SCF Domain
stringclasses 34
values | SCF Control
stringlengths 7
85
| SCF #
stringlengths 6
9
| Secure Controls Framework (SCF)
Control Description
stringlengths 49
657
| Methods To Comply With SCF Controls
stringlengths 6
863
⌀ | Evidence Request List (ERL) #
stringclasses 181
values | SCF Control Question
stringlengths 51
659
| Relative Control Weighting
int64 1
10
| Function Grouping
stringclasses 5
values | SCRM
Tier 1
Strategic
stringclasses 2
values | SCRM
Tier 2
Operational
stringclasses 2
values | SCRM
Tier 3
Tactical
stringclasses 2
values | SP-CMM 0
Not Performed
stringlengths 69
677
⌀ | SP-CMM 1
Performed Informally
stringlengths 43
2.02k
⌀ | SP-CMM 2
Planned & Tracked
stringlengths 43
3.33k
⌀ | SP-CMM 3
Well Defined
stringlengths 43
5.16k
⌀ | SP-CMM 4
Quantitatively Controlled
stringlengths 43
1.35k
⌀ | SP-CMM 5
Continuously Improving
stringlengths 43
725
⌀ | AICPA
TSC 2017
(Controls)
stringclasses 116
values | AICPA
TSC 2017
(Points of Focus)
stringclasses 171
values | BSI
Standard 200-1
stringclasses 18
values | CIS
CSC
v8.0
stringclasses 158
values | CIS
CSC v8.0
IG1
stringclasses 57
values | CIS
CSC v8.0
IG2
stringclasses 136
values | CIS
CSC v8.0
IG3
stringclasses 154
values | COBIT
2019
stringclasses 101
values | COSO
v2017
stringclasses 45
values | CSA
CCM
v4
stringclasses 229
values | CSA
IoT SCF
v2
stringclasses 168
values | ENISA
v2.0
stringclasses 33
values | GAPP
stringclasses 36
values | IEC 62443-4-2
stringclasses 104
values | ISO/SAE
21434
v2021
stringclasses 69
values | ISO
22301
v2019
stringclasses 25
values | ISO
27001
v2013
stringclasses 30
values | ISO
27001
v2022
stringclasses 35
values | ISO
27002
v2013
stringclasses 142
values | ISO
27002
v2022
stringclasses 166
values | ISO
27017
v2015
stringclasses 158
values | ISO
27018
v2014
stringclasses 16
values | ISO
27701
v2019
stringclasses 161
values | ISO
29100
v2011
stringclasses 15
values | ISO
31000
v2009
stringclasses 7
values | ISO
31010
v2009
stringclasses 16
values | MITRE
ATT&CK
10
stringclasses 100
values | MPA
Content Security Program
v5.1
stringclasses 98
values | NIAC
Insurance Data Security Model Law (MDL-668)
stringclasses 41
values | NIST
AI RMF
AI 100-1
v1.0
stringclasses 114
values | NIST Privacy Framework
v1.0
stringclasses 114
values | NIST
SSDF
stringclasses 29
values | NIST
800-37
rev 2
stringclasses 32
values | NIST
800-39
stringclasses 9
values | NIST
800-53
rev4
stringlengths 4
47
⌀ | NIST
800-53 rev4
(low)
stringclasses 121
values | NIST
800-53 rev4
(moderate)
stringlengths 4
22
⌀ | NIST
800-53 rev4
(high)
stringlengths 4
23
⌀ | NIST
800-53
rev5
stringlengths 4
99
⌀ | NIST
800-53B
rev5
(privacy)
stringclasses 85
values | NIST
800-53B
rev5
(low)
stringclasses 151
values | NIST
800-53B
rev5
(moderate)
stringlengths 4
40
⌀ | NIST
800-53B
rev5
(high)
stringlengths 4
40
⌀ | NIST
800-53
rev5
(NOC)
stringlengths 4
41
⌀ | NIST
800-63B
(partial mapping)
stringclasses 5
values | NIST
800-82 rev3
LOW
OT Overlay
stringclasses 162
values | NIST
800-82 rev3
MODERATE
OT Overlay
stringlengths 4
40
⌀ | NIST
800-82 rev3
HIGH
OT Overlay
stringlengths 4
40
⌀ | NIST
800-160
stringclasses 23
values | NIST
800-161
rev 1
stringlengths 4
34
⌀ | NIST
800-161
rev 1
C-SCRM Baseline
stringclasses 95
values | NIST
800-161
rev 1
Flow Down
stringclasses 71
values | NIST
800-161
rev 1
Level 1
stringclasses 69
values | NIST
800-161
rev 1
Level 2
stringclasses 218
values | NIST
800-161
rev 1
Level 3
stringclasses 234
values | NIST
800-171
rev 2
stringclasses 172
values | NIST
800-171
rev 3 FPD
stringlengths 5
141
⌀ | NIST
800-171A
stringclasses 114
values | NIST
800-171A
rev 3 IPD
stringclasses 167
values | NIST
800-172
stringclasses 46
values | NIST
800-218
v1.1
stringclasses 29
values | NIST
CSF
v1.1
stringclasses 97
values | NIST
CSF
v2.0 IPD
stringclasses 127
values | OWASP
Top 10
v2021
stringclasses 20
values | PCIDSS
v3.2
stringclasses 135
values | PCIDSS
v4.0
stringlengths 3
156
⌀ | PCIDSS
v4.0
SAQ A
stringclasses 30
values | PCIDSS
v4.0
SAQ A-EP
stringclasses 141
values | PCIDSS
v4.0
SAQ B
stringclasses 26
values | PCIDSS
v4.0
SAQ B-IP
stringclasses 55
values | PCIDSS
v4.0
SAQ C
stringclasses 132
values | PCIDSS
v4.0
SAQ C-VT
stringclasses 53
values | PCIDSS
v4.0
SAQ D Merchant
stringclasses 213
values | PCIDSS
v4.0
SAQ D Service Provider
stringclasses 231
values | PCIDSS
v4.0
SAQ P2PE
stringclasses 24
values | Shared Assessments SIG 2023
stringlengths 3
43
⌀ | SWIFT
CSF
v2023
stringclasses 55
values | TISAX
ISA v5.1.0
stringclasses 88
values | UL
2900-1
stringclasses 36
values | UN
R155
stringclasses 19
values | UN
ECE WP.29
stringclasses 19
values | US
C2M2
v2.1
stringclasses 152
values | US
CERT RMM
v1.2
stringclasses 212
values | US
CISA
CPG
v2022
stringclasses 44
values | US
CJIS Security Policy 5.9
stringclasses 99
values | US
CMMC 2.0
Level 1
stringclasses 17
values | US
CMMC 2.0
Level 2
stringclasses 110
values | US
CMMC 2.0
Level 3
stringclasses 139
values | US
CMMC 2.1 (draft)
Level 1
stringclasses 18
values | US
CMMC 2.1 (draft)
Level 2
stringclasses 110
values | US
CMMC 2.1 (draft)
Level 3
stringclasses 141
values | US
CMS
MARS-E v2.0
stringlengths 4
28
⌀ | US
COPPA
float64 6.5k
6.5k
⌀ | US
DFARS
Cybersecurity
252.204-70xx
stringclasses 19
values | US
FACTA
stringclasses 2
values | US
FAR
52.204-21
stringclasses 22
values | US
FAR
52.204-27
stringclasses 2
values | US
FAR
Section 889
stringclasses 1
value | US
FDA
21 CFR Part 11
stringclasses 27
values | US
FedRAMP
R4
stringlengths 4
24
⌀ | US
FedRAMP
R4 (low)
stringclasses 130
values | US
FedRAMP
R4 (moderate)
stringlengths 4
23
⌀ | US
FedRAMP
R4 (high)
stringlengths 4
24
⌀ | US
FedRAMP
R4 (LI-SaaS)
stringclasses 131
values | US
FedRAMP
R5
stringlengths 4
24
⌀ | US
FedRAMP
R5
(low)
stringclasses 151
values | US
FedRAMP
R5
(moderate)
stringlengths 4
23
⌀ | US
FedRAMP
R5
(high)
stringlengths 4
24
⌀ | US
FedRAMP
R5
(LI-SaaS)
stringclasses 151
values | US
FERPA
stringclasses 3
values | US
FFIEC
stringclasses 68
values | US
FINRA
stringclasses 3
values | US
FTC Act
stringclasses 1
value | US
GLBA
CFR 314
stringclasses 41
values | US
HIPAA
stringclasses 54
values | HIPAA - HICP
Small Practice
stringclasses 31
values | HIPAA - HICP
Medium Practice
stringclasses 59
values | HIPAA - HICP
Large Practice
stringclasses 112
values | US
IRS 1075
stringlengths 3
165
⌀ | US
ITAR Part 120
(limited)
stringclasses 9
values | US
NERC
CIP
stringclasses 35
values | US
NISPOM
stringclasses 72
values | US
NNPI
(unclass)
stringclasses 61
values | US
NSTC
NSPM-33
stringclasses 15
values | US
Privacy Shield
stringclasses 7
values | US
SEC
Cybersecurity Rule
stringclasses 12
values | US
SOX
stringclasses 1
value | US
SSA
EIESR
v8.0
stringclasses 22
values | US
StateRAMP
Low
Category 1
stringclasses 107
values | US
StateRAMP
Low+
Category 2
stringclasses 167
values | US
StateRAMP
Moderate
Category 3
stringlengths 4
24
⌀ | US
TSA / DHS
1580/82-2022-01
stringclasses 43
values | US - AK
PIPA
stringclasses 8
values | US - CA
SB327
stringclasses 4
values | US-CA
CPRA
(Nov 2022)
stringclasses 36
values | US - CA
SB1386
stringclasses 1
value | US - CO
Colorado Privacy Act
stringclasses 36
values | US - IL
BIPA
stringclasses 9
values | US - IL
IPA
stringclasses 4
values | US - IL
PIPA
stringclasses 6
values | US-MA
201 CMR 17.00
stringclasses 27
values | US - NV
SB220
stringclasses 3
values | US - NY
DFS
23 NYCRR500
float64 500
500
⌀ | US - NY
SHIELD Act
S5575B
stringclasses 15
values | US - OR
646A
stringclasses 21
values | US - SC
Insurance Data Security Act
stringclasses 41
values | US - TX
BC521
stringclasses 3
values | US-TX
Cybersecurity Act
stringclasses 13
values | US-TX DIR Control Standards 2.0
stringclasses 155
values | US-TX
TX-RAMP
Level 1
stringclasses 120
values | US-TX
TX-RAMP
Level 2
stringlengths 4
23
⌀ | US-TX
SB820
stringclasses 5
values | US-VA
CDPA
2023
stringclasses 24
values | US-VT
Act 171 of 2018
stringclasses 32
values | EMEA
EU
EBA
GL/2019/04
stringclasses 93
values | EMEA
EU
DORA
stringclasses 60
values | EMEA
EU ePrivacy
(draft)
stringclasses 15
values | EMEA
EU
GDPR
stringclasses 57
values | EMEA
EU
NIS2
stringclasses 21
values | EMEA
EU
PSD2
stringclasses 10
values | EMEA
EU
EU-US Data Privacy Framework
stringclasses 23
values | EMEA
Austria
stringclasses 10
values | EMEA
Belgium
stringclasses 9
values | EMEA
Czech Republic
stringclasses 14
values | EMEA
Denmark
stringclasses 11
values | EMEA
Finland
stringclasses 7
values | EMEA
France
stringclasses 9
values | EMEA
Germany
stringclasses 11
values | EMEA
Germany
Banking Supervisory Requirements for IT (BAIT)
stringclasses 57
values | EMEA
Germany
C5-2020
stringclasses 152
values | EMEA
Greece
stringclasses 9
values | EMEA
Hungary
stringclasses 12
values | EMEA
Ireland
stringclasses 3
values | EMEA
Israel
CDMO
v1.0
stringlengths 3
89
⌀ | EMEA
Israel
stringclasses 6
values | EMEA
Italy
stringclasses 15
values | EMEA
Kenya
DPA 2019
stringclasses 38
values | EMEA
Luxembourg
stringclasses 4
values | EMEA
Netherlands
stringclasses 12
values | EMEA
Nigeria
DPR 2019
stringclasses 24
values | EMEA
Norway
stringclasses 12
values | EMEA
Poland
stringclasses 11
values | EMEA
Portugal
stringclasses 11
values | EMEA
Qatar
PDPPL
stringclasses 37
values | EMEA
Russia
stringclasses 13
values | EMEA
Saudi Arabia
Critical Security Controls
stringclasses 105
values | EMEA
Saudi Arabia
SACS-002
stringclasses 96
values | EMEA
Saudi Arabia
SAMA CSFv1.0
stringclasses 36
values | EMEA
Saudi Arabia
ECC-12018
stringclasses 148
values | EMEA
Saudi Arabia
OTCC-1 2022
stringclasses 133
values | EMEA
Serbia
87/2018
stringclasses 46
values | EMEA
Slovak Republic
stringclasses 2
values | EMEA
South Africa
stringclasses 45
values | EMEA
Spain
stringclasses 10
values | EMEA
Spain
CCN-STIC 825
stringclasses 71
values | EMEA
Sweden
stringclasses 11
values | EMEA
Switzerland
stringclasses 8
values | EMEA
Turkey
stringclasses 8
values | EMEA
UAE
stringclasses 9
values | EMEA
UK
CAF v3.1
stringclasses 75
values | EMEA
UK
CAP 1850
stringclasses 16
values | EMEA
UK
Cyber Essentials
float64 1
5
⌀ | EMEA
UK
DPA
stringclasses 7
values | EMEA
UK
GDPR
stringclasses 38
values | APAC
Australia
Essential 8
ML 1
stringclasses 21
values | APAC
Australia
Essential 8
ML 2
stringclasses 30
values | APAC
Australia
Essential 8
ML 3
stringclasses 40
values | APAC
Australia
Privacy Act
stringclasses 11
values | APAC
Australian Privacy Principles
stringclasses 18
values | APAC
Australia
ISM 2022
stringlengths 4
214
⌀ | APAC
Australia
IoT Code of Practice
stringclasses 11
values | APAC
Australia
Prudential Standard CPS230
stringclasses 32
values | APAC
Australia
Prudential Standard CPS234
stringclasses 34
values | APAC
China
Data Security Law (DSL)
stringclasses 6
values | APAC
China
DNSIP
stringclasses 3
values | APAC
China
Privacy Law
stringclasses 57
values | APAC
Hong Kong
stringclasses 8
values | APAC
India
ITR
stringclasses 4
values | APAC
Indonesia
stringclasses 7
values | APAC
Japan
APPI
stringclasses 31
values | APAC
Japan
ISMAP
stringclasses 188
values | APAC
Malaysia
stringclasses 8
values | APAC
New Zealand Health ISF
stringclasses 22
values | APAC
New Zealand
NZISM 3.6
stringlengths 10
1.15k
⌀ | APAC
New Zealand Privacy Act of 2020
stringclasses 12
values | APAC
Philippines
stringclasses 12
values | APAC
Singapore
stringclasses 15
values | APAC
Singapore
Cyber Hygiene Practice
stringclasses 12
values | APAC
Singapore MAS
TRM 2021
stringclasses 166
values | APAC
South Korea
stringclasses 22
values | APAC
Taiwan
stringclasses 7
values | Americas
Argentina
stringclasses 14
values | Americas
Argentina
Reg 132-2018
stringclasses 24
values | Americas
Bahamas
stringclasses 6
values | Americas
Bermuda
BMACCC
stringclasses 36
values | Americas
Brazil
LGPD
stringclasses 27
values | Americas
Canada
CSAG
stringclasses 75
values | Americas
Canada
OSFI B-13
stringclasses 60
values | Americas
Canada
PIPEDA
stringclasses 14
values | Americas
Chile
stringclasses 9
values | Americas
Colombia
stringclasses 10
values | Americas
Costa Rica
stringclasses 8
values | Americas
Mexico
stringclasses 14
values | Americas
Peru
stringclasses 14
values | Americas
Uruguay
stringclasses 17
values | Minimum Security Requirements
MCR + DSR
float64 | Identify
Minimum Compliance Requirements (MCR)
float64 | Identify
Discretionary Security Requirements (DSR)
float64 | SCF-B
Business Mergers & Acquisitions
stringclasses 1
value | SCF-I
Cyber Insurance Duty of Care
stringclasses 23
values | SCF-E
Embedded
Technology
stringclasses 1
value | SCF-R
Ransomware Protection
stringclasses 1
value | Risk Threat Summary
