requirements for asset management. o Leverages a Configuration Management Database (CMDB), or similar tool, as the authoritative source of IT assets. • A Security Incident Event Manager (SIEM), or similar automated tool: o Centrally collects logs and is protected according to the manufacturer’s security guidelines to protect the integrity of the event logs with cryptographic mechanisms. o Monitors the organization for Indicators of Compromise (IoC) and provides 24x7x365 near real-time alerting capability. o Is configured to alert incident response personnel of detected suspicious events such that incident responders can look to terminate suspicious events. • Both inbound and outbound network traffic is monitored for unauthorized activities to identify prohibited activities and assist incident handlers with identifying potentially compromised systems.
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to review event logs on an ongoing basis and escalate incidents in accordance with established timelines and procedures.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to review event logs on an ongoing basis and escalate incidents in accordance with established timelines and procedures.
CC7.2
CC7.2-POF4
null
8.1
8.1
8.1
8.1
null
null
LOG-03
CLS-08 MON-04
null
null
null
null
null
null
null
null
8.16
null
null
null
null
null
null
null
null
null
null
null
null
null
null
AU-2(3)
null
null
null
AU-2
AU-2
AU-2
AU-2
AU-2
null
null
AU-2
AU-2
AU-2
null
AU-2
AU-2
AU-2
AU-2
AU-2
AU-2
3.3.3 3.14.3
null
3.3.3[a] 3.3.3[b] 3.3.3[c] 3.14.3[a] 3.14.3[b] 3.14.3[c]
A.03.03.05.a
null
null
PR.PT-1
DE.AE-02
A01:2021 A07:2021 A09:2021
null
10.4 10.4.1 10.4.1.1 10.4.2 10.4.2.1 10.4.3
null
10.4.1 10.4.1.1 10.4.2 10.4.2.1 10.4.3
null
null
10.4.1 10.4.1.1 10.4.2 10.4.2.1 10.4.3
null
10.4.1 10.4.1.1 10.4.2 10.4.2.1 10.4.3
10.4.1 10.4.1.1 10.4.2 10.4.2.1 10.4.3
null
J.3
null
5.2.4
null
null
null
SITUATION-2.A.MIL1 SITUATION-2.B.MIL1 SITUATION-2.C.MIL2
null
null
null
null
AU.L2-3.3.3 SI.L2-3.14.3
AU.L2-3.3.3 SI.L2-3.14.3
null
AU.L2-3.3.3 SI.L2-3.14.3
AU.L2-3.3.3 SI.L2-3.14.3
null
null
null
null
null
null
null
null
AU-2(3)
null
AU-2(3)
AU-2(3)
null
null
null
null
null
null
null
null
null
null
null
164.312(b)
null
null
null
AU-2
null
null
null
null
null
null
null
null
5.6 5.7
null
AU-2(3)
AU-2(3)
III.D.3.a
null
null
null
null
null
null
null
null
null
null
null
Sec 4(2)(b)(ii)(C)(2)
null
null
null
null
null
null
null
null
null
null
3.4.5(39) 3.4.5(40)
null
null
null
null
null
null
null
null
null
null
null
null
null
5.5
null
null
null
null
12.31 21.3 21.11
null
null
null
null
null
null
null
null
null
null
null
2-11-1-2
TPC-40
null
2-12-3-4
null
null
null
null
null
null
null
null
null
null
B2.d C1.a C1.e
C1 C2
null
null
null
null
null
Principle 1.8 Principle 3.12 Principle 4.18
null
null
0109
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
12.2.2
null
null
null
null
null
null
null
3.5
3.3.1 3.3.2
null
null
null
null
null
null
null
null
null
null
x
null
x
x
R-AC-4 R-AM-1 R-AM-2 R-AM-3 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1
null
null
null
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
null
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-10 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Continuous Monitoring
Proxy Logging
MON-01.9
Mechanisms exist to log all Internet-bound requests, in order to identify prohibited activities and assist incident handlers with identifying potentially compromised systems.
- CimTrak Integrity Suite (https://www.cimcor.com/cimtrak/) - NNT Change Tracker (https://www.newnettechnologies.com)
null
Does the organization log all Internet-bound requests, in order to identify prohibited activities and assist incident handlers with identifying potentially compromised systems?
8
Detect
null
null
X
There is no evidence of a capability to log all Internet-bound requests, in order to identify prohibited activities and assist incident handlers with identifying potentially compromised systems.