stringlengths 13
230
⌀ | Risk
R-AC-1
stringclasses 1
value | Risk
R-AC-2
stringclasses 1
value | Risk
R-AC-3
stringclasses 1
value | Risk
R-AC-4
stringclasses 1
value | Risk
R-AM-1
stringclasses 1
value | Risk
R-AM-2
stringclasses 2
values | Risk
R-AM-3
stringclasses 1
value | Risk
R-BC-1
stringclasses 2
values | Risk
R-BC-2
stringclasses 2
values | Risk
R-BC-3
stringclasses 2
values | Risk
R-BC-4
stringclasses 2
values | Risk
R-BC-5
stringclasses 2
values | Risk
R-EX-1
stringclasses 2
values | Risk
R-EX-2
stringclasses 2
values | Risk
R-EX-3
stringclasses 2
values | Risk
R-EX-4
stringclasses 2
values | Risk
R-EX-5
stringclasses 2
values | Risk
R-EX-6
stringclasses 2
values | Risk
R-EX-7
stringclasses 2
values | Risk
R-GV-1
stringclasses 2
values | Risk
R-GV-2
stringclasses 2
values | Risk
R-GV-3
stringclasses 2
values | Risk
R-GV-4
stringclasses 2
values | Risk
R-GV-5
stringclasses 2
values | Risk
R-GV-6
stringclasses 2
values | Risk
R-GV-7
stringclasses 2
values | Risk
R-GV-8
stringclasses 2
values | Risk
R-IR-1
stringclasses 2
values | Risk
R-IR-2
stringclasses 2
values | Risk
R-IR-3
stringclasses 2
values | Risk
R-IR-4
stringclasses 1
value | Risk
R-SA-1
stringclasses 2
values | Risk
R-SA-2
stringclasses 2
values | Control Threat Summary
stringclasses 69
values | Threat
NT-1
stringclasses 1
value | Threat
NT-2
stringclasses 1
value | Threat
NT-3
stringclasses 1
value | Threat
NT-4
stringclasses 1
value | Threat
NT-5
stringclasses 1
value | Threat
NT-6
stringclasses 1
value | Threat
NT-7
stringclasses 1
value | Threat
NT-8
stringclasses 1
value | Threat
NT-9
stringclasses 1
value | Threat
NT-10
stringclasses 1
value | Threat
NT-11
stringclasses 1
value | Threat
NT-12
stringclasses 1
value | Threat
NT-13
stringclasses 1
value | Threat
NT-14
stringclasses 1
value | Threat
MT-1
stringclasses 1
value | Threat
MT-2
stringclasses 1
value | Threat
MT-3
stringclasses 1
value | Threat
MT-4
stringclasses 1
value | Threat
MT-5
stringclasses 1
value | Threat
MT-6
stringclasses 1
value | Threat
MT-7
stringclasses 1
value | Threat
MT-8
stringclasses 1
value | Threat
MT-9
stringclasses 1
value | Threat
MT-10
stringclasses 1
value | Threat
MT-11
stringclasses 1
value | Threat
MT-12
stringclasses 1
value | Threat
MT-13
stringclasses 1
value | Threat
MT-14
stringclasses 1
value | Threat
MT-15
stringclasses 1
value | Threat
MT-16
stringclasses 1
value | Errata
2023.4
stringclasses 30
values |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Network Security | Session Integrity | NET-09 | Mechanisms exist to protect the authenticity and integrity of communications sessions. | - PKI for non-repudiation | null | Does the organization protect the authenticity and integrity of communications sessions? | 8 | Protect | null | null | X | There is no evidence of a capability to protect the authenticity and integrity of communications sessions. | Network Security (NET) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• IT personnel use an informal process to design, build and maintain secure networks for test, development, staging and production environments, including the implementation of appropriate cybersecurity & data privacy controls.
• Administrative processes are used to configure boundary devices (e.g., firewalls, routers, etc.) to deny network traffic by default and allow network traffic by exception (e.g., deny all, permit by exception).
• Network monitoring is primarily reactive in nature. | Network Security (NET) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Network security management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for network security management.
• IT personnel define secure networking practices to protect the confidentiality, integrity, availability and safety of the organization’s technology assets, data and network(s).
• Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• Administrative processes are used to configure boundary devices (e.g., firewalls, routers, etc.) to deny network traffic by default and allow network traffic by exception (e.g., deny all, permit by exception).
• Network segmentation exists to implement separate network addresses (e.g., different subnets) to connect systems in different security domains (e.g., sensitive/regulated data environments). | Network Security (NET) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A Technology Infrastructure team, or similar function, defines centrally-managed network security controls for implementation across the enterprise.
• IT/cybersecurity architects work with the Technology Infrastructure team to implement a “layered defense” network architecture that provides a defense-in-depth approach for redundancy and risk reduction for network-based security controls, including wired and wireless networking.
• Administrative processes and technologies configure boundary devices (e.g., firewalls, routers, etc.) to deny network traffic by default and allow network traffic by exception (e.g., deny all, permit by exception).
• Technologies automate the Access Control Lists (ACLs) and similar rulesets review process to identify security issues and/ or misconfigurations.
• Network segmentation exists to implement separate network addresses (e.g., different subnets) to connect systems in different security domains (e.g., sensitive/regulated data environments). | See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to protect the authenticity and integrity of communications sessions. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to protect the authenticity and integrity of communications sessions. | null | null | null | null | null | null | null | null | null | null | null | null | null | CR 3.8 (7.10.1(a))
CR 3.8 (7.10.1(b))
CR 3.8 (7.10.1(c)) | null | null | null | null | null | null | null | null | null | null | null | null | T1071, T1071.001, T1071.002, T1071.003, T1071.004, T1185, T1535, T1550.004, T1557, T1557.001, T1557.002, T1562.006, T1562.009, T1563.001, T1573, T1573.001, T1573.002 | null | null | null | null | null | null | null | SC-23 | null | SC-23 | SC-23 | SC-23 | null | null | SC-23 | SC-23 | null | null | null | SC-23 | SC-23 | null | null | null | null | null | null | null | 3.13.15 | 3.13.15 | 3.13.15 | A.03.13.15 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | M.1.46 | null | null | null | null | null | null | null | null | null | null | SC.L2-3.13.15 | SC.L2-3.13.15 | null | SC.L2-3.13.15 | SC.L2-3.13.15 | SC-23 | null | null | null | null | null | null | null | SC-23 | null | SC-23 | SC-23 | null | SC-23 | null | SC-23 | SC-23 | null | null | null | null | null | null | null | null | null | null | SC-23 | null | null | 8-609 | null | null | null | null | null | null | null | null | SC-23 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | SC-23 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | PSS-06 | null | null | null | 17.25 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-IR-1
R-IR-4
R-SA-1 | R-AC-1 | R-AC-2 | R-AC-3 | R-AC-4 | R-AM-1 | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | R-EX-7 | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | null | null | null | R-IR-1 | null | null | R-IR-4 | R-SA-1 | null | NT-7
MT-1
MT-2
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | null | null | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Network Security | Invalidate Session Identifiers at Logout | NET-09.1 | Automated mechanisms exist to invalidate session identifiers upon user logout or other session termination. | null | null | Does the organization use automated mechanisms to invalidate session identifiers upon user logout or other session termination? | 5 | Protect | null | null | X | There is no evidence of a capability to invalidate session identifiers up on user logout or other session termination. | SP-CMM1 is N/A, since a structured process is required to invalidate session identifiers up on user logout or other session termination. | Network Security (NET) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Network security management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for network security management.
• IT personnel define secure networking practices to protect the confidentiality, integrity, availability and safety of the organization’s technology assets, data and network(s).
• Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• Administrative processes are used to configure boundary devices (e.g., firewalls, routers, etc.) to deny network traffic by default and allow network traffic by exception (e.g., deny all, permit by exception).
• Network segmentation exists to implement separate network addresses (e.g., different subnets) to connect systems in different security domains (e.g., sensitive/regulated data environments). | Network Security (NET) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A Technology Infrastructure team, or similar function, defines centrally-managed network security controls for implementation across the enterprise.
• IT/cybersecurity architects work with the Technology Infrastructure team to implement a “layered defense” network architecture that provides a defense-in-depth approach for redundancy and risk reduction for network-based security controls, including wired and wireless networking.
• Administrative processes and technologies configure boundary devices (e.g., firewalls, routers, etc.) to deny network traffic by default and allow network traffic by exception (e.g., deny all, permit by exception).
• Technologies automate the Access Control Lists (ACLs) and similar rulesets review process to identify security issues and/ or misconfigurations.
• Network segmentation exists to implement separate network addresses (e.g., different subnets) to connect systems in different security domains (e.g., sensitive/regulated data environments). | See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to invalidate session identifiers up on user logout or other session termination. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to invalidate session identifiers up on user logout or other session termination. | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | SC-23(1) | null | null | null | SC-23(1) | null | null | null | null | SC-23(1) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | M.1.46 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | SC-23(1) | null | null | SC-23(1) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | SC-23(1) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | PSS-06 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-IR-1
R-IR-4
R-SA-1 | R-AC-1 | R-AC-2 | R-AC-3 | R-AC-4 | R-AM-1 | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | R-EX-7 | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | null | null | null | R-IR-1 | null | null | R-IR-4 | R-SA-1 | null | NT-7
MT-1
MT-2
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | null | null | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | null | null | null |
Network Security | Unique System-Generated Session Identifiers | NET-09.2 | Automated mechanisms exist to generate and recognize unique session identifiers for each session. | null | null | Does the organization use automated mechanisms to generate and recognize unique session identifiers for each session? | 3 | Protect | null | null | X | There is no evidence of a capability to generate and recognize unique session identifiers for each session. | SP-CMM1 is N/A, since a structured process is required to generate and recognize unique session identifiers for each session. | SP-CMM2 is N/A, since a well-defined process is required to generate and recognize unique session identifiers for each session. | Network Security (NET) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A Technology Infrastructure team, or similar function, defines centrally-managed network security controls for implementation across the enterprise.
• IT/cybersecurity architects work with the Technology Infrastructure team to implement a “layered defense” network architecture that provides a defense-in-depth approach for redundancy and risk reduction for network-based security controls, including wired and wireless networking.
• Administrative processes and technologies configure boundary devices (e.g., firewalls, routers, etc.) to deny network traffic by default and allow network traffic by exception (e.g., deny all, permit by exception).
• Technologies automate the Access Control Lists (ACLs) and similar rulesets review process to identify security issues and/ or misconfigurations.
• Network segmentation exists to implement separate network addresses (e.g., different subnets) to connect systems in different security domains (e.g., sensitive/regulated data environments). | See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to generate and recognize unique session identifiers for each session. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to generate and recognize unique session identifiers for each session. | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | SC-23(3) | null | null | null | SC-23(3) | null | null | null | null | SC-23(3) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | SC-23(3) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | R-AM-3
R-IR-1
R-IR-2
R-SA-1 | null | null | null | null | null | null | R-AM-3 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | R-IR-1 | R-IR-2 | null | null | R-SA-1 | null | NT-7
MT-1
MT-2
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | null | null | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | null | null | null |
Network Security | Domain Name Service (DNS) Resolution | NET-10 | Mechanisms exist to ensure Domain Name Service (DNS) resolution is designed, implemented and managed to protect the security of name / address resolution. | null | null | Does the organization ensure Domain Name Service (DNS) resolution is designed, implemented and managed to protect the security of name / address resolution? | 10 | Protect | null | X | X | There is no evidence of a capability to ensure Domain Name Service (DNS) resolution is designed, implemented and managed to protect the security of name / address resolution. | Network Security (NET) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• IT personnel use an informal process to design, build and maintain secure networks for test, development, staging and production environments, including the implementation of appropriate cybersecurity & data privacy controls.
• Administrative processes are used to configure boundary devices (e.g., firewalls, routers, etc.) to deny network traffic by default and allow network traffic by exception (e.g., deny all, permit by exception).
• Network monitoring is primarily reactive in nature. | Network Security (NET) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Network security management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for network security management.
• IT personnel define secure networking practices to protect the confidentiality, integrity, availability and safety of the organization’s technology assets, data and network(s).
• Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• Administrative processes are used to configure boundary devices (e.g., firewalls, routers, etc.) to deny network traffic by default and allow network traffic by exception (e.g., deny all, permit by exception).
• Network segmentation exists to implement separate network addresses (e.g., different subnets) to connect systems in different security domains (e.g., sensitive/regulated data environments).
• Technologies are configured to perform data origin authentication and data integrity verification on the Domain Name Service (DNS) resolution responses received from authoritative sources when requested by client systems. | Network Security (NET) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A Technology Infrastructure team, or similar function, defines centrally-managed network security controls for implementation across the enterprise.
• IT/cybersecurity architects work with the Technology Infrastructure team to implement a “layered defense” network architecture that provides a defense-in-depth approach for redundancy and risk reduction for network-based security controls, including wired and wireless networking.
• Administrative processes and technologies configure boundary devices (e.g., firewalls, routers, etc.) to deny network traffic by default and allow network traffic by exception (e.g., deny all, permit by exception).
• Technologies automate the Access Control Lists (ACLs) and similar rulesets review process to identify security issues and/ or misconfigurations.
• Network segmentation exists to implement separate network addresses (e.g., different subnets) to connect systems in different security domains (e.g., sensitive/regulated data environments).
• Technologies are configured to perform data origin authentication and data integrity verification on the Domain Name Service (DNS) resolution responses received from authoritative sources when requested by client systems. | Network Security (NET) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to ensure Domain Name Service (DNS) resolution is designed, implemented and managed to protect the security of name / address resolution. | null | null | null | 4.9 | null | 4.9 | 4.9 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | T1071, T1071.001, T1071.002, T1071.003, T1071.004, T1553.004, T1566, T1566.001, T1566.002, T1568, T1568.002, T1598, T1598.002, T1598.003 | null | null | null | null | null | null | null | SC-20
SC-20(2) | SC-20 | SC-20 | SC-20 | SC-20
SC-20(2) | null | SC-20 | SC-20 | SC-20 | SC-20(2) | null | SC-20 | SC-20 | SC-20 | null | null | null | null | null | null | null | NFO - SC-20 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | N.7 | null | null | null | null | null | null | KIM:SG5.SP3 | null | null | null | null | null | null | null | null | SC-20 | null | null | null | null | null | null | null | SC-20 | SC-20 | SC-20 | SC-20 | SC-20 | SC-20 | SC-20 | SC-20 | SC-20 | SC-20 | null | null | null | null | null | null | null | null | 6.L.B | SC-20
SC-20(2 | null | null | null | null | null | null | null | null | null | SC-20 | SC-20 | SC-20 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | SC-20 | SC-20 | SC-20 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 9.6 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 2-4-3-5
2-5-3-7 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0574
1183
1151
0861
1026
1027
1540
1799
1782 | null | null | null | null | null | null | null | null | null | null | null | null | null | 15.2.20.C.01
15.2.20.C.02
15.2.20.C.03
15.2.20.C.04
15.2.20.C.05 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | null | null | null | R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-7
R-GV-1
R-GV-2
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-IR-1
R-IR-3
R-IR-4
R-SA-1 | null | null | null | null | null | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | null | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | R-EX-7 | R-GV-1 | R-GV-2 | null | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | null | R-IR-1 | null | R-IR-3 | R-IR-4 | R-SA-1 | null | NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | NT-9 | NT-10 | NT-11 | NT-12 | NT-13 | NT-14 | MT-1 | MT-2 | MT-3 | MT-4 | MT-5 | MT-6 | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Network Security | Architecture & Provisioning for Name / Address Resolution Service | NET-10.1 | Mechanisms exist to ensure systems that collectively provide Domain Name Service (DNS) resolution service are fault-tolerant and implement internal/external role separation. | null | null | Does the organization ensure systems that collectively provide Domain Name Service (DNS) resolution service are fault-tolerant and implement internal/external role separation? | 9 | Protect | null | null | X | There is no evidence of a capability to ensure systems that collectively provide Domain Name Service (DNS) resolution service are fault-tolerant and implement internal/external role separation. | SP-CMM1 is N/A, since a structured process is required to ensure systems that collectively provide Domain Name Service (DNS) resolution service are fault-tolerant and implement internal/external role separation. | Network Security (NET) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Network security management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for network security management.
• IT personnel define secure networking practices to protect the confidentiality, integrity, availability and safety of the organization’s technology assets, data and network(s).
• Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• Administrative processes are used to configure boundary devices (e.g., firewalls, routers, etc.) to deny network traffic by default and allow network traffic by exception (e.g., deny all, permit by exception).
• Network segmentation exists to implement separate network addresses (e.g., different subnets) to connect systems in different security domains (e.g., sensitive/regulated data environments).
• Administrative processes ensure Domain Name Service (DNS) resolution is designed, implemented and managed to protect the security of name / address resolution. | Network Security (NET) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A Technology Infrastructure team, or similar function, defines centrally-managed network security controls for implementation across the enterprise.
• IT/cybersecurity architects work with the Technology Infrastructure team to implement a “layered defense” network architecture that provides a defense-in-depth approach for redundancy and risk reduction for network-based security controls, including wired and wireless networking.
• Administrative processes and technologies configure boundary devices (e.g., firewalls, routers, etc.) to deny network traffic by default and allow network traffic by exception (e.g., deny all, permit by exception).
• Technologies automate the Access Control Lists (ACLs) and similar rulesets review process to identify security issues and/ or misconfigurations.
• Network segmentation exists to implement separate network addresses (e.g., different subnets) to connect systems in different security domains (e.g., sensitive/regulated data environments).
• Administrative processes ensure Domain Name Service (DNS) resolution is designed, implemented and managed to protect the security of name / address resolution. | See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to ensure systems that collectively provide Domain Name Service (DNS) resolution service are fault-tolerant and implement internal/external role separation. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to ensure systems that collectively provide Domain Name Service (DNS) resolution service are fault-tolerant and implement internal/external role separation. | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | T1071, T1071.001, T1071.002, T1071.003, T1071.004, T1568, T1568.002 | null | null | null | null | null | null | null | SC-22 | SC-22 | SC-22 | SC-22 | SC-22 | null | SC-22 | SC-22 | SC-22 | null | null | SC-22 | SC-22 | SC-22 | null | null | null | null | null | null | null | NFO - SC-22 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | N.7 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | SC-22 | null | null | null | null | null | null | null | SC-22 | SC-22 | SC-22 | SC-22 | SC-22 | SC-22 | SC-22 | SC-22 | SC-22 | SC-22 | null | null | null | null | null | null | null | null | 6.L.B | SC-22 | null | null | null | null | null | null | null | null | null | SC-22 | SC-22 | SC-22 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | SC-22 | SC-22 | SC-22 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 9.7 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 15.2.22.C.01 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-7
R-GV-1
R-GV-2
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-IR-1
R-IR-3
R-IR-4
R-SA-1 | null | null | null | null | null | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | null | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | R-EX-7 | R-GV-1 | R-GV-2 | null | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | null | R-IR-1 | null | R-IR-3 | R-IR-4 | R-SA-1 | null | NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | NT-9 | NT-10 | NT-11 | NT-12 | NT-13 | NT-14 | MT-1 | MT-2 | MT-3 | MT-4 | MT-5 | MT-6 | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Network Security | Secure Name / Address Resolution Service (Recursive or Caching Resolver) | NET-10.2 | Mechanisms exist to perform data origin authentication and data integrity verification on the Domain Name Service (DNS) resolution responses received from authoritative sources when requested by client systems. | null | null | Does the organization perform data origin authentication and data integrity verification on the Domain Name Service (DNS) resolution responses received from authoritative sources when requested by client systems? | 9 | Protect | null | null | X | There is no evidence of a capability to perform data origin authentication and data integrity verification on the Domain Name Service (DNS) resolution responses received from authoritative sources when requested by client systems. | SP-CMM1 is N/A, since a structured process is required to perform data origin authentication and data integrity verification on the Domain Name Service (DNS) resolution responses received from authoritative sources when requested by client systems. | Network Security (NET) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Network security management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for network security management.
• IT personnel define secure networking practices to protect the confidentiality, integrity, availability and safety of the organization’s technology assets, data and network(s).
• Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• Administrative processes are used to configure boundary devices (e.g., firewalls, routers, etc.) to deny network traffic by default and allow network traffic by exception (e.g., deny all, permit by exception).
• Network segmentation exists to implement separate network addresses (e.g., different subnets) to connect systems in different security domains (e.g., sensitive/regulated data environments).
• Administrative processes ensure systems that collectively provide Domain Name Service (DNS) resolution service for are fault-tolerant and implement internal/external role separation. | Network Security (NET) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A Technology Infrastructure team, or similar function, defines centrally-managed network security controls for implementation across the enterprise.
• IT/cybersecurity architects work with the Technology Infrastructure team to implement a “layered defense” network architecture that provides a defense-in-depth approach for redundancy and risk reduction for network-based security controls, including wired and wireless networking.
• Administrative processes and technologies configure boundary devices (e.g., firewalls, routers, etc.) to deny network traffic by default and allow network traffic by exception (e.g., deny all, permit by exception).
• Technologies automate the Access Control Lists (ACLs) and similar rulesets review process to identify security issues and/ or misconfigurations.
• Network segmentation exists to implement separate network addresses (e.g., different subnets) to connect systems in different security domains (e.g., sensitive/regulated data environments).
• Administrative processes ensure systems that collectively provide Domain Name Service (DNS) resolution service for are fault-tolerant and implement internal/external role separation. | See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to perform data origin authentication and data integrity verification on the Domain Name Service (DNS) resolution responses received from authoritative sources when requested by client systems. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to perform data origin authentication and data integrity verification on the Domain Name Service (DNS) resolution responses received from authoritative sources when requested by client systems. | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | T1071, T1071.001, T1071.002, T1071.003, T1071.004, T1568, T1568.002 | null | null | null | null | null | null | null | SC-21 | SC-21 | SC-21 | SC-21 | SC-21 | null | SC-21 | SC-21 | SC-21 | null | null | SC-21 | SC-21 | SC-21 | null | null | null | null | null | null | null | NFO - SC-21 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | P.2.3.7
| null | null | null | null | null | null | KIM:SG5.SP3 | null | null | null | null | null | null | null | null | SC-21 | null | null | null | null | null | null | null | SC-21 | SC-21 | SC-21 | SC-21 | SC-21 | SC-21 | SC-21 | SC-21 | SC-21 | SC-21 | null | null | null | null | null | null | null | null | 6.L.B | SC-21 | null | null | null | null | null | null | null | null | null | SC-21 | SC-21 | SC-21 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | SC-21 | SC-21 | SC-21 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 9.7 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | null | null | null | R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-7
R-GV-1
R-GV-2
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-IR-1
R-IR-3
R-IR-4
R-SA-1 | null | null | null | null | null | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | null | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | R-EX-7 | R-GV-1 | R-GV-2 | null | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | null | R-IR-1 | null | R-IR-3 | R-IR-4 | R-SA-1 | null | NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | NT-9 | NT-10 | NT-11 | NT-12 | NT-13 | NT-14 | MT-1 | MT-2 | MT-3 | MT-4 | MT-5 | MT-6 | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Network Security | Sender Policy Framework (SPF) | NET-10.3 | Mechanisms exist to validate the legitimacy of email communications through configuring a Domain Naming Service (DNS) Sender Policy Framework (SPF) record to specify the IP addresses and/or hostnames that are authorized to send email from the specified domain. | null | null | Does the organization validate the legitimacy of email communications through configuring a Domain Naming Service (DNS) Sender Policy Framework (SPF) record to specify the IP addresses and/or hostnames that are authorized to send email from the specified domain? | 8 | Protect | null | X | X | There is no evidence of a capability to validate the legitimacy of email communications through configuring a Domain Naming Service (DNS) Sender Policy Framework (SPF) record to specify the IP addresses and/ or hostnames that are authorized to send email from the specified domain. | SP-CMM1 is N/A, since a structured process is required to validate the legitimacy of email communications through configuring a Domain Naming Service (DNS) Sender Policy Framework (SPF) record to specify the IP addresses and/ or hostnames that are authorized to send email from the specified domain. | Network Security (NET) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Network security management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for network security management.