Continuous Monitoring (MON) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Generating event logs and the review of event logs is narrowly-focused to business-critical systems and/ or systems that store, processes and/ or transmit sensitive/regulated data. • Secure baseline configurations generate logs that contain sufficient information to establish necessary details of activity and allow for forensics analysis.
Continuous Monitoring (MON) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Situational awareness management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • Secure baseline configurations generate logs that contain sufficient information to establish necessary details of activity and allow for forensics analysis. • IT/cybersecurity personnel: o Identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for situational awareness management. o Configure alerts for critical or sensitive data that is stored, transmitted and processed on assets. o Use a structured process to review and analyze logs. • A log aggregator, or similar automated tool, provides an event log report generation capability to aid in detecting and assessing anomalous activities on business-critical systems.
Continuous Monitoring (MON) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • An IT Asset Management (ITAM) function, or similar function: o Governs asset management that ensures compliance with requirements for asset management. o Leverages a Configuration Management Database (CMDB), or similar tool, as the authoritative source of IT assets. • A Security Incident Event Manager (SIEM), or similar automated tool: o Centrally collects logs and is protected according to the manufacturer’s security guidelines to protect the integrity of the event logs with cryptographic mechanisms. o Monitors the organization for Indicators of Compromise (IoC) and provides 24x7x365 near real-time alerting capability. o Is configured to alert incident response personnel of detected suspicious events such that incident responders can look to terminate suspicious events. • Both inbound and outbound network traffic is monitored for unauthorized activities to identify prohibited activities and assist incident handlers with identifying potentially compromised systems.
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to log all Internet-bound requests, in order to identify prohibited activities and assist incident handlers with identifying potentially compromised systems.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to log all Internet-bound requests, in order to identify prohibited activities and assist incident handlers with identifying potentially compromised systems.
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
J.7.3
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
6.M.D
6.M.D
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
9.14 21.20
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
C1.a C1.c
null
null
null
null
null
null
null
null
null
0261
null
null
null
null
null
null
null
null
null
null
null
null
null
14.3.6.C.02 16.6.10.C.01 16.6.10.C.02
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
x
null
null
null
R-AC-4 R-AM-1 R-AM-2 R-AM-3 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-GV-8 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1
null
null
null
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
null
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-10 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Continuous Monitoring
Deactivated Account Activity
MON-01.10
Mechanisms exist to monitor deactivated accounts for attempted usage.
- CimTrak Integrity Suite (https://www.cimcor.com/cimtrak/) - Security Incident Event Manager (SIEM) - Splunk - NNT Change Tracker (https://www.newnettechnologies.com)
null
Does the organization monitor deactivated accounts for attempted usage?
9
Detect
null
X
X
There is no evidence of a capability to monitor deactivated accounts for attempted usage.
Continuous Monitoring (MON) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Generating event logs and the review of event logs is narrowly-focused to business-critical systems and/ or systems that store, processes and/ or transmit sensitive/regulated data. • Secure baseline configurations generate logs that contain sufficient information to establish necessary details of activity and allow for forensics analysis.
Continuous Monitoring (MON) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Situational awareness management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • Secure baseline configurations generate logs that contain sufficient information to establish necessary details of activity and allow for forensics analysis. • IT/cybersecurity personnel: o Identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for situational awareness management. o Configure alerts for critical or sensitive data that is stored, transmitted and processed on assets. o Use a structured process to review and analyze logs. • A log aggregator, or similar automated tool, provides an event log report generation capability to aid in detecting and assessing anomalous activities on business-critical systems.
Continuous Monitoring (MON) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • An IT Asset Management (ITAM) function, or similar function: o Governs asset management that ensures compliance with requirements for asset management. o Leverages a Configuration Management Database (CMDB), or similar tool, as the authoritative source of IT assets. • A Security Incident Event Manager (SIEM), or similar automated tool: o Centrally collects logs and is protected according to the manufacturer’s security guidelines to protect the integrity of the event logs with cryptographic mechanisms. o Monitors the organization for Indicators of Compromise (IoC) and provides 24x7x365 near real-time alerting capability. o Is configured to alert incident response personnel of detected suspicious events such that incident responders can look to terminate suspicious events. • Both inbound and outbound network traffic is monitored for unauthorized activities to identify prohibited activities and assist incident handlers with identifying potentially compromised systems.
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to monitor deactivated accounts for attempted usage.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to monitor deactivated accounts for attempted usage.