• IT personnel define secure networking practices to protect the confidentiality, integrity, availability and safety of the organization’s technology assets, data and network(s).
• Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• Administrative processes are used to configure boundary devices (e.g., firewalls, routers, etc.) to deny network traffic by default and allow network traffic by exception (e.g., deny all, permit by exception).
• Network segmentation exists to implement separate network addresses (e.g., different subnets) to connect systems in different security domains (e.g., sensitive/regulated data environments). | Network Security (NET) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A Technology Infrastructure team, or similar function, defines centrally-managed network security controls for implementation across the enterprise.
• IT/cybersecurity architects work with the Technology Infrastructure team to implement a “layered defense” network architecture that provides a defense-in-depth approach for redundancy and risk reduction for network-based security controls, including wired and wireless networking.
• Administrative processes and technologies configure boundary devices (e.g., firewalls, routers, etc.) to deny network traffic by default and allow network traffic by exception (e.g., deny all, permit by exception).
• Technologies automate the Access Control Lists (ACLs) and similar rulesets review process to identify security issues and/ or misconfigurations.
• Network segmentation exists to implement separate network addresses (e.g., different subnets) to connect systems in different security domains (e.g., sensitive/regulated data environments). | See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to validate the legitimacy of email communications through configuring a Domain Naming Service (DNS) Sender Policy Framework (SPF) record to specify the IP addresses and/ or hostnames that are authorized to send email from the specified domain. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to validate the legitimacy of email communications through configuring a Domain Naming Service (DNS) Sender Policy Framework (SPF) record to specify the IP addresses and/ or hostnames that are authorized to send email from the specified domain. | null | null | null | 9.5 | null | 9.5 | 9.5 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | D.3.4 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | TPC-13
TPC-14
TPC-15 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0574
1183
1151
1799 | null | null | null | null | null | null | null | null | null | null | null | null | null | 15.2.20.C.01
15.2.20.C.02
15.2.20.C.03
15.2.20.C.04
15.2.20.C.05 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Lockton | null | null | R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-7
R-GV-1
R-GV-2
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-IR-1
R-IR-3
R-IR-4
R-SA-1 | null | null | null | null | null | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | null | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | R-EX-7 | R-GV-1 | R-GV-2 | null | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | null | R-IR-1 | null | R-IR-3 | R-IR-4 | R-SA-1 | null | NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | NT-9 | NT-10 | NT-11 | NT-12 | NT-13 | NT-14 | MT-1 | MT-2 | MT-3 | MT-4 | MT-5 | MT-6 | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Network Security | Domain Registrar Security | NET-10.4 | Mechanisms exist to lock the domain name registrar to prevent a denial of service caused by unauthorized deletion, transfer or other unauthorized modification of a domain’s registration details. | null | null | Does the organization lock the domain name registrar to prevent a denial of service caused by unauthorized deletion, transfer or other unauthorized modification of a domain’s registration details? | 9 | Protect | X | X | X | There is no evidence of a capability to lock the domain name registrar to prevent a denial of service caused by unauthorized deletion, transfer or other unauthorized modification of a domain’s registration details. | SP-CMM1 is N/A, since a structured process is required to lock the domain name registrar to prevent a denial of service caused by unauthorized deletion, transfer or other unauthorized modification of a domain’s registration details. | Network Security (NET) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Network security management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for network security management.
• IT personnel define secure networking practices to protect the confidentiality, integrity, availability and safety of the organization’s technology assets, data and network(s).
• Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• Administrative processes are used to configure boundary devices (e.g., firewalls, routers, etc.) to deny network traffic by default and allow network traffic by exception (e.g., deny all, permit by exception).
• Network segmentation exists to implement separate network addresses (e.g., different subnets) to connect systems in different security domains (e.g., sensitive/regulated data environments). | Network Security (NET) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A Technology Infrastructure team, or similar function, defines centrally-managed network security controls for implementation across the enterprise.
• IT/cybersecurity architects work with the Technology Infrastructure team to implement a “layered defense” network architecture that provides a defense-in-depth approach for redundancy and risk reduction for network-based security controls, including wired and wireless networking.
• Administrative processes and technologies configure boundary devices (e.g., firewalls, routers, etc.) to deny network traffic by default and allow network traffic by exception (e.g., deny all, permit by exception).
• Technologies automate the Access Control Lists (ACLs) and similar rulesets review process to identify security issues and/ or misconfigurations.
• Network segmentation exists to implement separate network addresses (e.g., different subnets) to connect systems in different security domains (e.g., sensitive/regulated data environments). | See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to lock the domain name registrar to prevent a denial of service caused by unauthorized deletion, transfer or other unauthorized modification of a domain’s registration details. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to lock the domain name registrar to prevent a denial of service caused by unauthorized deletion, transfer or other unauthorized modification of a domain’s registration details. | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 1.3.2.4 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 1432 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-7
R-GV-1
R-GV-2
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-IR-1
R-IR-3
R-IR-4
R-SA-1 | null | null | null | null | null | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | null | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | R-EX-7 | R-GV-1 | R-GV-2 | null | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | null | R-IR-1 | null | R-IR-3 | R-IR-4 | R-SA-1 | null | NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | NT-9 | NT-10 | NT-11 | NT-12 | NT-13 | NT-14 | MT-1 | MT-2 | MT-3 | MT-4 | MT-5 | MT-6 | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Network Security | Out-of-Band Channels | NET-11 | Mechanisms exist to utilize out-of-band channels for the electronic transmission of information and/or the physical shipment of system components or devices to authorized individuals. | - Signature delivery (courier service) | null | Does the organization utilize out-of-band channels for the electronic transmission of information and/or the physical shipment of system components or devices to authorized individuals? | 9 | Protect | null | X | X | There is no evidence of a capability to utilize out-of-band channels for the electronic transmission of information and/ or the physical shipment of system components or devices to authorized individuals. | Network Security (NET) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• IT personnel use an informal process to design, build and maintain secure networks for test, development, staging and production environments, including the implementation of appropriate cybersecurity & data privacy controls.
• Administrative processes are used to configure boundary devices (e.g., firewalls, routers, etc.) to deny network traffic by default and allow network traffic by exception (e.g., deny all, permit by exception).
• Network monitoring is primarily reactive in nature. | Network Security (NET) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Network security management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for network security management.
• IT personnel define secure networking practices to protect the confidentiality, integrity, availability and safety of the organization’s technology assets, data and network(s).
• Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• Administrative processes are used to configure boundary devices (e.g., firewalls, routers, etc.) to deny network traffic by default and allow network traffic by exception (e.g., deny all, permit by exception).
• Network segmentation exists to implement separate network addresses (e.g., different subnets) to connect systems in different security domains (e.g., sensitive/regulated data environments).
• Administrative processes use out-of-band channels for the electronic transmission of information and/ or the physical shipment of system components or devices to authorized individuals. | Network Security (NET) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A Technology Infrastructure team, or similar function, defines centrally-managed network security controls for implementation across the enterprise.
• IT/cybersecurity architects work with the Technology Infrastructure team to implement a “layered defense” network architecture that provides a defense-in-depth approach for redundancy and risk reduction for network-based security controls, including wired and wireless networking.
• Administrative processes and technologies configure boundary devices (e.g., firewalls, routers, etc.) to deny network traffic by default and allow network traffic by exception (e.g., deny all, permit by exception).
• Technologies automate the Access Control Lists (ACLs) and similar rulesets review process to identify security issues and/ or misconfigurations.
• Network segmentation exists to implement separate network addresses (e.g., different subnets) to connect systems in different security domains (e.g., sensitive/regulated data environments).
• Administrative processes use out-of-band channels for the electronic transmission of information and/ or the physical shipment of system components or devices to authorized individuals. | Network Security (NET) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to utilize out-of-band channels for the electronic transmission of information and/ or the physical shipment of system components or devices to authorized individuals. | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | T1071, T1071.001, T1071.002, T1071.003, T1071.004 | null | null | null | null | null | null | null | SC-37
SC-37(1) | null | null | null | SC-37
SC-37(1) | null | null | null | null | SC-37
SC-37(1) | null | null | null | null | null | SC-37(1) | null | null | null | SC-37(1) | SC-37(1) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | D.3.4 | null | null | null | null | null | null | COMM:SG2.SP1
EC:SG3.SP2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Art 22 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | null | null | null | R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-3
R-BC-2
R-BC-5
R-EX-7
R-GV-1
R-GV-2
R-GV-4
R-GV-5 | R-AC-1 | R-AC-2 | R-AC-3 | R-AC-4 | null | null | R-AM-3 | null | R-BC-2 | null | null | R-BC-5 | null | null | null | null | null | null | R-EX-7 | R-GV-1 | R-GV-2 | null | R-GV-4 | R-GV-5 | null | null | null | null | null | null | null | null | null | NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | NT-9 | NT-10 | NT-11 | NT-12 | NT-13 | NT-14 | MT-1 | MT-2 | MT-3 | MT-4 | MT-5 | MT-6 | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Network Security | Safeguarding Data Over Open Networks | NET-12 | Cryptographic mechanisms exist to implement strong cryptography and security protocols to safeguard sensitive/regulated data during transmission over open, public networks. | null | null | Are cryptographic mechanisms utilized to implement strong cryptography and security protocols to safeguard sensitive/regulated data during transmission over open, public networks? | 8 | Protect | X | X | X | There is no evidence of a capability to Cryptographic implement strong cryptography and security protocols to safeguard sensitive/regulated data during transmission over open, public networks. | Network Security (NET) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• IT personnel use an informal process to design, build and maintain secure networks for test, development, staging and production environments, including the implementation of appropriate cybersecurity & data privacy controls.
• Administrative processes are used to configure boundary devices (e.g., firewalls, routers, etc.) to deny network traffic by default and allow network traffic by exception (e.g., deny all, permit by exception).
• Network monitoring is primarily reactive in nature. | Network Security (NET) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Network security management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for network security management.
• IT personnel define secure networking practices to protect the confidentiality, integrity, availability and safety of the organization’s technology assets, data and network(s).
• Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• Administrative processes are used to configure boundary devices (e.g., firewalls, routers, etc.) to deny network traffic by default and allow network traffic by exception (e.g., deny all, permit by exception).
• Network segmentation exists to implement separate network addresses (e.g., different subnets) to connect systems in different security domains (e.g., sensitive/regulated data environments). | Network Security (NET) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A Technology Infrastructure team, or similar function, defines centrally-managed network security controls for implementation across the enterprise.
• IT/cybersecurity architects work with the Technology Infrastructure team to implement a “layered defense” network architecture that provides a defense-in-depth approach for redundancy and risk reduction for network-based security controls, including wired and wireless networking.
• Administrative processes and technologies configure boundary devices (e.g., firewalls, routers, etc.) to deny network traffic by default and allow network traffic by exception (e.g., deny all, permit by exception).
• Technologies automate the Access Control Lists (ACLs) and similar rulesets review process to identify security issues and/ or misconfigurations.
• Network segmentation exists to implement separate network addresses (e.g., different subnets) to connect systems in different security domains (e.g., sensitive/regulated data environments). | See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to Cryptographic implement strong cryptography and security protocols to safeguard sensitive/regulated data during transmission over open, public networks. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to Cryptographic implement strong cryptography and security protocols to safeguard sensitive/regulated data during transmission over open, public networks. | CC6.6 | CC6.6-POF2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | AC-2
AC-3
AC-5
SI-3
SI-4
SI-5
SI-7
SI-10 | null | AC-2
AC-3
SI-3
SI-4
SI-5 | AC-2
AC-3
AC-5
SI-3
SI-4
SI-5
SI-7
SI-10 | AC-2
AC-3
AC-5
SI-3
SI-4
SI-5
SI-7
SI-10 | null | null | AC-2
AC-3
SI-3
SI-4
SI-5 | AC-2
AC-3
AC-5
SI-3
SI-4
SI-5
SI-7
SI-10 | AC-2
AC-3
AC-5
SI-3
SI-4
SI-5
SI-7
SI-10 | null | AC-2
AC-3
AC-5
SI-3
SI-4
SI-5
SI-7 | AC-2
AC-3
AC-5
SI-3
SI-4
SI-5
SI-7 | AC-2
AC-3
AC-5
SI-3
SI-4
SI-5
SI-7 | SI-4
SI-5
SI-7 | AC-2
AC-3
AC-5
SI-3
SI-4
SI-5
SI-7 | AC-2
AC-3
AC-5
SI-3
SI-4
SI-5
SI-7 | null | null | null | null | null | null | null | null | null | 4.1
4.1.1 | 4.1
4.2.1 | null | 4.2.1 | null | null | 4.2.1 | null | 4.2.1 | 4.2.1 | null | D.5.2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | AC-2
AC-3
AC-5
SI-3
SI-4
SI-5
SI-7
SI-10 | null | null | null | null | null | null | null | null | 5.8 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | AC-2
AC-3
AC-5
SI-3
SI-4
SI-5 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 8.4
8.6
9.20
13.6 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | null | null | x | R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-IR-1
R-IR-4
R-SA-1 | R-AC-1 | R-AC-2 | R-AC-3 | R-AC-4 | R-AM-1 | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | R-EX-7 | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | null | null | null | R-IR-1 | null | null | R-IR-4 | R-SA-1 | null | NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | NT-9 | NT-10 | NT-11 | NT-12 | NT-13 | NT-14 | MT-1 | MT-2 | MT-3 | MT-4 | MT-5 | MT-6 | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Network Security | Wireless Link Protection | NET-12.1 | Mechanisms exist to protect external and internal wireless links from signal parameter attacks through monitoring for unauthorized wireless connections, including scanning for unauthorized wireless access points and taking appropriate action, if an unauthorized connection is discovered. | null | null | Does the organization protect external and internal wireless links from signal parameter attacks through monitoring for unauthorized wireless connections, including scanning for unauthorized wireless access points and taking appropriate action, if an unauthorized connection is discovered? | 8 | Protect | null | null | X | There is no evidence of a capability to protect external and internal wireless links from signal parameter attacks through monitoring for unauthorized wireless connections, including scanning for unauthorized wireless access points and taking appropriate action, if an unauthorized connection is discovered. | Network Security (NET) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• IT personnel use an informal process to design, build and maintain secure networks for test, development, staging and production environments, including the implementation of appropriate cybersecurity & data privacy controls.
• Administrative processes are used to configure boundary devices (e.g., firewalls, routers, etc.) to deny network traffic by default and allow network traffic by exception (e.g., deny all, permit by exception).
• Network monitoring is primarily reactive in nature. | Network Security (NET) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Network security management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for network security management.
• IT personnel define secure networking practices to protect the confidentiality, integrity, availability and safety of the organization’s technology assets, data and network(s).
• Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• Administrative processes are used to configure boundary devices (e.g., firewalls, routers, etc.) to deny network traffic by default and allow network traffic by exception (e.g., deny all, permit by exception).
• Network segmentation exists to implement separate network addresses (e.g., different subnets) to connect systems in different security domains (e.g., sensitive/regulated data environments).
• Technologies are configured to protect external and internal wireless links from signal parameter attacks through monitoring for unauthorized wireless connections, including scanning for unauthorized wireless access points and taking appropriate action, if an unauthorized connection is discovered. | Network Security (NET) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A Technology Infrastructure team, or similar function, defines centrally-managed network security controls for implementation across the enterprise.
• IT/cybersecurity architects work with the Technology Infrastructure team to implement a “layered defense” network architecture that provides a defense-in-depth approach for redundancy and risk reduction for network-based security controls, including wired and wireless networking.
• Administrative processes and technologies configure boundary devices (e.g., firewalls, routers, etc.) to deny network traffic by default and allow network traffic by exception (e.g., deny all, permit by exception).
• Technologies automate the Access Control Lists (ACLs) and similar rulesets review process to identify security issues and/ or misconfigurations.
• Network segmentation exists to implement separate network addresses (e.g., different subnets) to connect systems in different security domains (e.g., sensitive/regulated data environments).
• Technologies are configured to protect external and internal wireless links from signal parameter attacks through monitoring for unauthorized wireless connections, including scanning for unauthorized wireless access points and taking appropriate action, if an unauthorized connection is discovered. | See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to protect external and internal wireless links from signal parameter attacks through monitoring for unauthorized wireless connections, including scanning for unauthorized wireless access points and taking appropriate action, if an unauthorized connection is discovered. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to protect external and internal wireless links from signal parameter attacks through monitoring for unauthorized wireless connections, including scanning for unauthorized wireless access points and taking appropriate action, if an unauthorized connection is discovered. | CC6.6 | null | null | null | null | null | null | null | null | null | SWS-05
SWS-07
SWS-08 | null | null | NDR 2.13 (15.3.1) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | SC-40 | null | null | null | SC-40 | null | null | null | null | SC-40 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 11.1
11.1.1
11.1.2 | 1.2.3
1.3.3
2.3
2.3.1
2.3.2
4.2.1.2
11.2
11.2.1
11.2.2
12.10.1
12.10.5 | 12.10.1 | 1.2.3
1.3.3
12.10.1 | 12.10.1 | 1.2.3
1.3.3
2.3.1
2.3.2
12.10.1 | 1.3.3
2.3.1
2.3.2
4.2.1.2
11.2.1
11.2.2
12.10.1 | 1.3.3
2.3.1
2.3.2
4.2.1.2
12.10.1 | 1.2.3
1.3.3
2.3.1
2.3.2
4.2.1.2
11.2.1
11.2.2
12.10.1
12.10.5 | 1.2.3
1.3.3
2.3.1
2.3.2
4.2.1.2
11.2.1
11.2.2
12.10.1
12.10.5 | 12.10.1 | N.8.5 | null | null | null | null | null | null | EC:SG2.SP2
TM:SG2.SP2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | null | null | null | R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-IR-1
R-IR-4
R-SA-1 | R-AC-1 | R-AC-2 | R-AC-3 | R-AC-4 | R-AM-1 | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | R-EX-7 | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | null | null | null | R-IR-1 | null | null | R-IR-4 | R-SA-1 | null | NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | NT-9 | NT-10 | NT-11 | NT-12 | NT-13 | NT-14 | MT-1 | MT-2 | MT-3 | MT-4 | MT-5 | MT-6 | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Network Security | End-User Messaging Technologies | NET-12.2 | Mechanisms exist to prohibit the transmission of unprotected sensitive/regulated data by end-user messaging technologies. | - Acceptable Use Policy (AUP)
- Data Loss Prevention (DLP) | null | Does the organization prohibit the transmission of unprotected sensitive/regulated data by end-user messaging technologies? | 9 | Protect | null | X | X | There is no evidence of a capability to prohibit the transmission of unprotected sensitive/regulated data by end-user messaging technologies. | Network Security (NET) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• IT personnel use an informal process to design, build and maintain secure networks for test, development, staging and production environments, including the implementation of appropriate cybersecurity & data privacy controls.
• Administrative processes are used to configure boundary devices (e.g., firewalls, routers, etc.) to deny network traffic by default and allow network traffic by exception (e.g., deny all, permit by exception).
• Network monitoring is primarily reactive in nature. | Network Security (NET) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Network security management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for network security management.
• IT personnel define secure networking practices to protect the confidentiality, integrity, availability and safety of the organization’s technology assets, data and network(s).
• Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• Administrative processes are used to configure boundary devices (e.g., firewalls, routers, etc.) to deny network traffic by default and allow network traffic by exception (e.g., deny all, permit by exception).
• Network segmentation exists to implement separate network addresses (e.g., different subnets) to connect systems in different security domains (e.g., sensitive/regulated data environments). | Network Security (NET) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A Technology Infrastructure team, or similar function, defines centrally-managed network security controls for implementation across the enterprise.
• IT/cybersecurity architects work with the Technology Infrastructure team to implement a “layered defense” network architecture that provides a defense-in-depth approach for redundancy and risk reduction for network-based security controls, including wired and wireless networking.
• Administrative processes and technologies configure boundary devices (e.g., firewalls, routers, etc.) to deny network traffic by default and allow network traffic by exception (e.g., deny all, permit by exception).
• Technologies automate the Access Control Lists (ACLs) and similar rulesets review process to identify security issues and/ or misconfigurations.
• Network segmentation exists to implement separate network addresses (e.g., different subnets) to connect systems in different security domains (e.g., sensitive/regulated data environments). | See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to prohibit the transmission of unprotected sensitive/regulated data by end-user messaging technologies. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to prohibit the transmission of unprotected sensitive/regulated data by end-user messaging technologies. | CC6.71 | CC6.7-POF1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 4.2 | 4.2.2 | null | 4.2.2 | null | null | 4.2.2 | null | 4.2.2 | 4.2.2 | null | D.10.8 | null | null | null | null | null | null | null | 8.3 | null | null | null | null | null | null | null | SC-ACA-1
SC-ACA-2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 3.3.2
3.3.3
3.3.4 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-4
R-SA-1
R-SA-2 | R-AC-1 | R-AC-2 | R-AC-3 | R-AC-4 | R-AM-1 | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | R-EX-7 | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | R-GV-8 | R-IR-1 | null | null | R-IR-4 | R-SA-1 | R-SA-2 | NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | NT-9 | NT-10 | NT-11 | NT-12 | NT-13 | NT-14 | MT-1 | MT-2 | MT-3 | MT-4 | MT-5 | MT-6 | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Network Security | Electronic Messaging | NET-13 | Mechanisms exist to protect the confidentiality, integrity and availability of electronic messaging communications. | null | null | Does the organization protect the confidentiality, integrity and availability of electronic messaging communications? | 10 | Protect | null | X | X | There is no evidence of a capability to protect the confidentiality, integrity and availability of electronic messaging communications. | Network Security (NET) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• IT personnel use an informal process to design, build and maintain secure networks for test, development, staging and production environments, including the implementation of appropriate cybersecurity & data privacy controls.
• Administrative processes are used to configure boundary devices (e.g., firewalls, routers, etc.) to deny network traffic by default and allow network traffic by exception (e.g., deny all, permit by exception).
• Network monitoring is primarily reactive in nature. | Network Security (NET) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Network security management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for network security management.
• IT personnel define secure networking practices to protect the confidentiality, integrity, availability and safety of the organization’s technology assets, data and network(s).
• Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• Administrative processes are used to configure boundary devices (e.g., firewalls, routers, etc.) to deny network traffic by default and allow network traffic by exception (e.g., deny all, permit by exception).
• Network segmentation exists to implement separate network addresses (e.g., different subnets) to connect systems in different security domains (e.g., sensitive/regulated data environments).
• Technologies are configured to protect information involved in electronic messaging communications. | Network Security (NET) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A Technology Infrastructure team, or similar function, defines centrally-managed network security controls for implementation across the enterprise.
• IT/cybersecurity architects work with the Technology Infrastructure team to implement a “layered defense” network architecture that provides a defense-in-depth approach for redundancy and risk reduction for network-based security controls, including wired and wireless networking.
• Administrative processes and technologies configure boundary devices (e.g., firewalls, routers, etc.) to deny network traffic by default and allow network traffic by exception (e.g., deny all, permit by exception).
• Technologies automate the Access Control Lists (ACLs) and similar rulesets review process to identify security issues and/ or misconfigurations.
• Network segmentation exists to implement separate network addresses (e.g., different subnets) to connect systems in different security domains (e.g., sensitive/regulated data environments).
• Technologies are configured to protect information involved in electronic messaging communications.
• Technologies are configured to prohibit the transmission of unprotected sensitive/regulated data by end-user messaging technologies. | Network Security (NET) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to protect the confidentiality, integrity and availability of electronic messaging communications. | CC6.6
CC6.7 | CC6.6-POF2 | null | null | null | null | null | null | null | null | null | null | null | NDR 5.3 (15.13.1) | null | null | null | null | 13.2.3 | 5.14 | 13.2.3 | null | 6.10.2.3 | null | null | null | null | null | null | null | null | null | null | null | SC-8(3)
SC-19 | null | SC-19 | SC-19 | SC-8(3) | null | null | null | null | SC-8(3) | null | null | null | null | null | null | null | null | null | null | null | 3.13.14 | null | 3.13.14[a]
3.13.14[b] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | D.5.5 | null | null | null | null | null | null | null | 8.3 | null | null | SC.L2-3.13.14 | SC.L2-3.13.14 | null | SC.L2-3.13.14 | SC.L2-3.13.14 | SC-19
SC-ACA-1
SC-ACA-2 | null | null | null | null | null | null | null | SC-19 | null | SC-19 | SC-19 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 3.3.2
3.3.3
3.3.4 | null | null | 8-700 | null | null | null | null | null | null | SC-19 | SC-19 | SC-19 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | SC-19 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 8.8.1 [MP.S.1] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0264
0267
0270
0271
0272
1089
0565
1023
0269
0569
0571
0570
0567
0572
1589
0574
1183
1151
0861
1026
1027
1540
1024
0490
0494
0496
1233
0498
0998
0999
1000 | null | null | null | null | null | null | null | null | null | null | 13.2.3 | null | null | 15.1.7.C.01
15.1.8.C.01
15.1.8.C.02
15.1.9.C.01
15.1.10.C.01
15.1.10.C.02
15.1.10.C.03
15.1.11.C.01
15.1.11.C.02
15.1.11.C.03
15.1.12.C.01
15.1.13.C.01
15.1.14.C.01
15.1.15.C.01
15.1.16.C.01
15.1.17.C.01
15.1.18.C.01
15.1.19.C.01
15.1.19.C.02
15.1.20.C.01
15.2.25.C.01
15.2.25.C.02
15.2.26.C.01
15.2.27.C.01
15.2.28.C.01
15.2.29.C.01
15.2.30.C.01
15.2.30.C.02
15.2.30.C.03
15.2.31.C.01
15.2.31.C.02
15.2.32.C.01
15.2.32.C.02
15.2.32.C.03
15.2.33.C.01
15.2.33.C.02
15.2.33.C.03
15.2.33.C.04
16.7.33.C.01
17.6.6.C.01
17.6.7.C.01 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | null | null | null | R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-4
R-SA-1
R-SA-2 | R-AC-1 | R-AC-2 | R-AC-3 | R-AC-4 | R-AM-1 | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | R-EX-7 | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | R-GV-8 | R-IR-1 | null | null | R-IR-4 | R-SA-1 | R-SA-2 | NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | NT-9 | NT-10 | NT-11 | NT-12 | NT-13 | NT-14 | MT-1 | MT-2 | MT-3 | MT-4 | MT-5 | MT-6 | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Network Security | Remote Access | NET-14 | Mechanisms exist to define, control and review organization-approved, secure remote access methods. | null | E-NET-03 | Does the organization define, control and review organization-approved, secure remote access methods? | 10 | Protect | null | X | X | There is no evidence of a capability to define, control and review organization-approved, secure remote access methods. | Network Security (NET) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• IT personnel use an informal process to design, build and maintain secure networks for test, development, staging and production environments, including the implementation of appropriate cybersecurity & data privacy controls.
• Administrative processes are used to configure boundary devices (e.g., firewalls, routers, etc.) to deny network traffic by default and allow network traffic by exception (e.g., deny all, permit by exception).