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
A09:2021
null
null
null
null
null
null
null
null
null
null
null
I.1.9
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
C1.a C1.c
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
x
null
x
null
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-1 R-AM-2 R-AM-3 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1
R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
null
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-10 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Continuous Monitoring
Automated Response to Suspicious Events
MON-01.11
Mechanisms exist to automatically implement pre-determined corrective actions in response to detected events that have security incident implications.
null
null
Does the organization automatically implement pre-determined corrective actions in response to detected events that have security incident implications?
5
Detect
null
null
X
There is no evidence of a capability to automatically implement pre-determined corrective actions in response to detected events that have security incident implications.
SP-CMM1 is N/A, since a structured process is required to automatically implement pre-determined corrective actions in response to detected events that have security incident implications.
Continuous Monitoring (MON) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Situational awareness management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • Secure baseline configurations generate logs that contain sufficient information to establish necessary details of activity and allow for forensics analysis. • IT/cybersecurity personnel: o Identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for situational awareness management. o Configure alerts for critical or sensitive data that is stored, transmitted and processed on assets. o Use a structured process to review and analyze logs. • A log aggregator, or similar automated tool, provides an event log report generation capability to aid in detecting and assessing anomalous activities on business-critical systems.
Continuous Monitoring (MON) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • An IT Asset Management (ITAM) function, or similar function: o Governs asset management that ensures compliance with requirements for asset management. o Leverages a Configuration Management Database (CMDB), or similar tool, as the authoritative source of IT assets. • A Security Incident Event Manager (SIEM), or similar automated tool: o Centrally collects logs and is protected according to the manufacturer’s security guidelines to protect the integrity of the event logs with cryptographic mechanisms. o Monitors the organization for Indicators of Compromise (IoC) and provides 24x7x365 near real-time alerting capability. o Is configured to alert incident response personnel of detected suspicious events such that incident responders can look to terminate suspicious events. • Both inbound and outbound network traffic is monitored for unauthorized activities to identify prohibited activities and assist incident handlers with identifying potentially compromised systems.
Continuous Monitoring (MON) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
Continuous Monitoring (MON) efforts are “world-class” capabilities that leverage predictive analysis (e.g., machine learning, AI, etc.). In addition to CMM Level 4 criteria, CMM Level 5 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Stakeholders make time-sensitive decisions to support operational efficiency, which may include automated remediation actions. ▪ Based on predictive analysis, process improvements are implemented according to “continuous improvement” practices that affect process changes.
null
null
null
null
null
null
null
null
null
null
CLS-08
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
SI-4(7)
null
null
null
IR-4(5) SI-4(7)
null
null
null
null
IR-4(5) SI-4(7)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
3.14.2e
null
null
null
null
null
A3.2.6.1
null
null
null
null
null
null
null
null
null
M.1.44
null
null
null
null
null
null
null
null
null
null
null
TBD - 3.14.2e
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
x
R-AC-4 R-AM-1 R-AM-2 R-AM-3 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1
null
null
null
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
null
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-10 MT-11 MT-12 MT-13 MT-14
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
null
null
null
Continuous Monitoring
Automated Alerts
MON-01.12
Mechanisms exist to automatically alert incident response personnel to inappropriate or anomalous activities that have potential security incident implications.
null
null
Does the organization automatically alert incident response personnel to inappropriate or anomalous activities that have potential security incident implications?
5
Detect
null
null
X
There is no evidence of a capability to automatically alert incident response personnel to inappropriate or anomalous activities that have potential security incident implications.
SP-CMM1 is N/A, since a structured process is required to automatically alert incident response personnel to inappropriate or anomalous activities that have potential security incident implications.
Continuous Monitoring (MON) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Situational awareness management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • Secure baseline configurations generate logs that contain sufficient information to establish necessary details of activity and allow for forensics analysis. • IT/cybersecurity personnel: o Identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for situational awareness management. o Configure alerts for critical or sensitive data that is stored, transmitted and processed on assets. o Use a structured process to review and analyze logs. • A log aggregator, or similar automated tool, provides an event log report generation capability to aid in detecting and assessing anomalous activities on business-critical systems.
Continuous Monitoring (MON) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • An IT Asset Management (ITAM) function, or similar function: o Governs asset management that ensures compliance with requirements for asset management. o Leverages a Configuration Management Database (CMDB), or similar tool, as the authoritative source of IT assets. • A Security Incident Event Manager (SIEM), or similar automated tool: o Centrally collects logs and is protected according to the manufacturer’s security guidelines to protect the integrity of the event logs with cryptographic mechanisms. o Monitors the organization for Indicators of Compromise (IoC) and provides 24x7x365 near real-time alerting capability. o Is configured to alert incident response personnel of detected suspicious events such that incident responders can look to terminate suspicious events. • Both inbound and outbound network traffic is monitored for unauthorized activities to identify prohibited activities and assist incident handlers with identifying potentially compromised systems.