• Network monitoring is primarily reactive in nature. | Network Security (NET) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Network security management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for network security management.
• IT personnel define secure networking practices to protect the confidentiality, integrity, availability and safety of the organization’s technology assets, data and network(s).
• Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• Administrative processes are used to configure boundary devices (e.g., firewalls, routers, etc.) to deny network traffic by default and allow network traffic by exception (e.g., deny all, permit by exception).
• Network segmentation exists to implement separate network addresses (e.g., different subnets) to connect systems in different security domains (e.g., sensitive/regulated data environments).
• Administrative processes define, control and review remote access methods.
• Technologies are configured to use cryptographic mechanisms to protect the confidentiality and integrity of remote access sessions. | Network Security (NET) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A Technology Infrastructure team, or similar function, defines centrally-managed network security controls for implementation across the enterprise.
• IT/cybersecurity architects work with the Technology Infrastructure team to implement a “layered defense” network architecture that provides a defense-in-depth approach for redundancy and risk reduction for network-based security controls, including wired and wireless networking.
• Administrative processes and technologies configure boundary devices (e.g., firewalls, routers, etc.) to deny network traffic by default and allow network traffic by exception (e.g., deny all, permit by exception).
• Technologies automate the Access Control Lists (ACLs) and similar rulesets review process to identify security issues and/ or misconfigurations.
• Network segmentation exists to implement separate network addresses (e.g., different subnets) to connect systems in different security domains (e.g., sensitive/regulated data environments).
• Administrative processes define, control and review remote access methods.
• Technologies are configured to use cryptographic mechanisms to protect the confidentiality and integrity of remote access sessions. | Network Security (NET) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to define, control and review organization-approved, secure remote access methods. | CC6.6 | CC6.6-POF3 | null | 12.7 | null | 12.7 | 12.7 | null | null | HRS-04 | null | null | null | null | null | null | null | null | 6.2.2 | 6.7 | 6.2.2 | null | 6.3.2.2 | null | null | null | T1020.001, T1021, T1021.001, T1021.002, T1021.003, T1021.004, T1021.005, T1021.006, T1037, T1037.001, T1040, T1047, T1059, T1059.001, T1059.002, T1059.003, T1059.004, T1059.005, T1059.006, T1059.007, T1059.008, T1070, T1070.001, T1070.002, T1114, T1114.001, T1114.002, T1114.003, T1119, T1133, T1137, T1137.002, T1213, T1213.001, T1213.002, T1219, T1505.004, T1530, T1537, T1543, T1547.003, T1547.004, T1547.009, T1547.011, T1547.012, T1547.013, T1550.001, T1552, T1552.002, T1552.004, T1552.007, T1557, T1557.002, T1558, T1558.002, T1558.003, T1558.004, T1563, T1563.001, T1563.002, T1565, T1565.001, T1565.002, T1602, T1602.001, T1602.002, T1609, T1610, T1612, T1613, T1619 | OR-3.3
TS-2.1 | null | null | PR.AC-P3 | null | null | null | AC-17
AC-17(6) | AC-17 | AC-17 | AC-17 | AC-17
AC-17(6) | null | AC-17 | AC-17 | AC-17 | AC-17(6) | null | AC-17 | AC-17 | AC-17 | null | AC-17
AC-17(6) | AC-17 | AC-17 | null | AC-17
AC-17(6) | AC-17
AC-17(6) | 3.1.12 | 3.1.12.a
3.1.12.b
3.1.12.c
3.1.12.d | null | A.03.01.01.ODP[01]
A.03.01.12.a[01]
A.03.01.12.a[02]
A.03.01.12.a[04]
A.03.01.12.b | null | null | PR.AC-3 | null | null | 12.3.8
12.3.9 | 3.4.2
7.2.5
8.2.3
8.2.7
12.2.1
12.8.1 | 12.8.1 | 7.2.5
8.2.7
12.8.1 | 12.8.1 | 8.2.7
12.8.1 | 7.2.5
8.2.7
12.2.1
12.8.1 | 12.8.1 | 3.4.2
7.2.5
8.2.7
12.2.1
12.8.1 | 3.4.2
7.2.5
8.2.3
8.2.7
12.2.1
12.8.1 | 12.8.1 | N.4 | null | null | 9.1 | null | null | null | TM:SG4.SP1 | null | 5.5.6 | null | AC.L2-3.1.12 | null | AC.L1-b.1.i
AC.L1-b.1.ii | AC.L2-3.1.12 | AC.L2-3.1.12 | AC-17 | null | null | null | 52.204-21(b)(1)(i)
52.204-21(b)(1)(ii) | null | null | null | AC-17 | AC-17 | AC-17 | AC-17 | AC-17 | AC-17 | AC-17 | AC-17 | AC-17 | AC-17 | null | D3.PC.Am.B.15
D3.PC.De.E.7
D3.PC.Im.Int.2 | null | null | null | null | 2.S.A
6.S.A | 1.M.B
3.M.D
6.M.D
9.M.C | 1.M.B
3.M.D
6.M.D
9.M.C
2.L.B | AC-17 | null | CIP-005-5
R2 | null | null | null | null | null | null | 5.3 | AC-17 | AC-17 | AC-17 | III.C | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | AC-17 | AC-17 | AC-17 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 4.17 | null | null | null | null | null | null | null | null | null | null | null | 2-2-1-1
2-2-1-2 | TPC-35 | null | null | 2-2-1-7 | null | null | null | null | 7.2.7 [OP.ACC.7] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0487
0488
0489 | null | null | null | null | null | null | null | null | null | null | 6.2.2 | null | null | 16.5.10.C.01
16.5.10.C.02
16.5.11.C.01
16.5.11.C.02
16.5.12.C.01
17.5.6.C.01
17.5.7.C.01
17.5.7.C.02
17.5.8.C.01
17.5.8.C.02
17.5.8.C.03
17.5.9.C.01
17.5.10.C.01 | null | null | null | null | 9.3.1
9.3.2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | FAR 52.204-21
Lockton | null | x | R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-IR-1
R-IR-4
R-SA-1 | R-AC-1 | R-AC-2 | R-AC-3 | R-AC-4 | R-AM-1 | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | R-EX-7 | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | null | null | null | R-IR-1 | null | null | R-IR-4 | R-SA-1 | null | NT-1
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | NT-1 | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | NT-9 | NT-10 | NT-11 | NT-12 | NT-13 | NT-14 | MT-1 | MT-2 | MT-3 | MT-4 | MT-5 | MT-6 | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Network Security | Automated Monitoring & Control | NET-14.1 | Automated mechanisms exist to monitor and control remote access sessions. | null | null | Does the organization use automated mechanisms to monitor and control remote access sessions? | 1 | Detect | null | null | X | There is no evidence of a capability to monitor and control remote access sessions. | SP-CMM1 is N/A, since a structured process is required to monitor and control remote access sessions. | Network Security (NET) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Network security management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for network security management.
• IT personnel define secure networking practices to protect the confidentiality, integrity, availability and safety of the organization’s technology assets, data and network(s).
• Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• Administrative processes are used to configure boundary devices (e.g., firewalls, routers, etc.) to deny network traffic by default and allow network traffic by exception (e.g., deny all, permit by exception).
• Network segmentation exists to implement separate network addresses (e.g., different subnets) to connect systems in different security domains (e.g., sensitive/regulated data environments). | Network Security (NET) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A Technology Infrastructure team, or similar function, defines centrally-managed network security controls for implementation across the enterprise.
• IT/cybersecurity architects work with the Technology Infrastructure team to implement a “layered defense” network architecture that provides a defense-in-depth approach for redundancy and risk reduction for network-based security controls, including wired and wireless networking.
• Administrative processes and technologies configure boundary devices (e.g., firewalls, routers, etc.) to deny network traffic by default and allow network traffic by exception (e.g., deny all, permit by exception).
• Technologies automate the Access Control Lists (ACLs) and similar rulesets review process to identify security issues and/ or misconfigurations.
• Network segmentation exists to implement separate network addresses (e.g., different subnets) to connect systems in different security domains (e.g., sensitive/regulated data environments).
• Technologies are configured to monitor and control remote access sessions. | Network Security (NET) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | Network Security (NET) efforts are “world-class” capabilities that leverage predictive analysis (e.g., machine learning, AI, etc.). In addition to CMM Level 4 criteria, CMM Level 5 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Stakeholders make time-sensitive decisions to support operational efficiency, which may include automated remediation actions.
▪ Based on predictive analysis, process improvements are implemented according to “continuous improvement” practices that affect process changes. | null | null | null | 12.7 | null | 12.7 | 12.7 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | AC-17(1) | null | AC-17(1) | AC-17(1) | AC-17(1) | null | null | AC-17(1) | AC-17(1) | null | null | null | AC-17(1) | AC-17(1) | null | null | null | null | null | null | null | 3.1.12 | 3.1.12.b | 3.1.12[a]
3.1.12[b]
3.1.12[c]
3.1.12[d] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | N.4.5 | null | null | null | null | null | null | null | null | null | null | AC.L2-3.1.12 | AC.L2-3.1.12 | null | AC.L2-3.1.12 | AC.L2-3.1.12 | AC-17(1) | null | null | null | null | null | null | null | AC-17(1) | null | AC-17(1) | AC-17(1) | null | AC-17(1) | null | AC-17(1) | AC-17(1) | null | null | null | null | null | null | null | null | null | null | AC-17(1) | null | null | null | null | null | null | null | null | null | null | AC-17(1) | AC-17(1) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | AC-17(1) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 4.18 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | null | null | x | R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-IR-1
R-IR-4
R-SA-1 | R-AC-1 | R-AC-2 | R-AC-3 | R-AC-4 | R-AM-1 | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | R-EX-7 | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | null | null | null | R-IR-1 | null | null | R-IR-4 | R-SA-1 | null | NT-7
MT-1
MT-2
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | null | null | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | null | null | null |
Network Security | Protection of Confidentiality / Integrity Using Encryption | NET-14.2 | Cryptographic mechanisms exist to protect the confidentiality and integrity of remote access sessions (e.g., VPN). | null | null | Are cryptographic mechanisms utilized to protect the confidentiality and integrity of remote access sessions (e?g?, VPN)? | 9 | Protect | null | null | X | There is no evidence of a capability to Cryptographic protect the confidentiality and integrity of remote access sessions (e.g., VPN). | Network Security (NET) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• IT personnel use an informal process to design, build and maintain secure networks for test, development, staging and production environments, including the implementation of appropriate cybersecurity & data privacy controls.
• Administrative processes are used to configure boundary devices (e.g., firewalls, routers, etc.) to deny network traffic by default and allow network traffic by exception (e.g., deny all, permit by exception).
• Network monitoring is primarily reactive in nature. | Network Security (NET) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Network security management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for network security management.
• IT personnel define secure networking practices to protect the confidentiality, integrity, availability and safety of the organization’s technology assets, data and network(s).
• Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• Administrative processes are used to configure boundary devices (e.g., firewalls, routers, etc.) to deny network traffic by default and allow network traffic by exception (e.g., deny all, permit by exception).
• Network segmentation exists to implement separate network addresses (e.g., different subnets) to connect systems in different security domains (e.g., sensitive/regulated data environments).
• Technologies are configured to use cryptographic mechanisms to protect the confidentiality and integrity of remote access sessions. | Network Security (NET) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A Technology Infrastructure team, or similar function, defines centrally-managed network security controls for implementation across the enterprise.
• IT/cybersecurity architects work with the Technology Infrastructure team to implement a “layered defense” network architecture that provides a defense-in-depth approach for redundancy and risk reduction for network-based security controls, including wired and wireless networking.
• Administrative processes and technologies configure boundary devices (e.g., firewalls, routers, etc.) to deny network traffic by default and allow network traffic by exception (e.g., deny all, permit by exception).
• Technologies automate the Access Control Lists (ACLs) and similar rulesets review process to identify security issues and/ or misconfigurations.
• Network segmentation exists to implement separate network addresses (e.g., different subnets) to connect systems in different security domains (e.g., sensitive/regulated data environments).
• Technologies are configured to use cryptographic mechanisms to protect the confidentiality and integrity of remote access sessions. | See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to Cryptographic protect the confidentiality and integrity of remote access sessions (e.g., VPN). | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to Cryptographic protect the confidentiality and integrity of remote access sessions (e.g., VPN). | null | null | null | 12.7 | null | 12.7 | 12.7 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | PR.DS-P6 | null | null | null | AC-17(2) | null | AC-17(2) | AC-17(2) | AC-17(2) | null | null | AC-17(2) | AC-17(2) | null | null | null | AC-17(2) | AC-17(2) | null | null | null | null | null | null | null | 3.1.13 | 3.1.12.a | 3.1.13[a]
3.1.13[b] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | N.4.1 | null | null | 9.1 | null | null | null | null | null | 5.10.1.2 | null | AC.L2-3.1.13 | AC.L2-3.1.13 | null | AC.L2-3.1.13 | AC.L2-3.1.13 | AC-17(2) | null | null | null | null | null | null | null | AC-17(2) | null | AC-17(2) | AC-17(2) | null | AC-17(2) | null | AC-17(2) | AC-17(2) | null | null | null | null | null | null | null | null | null | null | AC-17(2) | null | null | null | null | null | null | null | null | null | null | AC-17(2) | AC-17(2) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | AC-17(2) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 9.8 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | null | null | x | R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-IR-1
R-IR-4
R-SA-1 | R-AC-1 | R-AC-2 | R-AC-3 | R-AC-4 | R-AM-1 | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | R-EX-7 | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | null | null | null | R-IR-1 | null | null | R-IR-4 | R-SA-1 | null | NT-7
MT-1
MT-2
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | null | null | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Network Security | Managed Access Control Points | NET-14.3 | Mechanisms exist to route all remote accesses through managed network access control points (e.g., VPN concentrator). | null | null | Does the organization route all remote accesses through managed network access control points (e?g?, VPN concentrator)? | 9 | Protect | null | X | X | There is no evidence of a capability to route all remote accesses through managed network access control points (e.g., VPN concentrator). | SP-CMM1 is N/A, since a structured process is required to route all remote accesses through managed network access control points (e.g., VPN concentrator). | Network Security (NET) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Network security management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for network security management.
• IT personnel define secure networking practices to protect the confidentiality, integrity, availability and safety of the organization’s technology assets, data and network(s).
• Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• Administrative processes are used to configure boundary devices (e.g., firewalls, routers, etc.) to deny network traffic by default and allow network traffic by exception (e.g., deny all, permit by exception).
• Network segmentation exists to implement separate network addresses (e.g., different subnets) to connect systems in different security domains (e.g., sensitive/regulated data environments). | Network Security (NET) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A Technology Infrastructure team, or similar function, defines centrally-managed network security controls for implementation across the enterprise.
• IT/cybersecurity architects work with the Technology Infrastructure team to implement a “layered defense” network architecture that provides a defense-in-depth approach for redundancy and risk reduction for network-based security controls, including wired and wireless networking.
• Administrative processes and technologies configure boundary devices (e.g., firewalls, routers, etc.) to deny network traffic by default and allow network traffic by exception (e.g., deny all, permit by exception).
• Technologies automate the Access Control Lists (ACLs) and similar rulesets review process to identify security issues and/ or misconfigurations.
• Network segmentation exists to implement separate network addresses (e.g., different subnets) to connect systems in different security domains (e.g., sensitive/regulated data environments).
• Technologies are configured to route all remote accesses through managed network access control points (e.g., VPN concentrator). | Network Security (NET) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to route all remote accesses through managed network access control points (e.g., VPN concentrator). | null | CC6.1-POF5 | null | 12.7 | null | 12.7 | 12.7 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | TS-2.0 | null | null | null | null | null | null | AC-17(3) | null | AC-17(3) | AC-17(3) | AC-17(3) | null | null | AC-17(3) | AC-17(3) | null | null | null | AC-17(3) | AC-17(3) | null | null | null | null | null | null | null | 3.1.14 | 3.1.12.b
3.1.12.c | 3.1.14[a]
3.1.14[b] | A.03.01.12.c | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | N.2.4.3 | null | null | null | null | null | null | null | null | null | null | AC.L2-3.1.14 | AC.L2-3.1.14 | null | AC.L2-3.1.14 | AC.L2-3.1.14 | AC-17(3) | null | null | null | null | null | null | null | AC-17(3) | null | AC-17(3) | AC-17(3) | null | AC-17(3) | null | AC-17(3) | AC-17(3) | null | null | null | null | null | null | null | null | null | null | AC-17(3) | null | null | null | null | null | null | null | null | null | null | null | AC-17(3) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | AC-17(3) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 4.19 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | null | null | x | R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-IR-1
R-IR-4
R-SA-1 | R-AC-1 | R-AC-2 | R-AC-3 | R-AC-4 | R-AM-1 | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | R-EX-7 | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | null | null | null | R-IR-1 | null | null | R-IR-4 | R-SA-1 | null | NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | NT-9 | NT-10 | NT-11 | NT-12 | NT-13 | NT-14 | MT-1 | MT-2 | MT-3 | MT-4 | MT-5 | MT-6 | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Network Security | Remote Privileged Commands & Sensitive Data Access | NET-14.4 | Mechanisms exist to restrict the execution of privileged commands and access to security-relevant information via remote access only for compelling operational needs. | null | null | Does the organization restrict the execution of privileged commands and access to security-relevant information via remote access only for compelling operational needs? | 8 | Protect | null | X | X | There is no evidence of a capability to restrict the execution of privileged commands and access to security-relevant information via remote access only for compelling operational needs. | Network Security (NET) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• IT personnel use an informal process to design, build and maintain secure networks for test, development, staging and production environments, including the implementation of appropriate cybersecurity & data privacy controls.
• Administrative processes are used to configure boundary devices (e.g., firewalls, routers, etc.) to deny network traffic by default and allow network traffic by exception (e.g., deny all, permit by exception).
• Network monitoring is primarily reactive in nature. | Network Security (NET) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Network security management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for network security management.
• IT personnel define secure networking practices to protect the confidentiality, integrity, availability and safety of the organization’s technology assets, data and network(s).
• Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• Administrative processes are used to configure boundary devices (e.g., firewalls, routers, etc.) to deny network traffic by default and allow network traffic by exception (e.g., deny all, permit by exception).
• Network segmentation exists to implement separate network addresses (e.g., different subnets) to connect systems in different security domains (e.g., sensitive/regulated data environments).
• Administrative processes and technologies restrict the execution of privileged commands and access to security-relevant information via remote access only for compelling operational needs. | Network Security (NET) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A Technology Infrastructure team, or similar function, defines centrally-managed network security controls for implementation across the enterprise.
• IT/cybersecurity architects work with the Technology Infrastructure team to implement a “layered defense” network architecture that provides a defense-in-depth approach for redundancy and risk reduction for network-based security controls, including wired and wireless networking.
• Administrative processes and technologies configure boundary devices (e.g., firewalls, routers, etc.) to deny network traffic by default and allow network traffic by exception (e.g., deny all, permit by exception).
• Technologies automate the Access Control Lists (ACLs) and similar rulesets review process to identify security issues and/ or misconfigurations.
• Network segmentation exists to implement separate network addresses (e.g., different subnets) to connect systems in different security domains (e.g., sensitive/regulated data environments).
• Administrative processes and technologies restrict the execution of privileged commands and access to security-relevant information via remote access only for compelling operational needs. | See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to restrict the execution of privileged commands and access to security-relevant information via remote access only for compelling operational needs. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to restrict the execution of privileged commands and access to security-relevant information via remote access only for compelling operational needs. | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | AC-17(4) | null | AC-17(4) | AC-17(4) | AC-17(4) | null | null | AC-17(4) | AC-17(4) | null | null | null | AC-17(4) | AC-17(4) | null | null | null | null | null | null | null | 3.1.15 | 3.1.12.d | 3.1.15[a]
3.1.15[b]
3.1.15[c]
3.1.15[d] | A.03.01.12.d[1]
A.03.01.12.d[2] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | H.12 | null | null | null | null | null | null | null | null | null | null | AC.L2-3.1.15 | AC.L2-3.1.15 | null | AC.L2-3.1.15 | AC.L2-3.1.15 | AC-17(4) | null | null | null | null | null | null | null | AC-17(4) | null | AC-17(4) | AC-17(4) | null | AC-17(4) | null | AC-17(4) | AC-17(4) | null | null | null | null | null | null | null | null | null | null | AC-17(4) | null | null | null | null | null | null | null | null | null | null | null | AC-17(4) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | AC-17(4) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 4.17
4.20 | null | null | null | null | null | null | null | null | null | null | null | null | TPC-35 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 16.5.11.C.01
16.5.11.C.02 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | null | null | x | R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-IR-1
R-IR-4
R-SA-1 | R-AC-1 | R-AC-2 | R-AC-3 | R-AC-4 | R-AM-1 | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | R-EX-7 | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | null | null | null | R-IR-1 | null | null | R-IR-4 | R-SA-1 | null | NT-7
MT-1
MT-2
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | null | null | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Network Security | Work From Anywhere (WFA) - Telecommuting Security | NET-14.5 | Mechanisms exist to define secure telecommuting practices and govern remote access to systems and data for remote workers. | null | E-NET-03 | Does the organization define secure telecommuting practices and govern remote access to systems and data for remote workers? | 10 | Protect | X | X | X | There is no evidence of a capability to define secure telecommuting practices and govern remote access to systems and data for remote workers. | Network Security (NET) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• IT personnel use an informal process to design, build and maintain secure networks for test, development, staging and production environments, including the implementation of appropriate cybersecurity & data privacy controls.
• Administrative processes are used to configure boundary devices (e.g., firewalls, routers, etc.) to deny network traffic by default and allow network traffic by exception (e.g., deny all, permit by exception).
• Network monitoring is primarily reactive in nature. | Network Security (NET) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Network security management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for network security management.
• IT personnel define secure networking practices to protect the confidentiality, integrity, availability and safety of the organization’s technology assets, data and network(s).
• Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• Administrative processes are used to configure boundary devices (e.g., firewalls, routers, etc.) to deny network traffic by default and allow network traffic by exception (e.g., deny all, permit by exception).
• Network segmentation exists to implement separate network addresses (e.g., different subnets) to connect systems in different security domains (e.g., sensitive/regulated data environments).
• Administrative processes define, control and review remote access methods. | Network Security (NET) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A Technology Infrastructure team, or similar function, defines centrally-managed network security controls for implementation across the enterprise.
• IT/cybersecurity architects work with the Technology Infrastructure team to implement a “layered defense” network architecture that provides a defense-in-depth approach for redundancy and risk reduction for network-based security controls, including wired and wireless networking.
• Administrative processes and technologies configure boundary devices (e.g., firewalls, routers, etc.) to deny network traffic by default and allow network traffic by exception (e.g., deny all, permit by exception).
• Technologies automate the Access Control Lists (ACLs) and similar rulesets review process to identify security issues and/ or misconfigurations.
• Network segmentation exists to implement separate network addresses (e.g., different subnets) to connect systems in different security domains (e.g., sensitive/regulated data environments).
• Administrative processes define, control and review remote access methods. | Network Security (NET) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to define secure telecommuting practices and govern remote access to systems and data for remote workers. | null | null | null | null | null | null | null | null | null | HRS-04 | null | null | null | null | null | null | null | null | 6.2.2
11.2.6 | 6.7
7.9 | 6.2.2
11.2.6 | null | 6.3.2.2 | null | null | null | null | OR-1.2
OR-3.3 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 3.1.12
3.10.6 | 3.1.12.a
3.1.12.c
3.10.6.a
3.10.6.b | null | null | null | null | PR.AC-2 | null | null | null | null | null | null | null | null | null | null | null | null | null | L.10.3.1 | null | 2.1.4 | null | null | null | null | null | null | null | null | AC.L2-3.1.12
PE.L2-3.10.6 | null | null | AC.L2-3.1.12
PE.L2-3.10.6 | AC.L2-3.1.12
PE.L2-3.10.6 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 10.S.A | null | null | 2.B.7
2.B.7.1
2.B.7.2
2.B.7.3 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 2-2-1-1
2-2-1-2 | null | null | null | null | null | null | null | null | 7.2.7 [OP.ACC.7]
9 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 6.2.2
11.2.6 | null | null | 21.2.4.C.01
21.2.4.C.02
21.2.5.C.01
21.2.6.C.01
21.2.7.C.01
21.2.7.C.02
21.3.5.C.01
21.3.6.C.01 | null | null | null | null | 9.3.1
9.3.2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | Lockton | null | x | R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
R-SA-2 | R-AC-1 | R-AC-2 | R-AC-3 | R-AC-4 | R-AM-1 | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | R-EX-6 | R-EX-7 | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | R-GV-8 | R-IR-1 | R-IR-2 | R-IR-3 | R-IR-4 | R-SA-1 | R-SA-2 | NT-1
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | NT-1 | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | NT-9 | NT-10 | NT-11 | NT-12 | NT-13 | NT-14 | MT-1 | MT-2 | MT-3 | MT-4 | MT-5 | MT-6 | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Network Security | Third-Party Remote Access Governance | NET-14.6 | Mechanisms exist to proactively control and monitor third-party accounts used to access, support, or maintain system components via remote access. | null | null | Does the organization proactively control and monitor third-party accounts used to access, support, or maintain system components via remote access? | 8 | Protect | null | X | X | There is no evidence of a capability to proactively control and monitor third-party accounts used to access, support, or maintain system components via remote access. | SP-CMM1 is N/A, since a structured process is required to proactively control and monitor third-party accounts used to access, support, or maintain system components via remote access. | Network Security (NET) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Network security management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for network security management.
• IT personnel define secure networking practices to protect the confidentiality, integrity, availability and safety of the organization’s technology assets, data and network(s).
• Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• Administrative processes are used to configure boundary devices (e.g., firewalls, routers, etc.) to deny network traffic by default and allow network traffic by exception (e.g., deny all, permit by exception).
• Network segmentation exists to implement separate network addresses (e.g., different subnets) to connect systems in different security domains (e.g., sensitive/regulated data environments). | Network Security (NET) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A Technology Infrastructure team, or similar function, defines centrally-managed network security controls for implementation across the enterprise.
• IT/cybersecurity architects work with the Technology Infrastructure team to implement a “layered defense” network architecture that provides a defense-in-depth approach for redundancy and risk reduction for network-based security controls, including wired and wireless networking.
• Administrative processes and technologies configure boundary devices (e.g., firewalls, routers, etc.) to deny network traffic by default and allow network traffic by exception (e.g., deny all, permit by exception).
• Technologies automate the Access Control Lists (ACLs) and similar rulesets review process to identify security issues and/ or misconfigurations.