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to automatically alert incident response personnel to inappropriate or anomalous activities that have potential security incident implications.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to automatically alert incident response personnel to inappropriate or anomalous activities that have potential security incident implications.
null
null
null
null
null
null
null
null
null
LOG-03
MON-03
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
SI-4(12)
null
null
null
SI-4(12)
null
null
null
SI-4(12)
null
null
null
null
SI-4(12)
null
null
null
null
null
null
null
null
3.3.4.a
null
null
null
null
null
null
null
null
A3.2.6.1
null
null
null
null
null
null
null
null
null
J.2.10
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
SI-4(12)
null
null
SI-4(12)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
2-12-3-1
null
null
null
null
null
null
null
null
null
null
B2.d C1.c
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
x
R-AC-4 R-AM-1 R-AM-2 R-AM-3 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1
null
null
null
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
null
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-10 MT-11 MT-12 MT-13 MT-14
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
null
null
null
Continuous Monitoring
Alert Threshold Tuning
MON-01.13
Mechanisms exist to "tune" event monitoring technologies through analyzing communications traffic/event patterns and developing profiles representing common traffic patterns and/or events.
null
null
Does the organization "tune" event monitoring technologies through analyzing communications traffic/event patterns and developing profiles representing common traffic patterns and/or events?
5
Detect
null
X
X
There is no evidence of a capability to "tune" event monitoring technologies through analyzing communications traffic/event patterns and developing profiles representing common traffic patterns and/ or events.
SP-CMM1 is N/A, since a structured process is required to "tune" event monitoring technologies through analyzing communications traffic/event patterns and developing profiles representing common traffic patterns and/ or events.
Continuous Monitoring (MON) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Situational awareness management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • Secure baseline configurations generate logs that contain sufficient information to establish necessary details of activity and allow for forensics analysis. • IT/cybersecurity personnel: o Identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for situational awareness management. o Configure alerts for critical or sensitive data that is stored, transmitted and processed on assets. o Use a structured process to review and analyze logs. • A log aggregator, or similar automated tool, provides an event log report generation capability to aid in detecting and assessing anomalous activities on business-critical systems.
Continuous Monitoring (MON) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • An IT Asset Management (ITAM) function, or similar function: o Governs asset management that ensures compliance with requirements for asset management. o Leverages a Configuration Management Database (CMDB), or similar tool, as the authoritative source of IT assets. • A Security Incident Event Manager (SIEM), or similar automated tool: o Centrally collects logs and is protected according to the manufacturer’s security guidelines to protect the integrity of the event logs with cryptographic mechanisms. o Monitors the organization for Indicators of Compromise (IoC) and provides 24x7x365 near real-time alerting capability. o Is configured to alert incident response personnel of detected suspicious events such that incident responders can look to terminate suspicious events. • Both inbound and outbound network traffic is monitored for unauthorized activities to identify prohibited activities and assist incident handlers with identifying potentially compromised systems. • A Security Operations Center (SOC), or similar function, enables cybersecurity operations covering preparation, detection and analysis, containment, eradication and recovery. • Administrative processes exist and a SIEM, or similar automated tool, is configured to perform trend analysis to assist in the determination if security control implementations, the frequency of continuous monitoring activities, and/ or the types of activities used in the continuous monitoring process need to be modified based on empirical data.
Continuous Monitoring (MON) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
Continuous Monitoring (MON) efforts are “world-class” capabilities that leverage predictive analysis (e.g., machine learning, AI, etc.). In addition to CMM Level 4 criteria, CMM Level 5 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Stakeholders make time-sensitive decisions to support operational efficiency, which may include automated remediation actions. ▪ Based on predictive analysis, process improvements are implemented according to “continuous improvement” practices that affect process changes.
null
null
null
13.6 13.11
null
13.6
13.6 13.11
null
null
LOG-05
OPA-04
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
SI-4(13)
null
null
null
SI-4(13)
null
null
null
null
SI-4(13)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
3.14.2e
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
J.3.2
null
null
null
null
null
null
null
null
5.4 5.4.1 5.4.3
null
null
TBD - 3.14.2e
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
x
R-AC-3 R-AC-4 R-AM-1 R-AM-2 R-AM-3 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-GV-8 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1
null
null
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
null
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-10 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15
null
null