• Network segmentation exists to implement separate network addresses (e.g., different subnets) to connect systems in different security domains (e.g., sensitive/regulated data environments). | Network Security (NET) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to proactively control and monitor third-party accounts used to access, support, or maintain system components via remote access. | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 8.1.5 | 8.2.7 | null | 8.2.7 | null | 8.2.7 | 8.2.7 | null | 8.2.7 | 8.2.7 | null | N.16 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | TPC-35 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | null | null | null | R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1 | R-AC-1 | R-AC-2 | R-AC-3 | R-AC-4 | R-AM-1 | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | R-EX-6 | R-EX-7 | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | R-GV-8 | R-IR-1 | R-IR-2 | R-IR-3 | R-IR-4 | R-SA-1 | null | NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | NT-9 | NT-10 | NT-11 | NT-12 | NT-13 | NT-14 | MT-1 | MT-2 | MT-3 | MT-4 | MT-5 | MT-6 | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Network Security | Endpoint Security Validation | NET-14.7 | Mechanisms exist to validate software versions/patch levels and control remote devices connecting to corporate networks or storing and accessing organization information. | - CimTrak Integrity Suite (https://www.cimcor.com/cimtrak/)
- NNT Change Tracker (https://www.newnettechnologies.com) | null | Does the organization validate software versions/patch levels and control remote devices connecting to corporate networks or storing and accessing organization information? | 6 | Protect | null | X | X | There is no evidence of a capability to validate software versions/patch levels and control remote devices connecting to corporate networks or storing and accessing organization information. | SP-CMM1 is N/A, since a structured process is required to validate software versions/patch levels and control remote devices connecting to corporate networks or storing and accessing organization information. | Network Security (NET) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Network security management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for network security management.
• IT personnel define secure networking practices to protect the confidentiality, integrity, availability and safety of the organization’s technology assets, data and network(s).
• Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• Administrative processes are used to configure boundary devices (e.g., firewalls, routers, etc.) to deny network traffic by default and allow network traffic by exception (e.g., deny all, permit by exception).
• Network segmentation exists to implement separate network addresses (e.g., different subnets) to connect systems in different security domains (e.g., sensitive/regulated data environments). | Network Security (NET) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A Technology Infrastructure team, or similar function, defines centrally-managed network security controls for implementation across the enterprise.
• IT/cybersecurity architects work with the Technology Infrastructure team to implement a “layered defense” network architecture that provides a defense-in-depth approach for redundancy and risk reduction for network-based security controls, including wired and wireless networking.
• Administrative processes and technologies configure boundary devices (e.g., firewalls, routers, etc.) to deny network traffic by default and allow network traffic by exception (e.g., deny all, permit by exception).
• Technologies automate the Access Control Lists (ACLs) and similar rulesets review process to identify security issues and/ or misconfigurations.
• Network segmentation exists to implement separate network addresses (e.g., different subnets) to connect systems in different security domains (e.g., sensitive/regulated data environments). | Network Security (NET) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to validate software versions/patch levels and control remote devices connecting to corporate networks or storing and accessing organization information. | null | null | null | 13.5 | null | 13.5 | 13.5 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | CA-9(1) | null | null | null | null | CA-9(1) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | M.1.7 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | CA-9(1) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | null | null | null | R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1 | R-AC-1 | R-AC-2 | R-AC-3 | R-AC-4 | R-AM-1 | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | R-EX-6 | R-EX-7 | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | null | R-IR-1 | R-IR-2 | R-IR-3 | R-IR-4 | R-SA-1 | null | NT-7
MT-1
MT-2
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | null | null | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Network Security | Expeditious Disconnect / Disable Capability | NET-14.8 | Mechanisms exist to provide the capability to expeditiously disconnect or disable a user's remote access session. | null | null | Does the organization provide the capability to expeditiously disconnect or disable a user's remote access session? | 8 | Protect | null | X | X | There is no evidence of a capability to provide the capability to expeditiously disconnect or disable a user's remote access session. | Network Security (NET) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• IT personnel use an informal process to design, build and maintain secure networks for test, development, staging and production environments, including the implementation of appropriate cybersecurity & data privacy controls.
• Administrative processes are used to configure boundary devices (e.g., firewalls, routers, etc.) to deny network traffic by default and allow network traffic by exception (e.g., deny all, permit by exception).
• Network monitoring is primarily reactive in nature. | Network Security (NET) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Network security management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for network security management.
• IT personnel define secure networking practices to protect the confidentiality, integrity, availability and safety of the organization’s technology assets, data and network(s).
• Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• Administrative processes are used to configure boundary devices (e.g., firewalls, routers, etc.) to deny network traffic by default and allow network traffic by exception (e.g., deny all, permit by exception).
• Network segmentation exists to implement separate network addresses (e.g., different subnets) to connect systems in different security domains (e.g., sensitive/regulated data environments).
• Administrative processes and technologies provide the capability to expeditiously disconnect or disable a user's remote access session. | Network Security (NET) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A Technology Infrastructure team, or similar function, defines centrally-managed network security controls for implementation across the enterprise.
• IT/cybersecurity architects work with the Technology Infrastructure team to implement a “layered defense” network architecture that provides a defense-in-depth approach for redundancy and risk reduction for network-based security controls, including wired and wireless networking.
• Administrative processes and technologies configure boundary devices (e.g., firewalls, routers, etc.) to deny network traffic by default and allow network traffic by exception (e.g., deny all, permit by exception).
• Technologies automate the Access Control Lists (ACLs) and similar rulesets review process to identify security issues and/ or misconfigurations.
• Network segmentation exists to implement separate network addresses (e.g., different subnets) to connect systems in different security domains (e.g., sensitive/regulated data environments).
• Administrative processes and technologies provide the capability to expeditiously disconnect or disable a user's remote access session. | Network Security (NET) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | Network Security (NET) efforts are “world-class” capabilities that leverage predictive analysis (e.g., machine learning, AI, etc.). In addition to CMM Level 4 criteria, CMM Level 5 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Stakeholders make time-sensitive decisions to support operational efficiency, which may include automated remediation actions.
▪ Based on predictive analysis, process improvements are implemented according to “continuous improvement” practices that affect process changes. | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | AC-17(9) | null | null | null | AC-17(9) | null | null | null | null | AC-17(9) | null | AC-17(9) | AC-17(9) | AC-17(9) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | I.1.21 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | AC-17(9) | null | AC-17(9) | AC-17(9) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | AC-17(9) | null | null | null | null | null | null | null | null | null | null | null | AC-17(9) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | AC-17(9) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 1591 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | null | null | x | R-AC-3
R-AC-4
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-7
R-GV-1
R-GV-2
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1 | null | null | R-AC-3 | R-AC-4 | null | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | R-EX-7 | R-GV-1 | R-GV-2 | null | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | R-GV-8 | R-IR-1 | R-IR-2 | R-IR-3 | R-IR-4 | R-SA-1 | null | NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | NT-9 | NT-10 | NT-11 | NT-12 | NT-13 | NT-14 | MT-1 | MT-2 | MT-3 | MT-4 | MT-5 | MT-6 | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | - Added NIST 800-53 R5 mapping for AC-17(9) |
Network Security | Wireless Networking | NET-15 | Mechanisms exist to control authorized wireless usage and monitor for unauthorized wireless access. | null | null | Does the organization control authorized wireless usage and monitor for unauthorized wireless access? | 9 | Protect | X | X | X | There is no evidence of a capability to control authorized wireless usage and monitor for unauthorized wireless access. | Network Security (NET) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• IT personnel use an informal process to design, build and maintain secure networks for test, development, staging and production environments, including the implementation of appropriate cybersecurity & data privacy controls.
• Administrative processes are used to configure boundary devices (e.g., firewalls, routers, etc.) to deny network traffic by default and allow network traffic by exception (e.g., deny all, permit by exception).
• Network monitoring is primarily reactive in nature. | Network Security (NET) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Network security management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for network security management.
• IT personnel define secure networking practices to protect the confidentiality, integrity, availability and safety of the organization’s technology assets, data and network(s).
• Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• Administrative processes are used to configure boundary devices (e.g., firewalls, routers, etc.) to deny network traffic by default and allow network traffic by exception (e.g., deny all, permit by exception).
• Network segmentation exists to implement separate network addresses (e.g., different subnets) to connect systems in different security domains (e.g., sensitive/regulated data environments).
• Administrative processes and technologies control authorized wireless usage and monitor for unauthorized wireless access. | Network Security (NET) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A Technology Infrastructure team, or similar function, defines centrally-managed network security controls for implementation across the enterprise.
• IT/cybersecurity architects work with the Technology Infrastructure team to implement a “layered defense” network architecture that provides a defense-in-depth approach for redundancy and risk reduction for network-based security controls, including wired and wireless networking.
• Administrative processes and technologies configure boundary devices (e.g., firewalls, routers, etc.) to deny network traffic by default and allow network traffic by exception (e.g., deny all, permit by exception).
• Technologies automate the Access Control Lists (ACLs) and similar rulesets review process to identify security issues and/ or misconfigurations.
• Network segmentation exists to implement separate network addresses (e.g., different subnets) to connect systems in different security domains (e.g., sensitive/regulated data environments).
• Administrative processes and technologies control authorized wireless usage and monitor for unauthorized wireless access.
• Centrally-managed authentication and cryptographic technologies are configured to protect wireless access. | Network Security (NET) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to control authorized wireless usage and monitor for unauthorized wireless access. | null | null | null | null | null | null | null | null | null | null | SWS-05 | null | null | NDR 1.6 (15.2.1) | null | null | null | null | 13.1.2 | 8.21 | 13.1.2 | null | null | null | null | null | T1011, T1011.001, T1020.001, T1040, T1070, T1070.001, T1070.002, T1119, T1530, T1552, T1552.004, T1557, T1557.002, T1558, T1558.002, T1558.003, T1558.004, T1565, T1565.001, T1565.002, T1602, T1602.001, T1602.002 | TS-2.11 | null | null | null | null | null | null | AC-18 | AC-18 | AC-18 | AC-18 | AC-18 | null | AC-18 | AC-18 | AC-18 | null | null | AC-18 | AC-18 | AC-18 | null | AC-18 | AC-18 | null | AC-18 | AC-18 | AC-18 | 3.1.16 | 3.1.16.a
3.1.16.b | 3.1.16[a]
3.1.16[b] | A.03.01.16.a[01]
A.03.01.16.a[02]
A.03.01.16.a[04] | null | null | null | null | null | null | 11.2
11.2.1
11.2.2 | null | null | null | null | 11.2.1
11.2.2 | null | 11.2.1
11.2.2 | 11.2.1
11.2.2 | null | N.8.5 | null | null | null | null | null | null | TM:SG4.SP1 | null | 5.13.1
5.13.1.1 | null | AC.L2-3.1.16 | AC.L2-3.1.16 | null | AC.L2-3.1.16 | AC.L2-3.1.16 | AC-18 | null | null | null | null | null | null | null | AC-18 | AC-18 | AC-18 | AC-18 | AC-18 | AC-18 | AC-18 | AC-18 | AC-18 | AC-18 | null | null | null | null | null | null | null | null | null | AC-18 | null | null | 8-311 | null | null | null | null | null | null | AC-18 | AC-18 | AC-18 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | AC-18 | AC-18 | AC-18 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 4.24
12.12
12.14 | null | null | null | null | null | null | null | null | null | null | null | 2-3-1-5
2-4-1-4 | null | null | null | 2-4-1-4
2-4-1-5 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 1543
0225
0247
0248
1137
1314
0536
1315
1316
1317
1318
1319
1320
1321
1322
1324
1323
1327
1330
1454
1334
1335 | null | null | null | null | null | null | null | null | null | null | 13.1.2 | null | null | 18.2.5.C.01
18.2.5.C.02
18.2.6.C.01
18.2.7.C.01
18.2.8.C.01
18.2.25.C.01
18.2.26.C.01
18.2.27.C.01
18.2.28.C.01
18.2.28.C.02
18.2.29.C.01
18.2.29.C.02
18.2.29.C.03
18.2.30.C.01
18.2.31.C.01
18.2.32.C.01
18.2.34.C.01 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | null | null | null | R-AC-1
R-AC-3
R-AC-4
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-7
R-GV-1
R-GV-2
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-4
R-SA-1 | R-AC-1 | null | R-AC-3 | R-AC-4 | null | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | null | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | R-EX-7 | R-GV-1 | R-GV-2 | null | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | R-GV-8 | R-IR-1 | R-IR-2 | null | R-IR-4 | R-SA-1 | null | NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | NT-9 | NT-10 | NT-11 | NT-12 | NT-13 | NT-14 | MT-1 | MT-2 | MT-3 | MT-4 | MT-5 | MT-6 | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Network Security | Authentication & Encryption | NET-15.1 | Mechanisms exist to protect wireless access through authentication and strong encryption. | null | null | Does the organization protect wireless access through authentication and strong encryption? | 9 | Protect | null | null | X | There is no evidence of a capability to protect wireless access through authentication and strong encryption. | Network Security (NET) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• IT personnel use an informal process to design, build and maintain secure networks for test, development, staging and production environments, including the implementation of appropriate cybersecurity & data privacy controls.
• Administrative processes are used to configure boundary devices (e.g., firewalls, routers, etc.) to deny network traffic by default and allow network traffic by exception (e.g., deny all, permit by exception).
• Network monitoring is primarily reactive in nature. | Network Security (NET) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Network security management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for network security management.
• IT personnel define secure networking practices to protect the confidentiality, integrity, availability and safety of the organization’s technology assets, data and network(s).
• Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• Administrative processes are used to configure boundary devices (e.g., firewalls, routers, etc.) to deny network traffic by default and allow network traffic by exception (e.g., deny all, permit by exception).
• Network segmentation exists to implement separate network addresses (e.g., different subnets) to connect systems in different security domains (e.g., sensitive/regulated data environments). | Network Security (NET) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A Technology Infrastructure team, or similar function, defines centrally-managed network security controls for implementation across the enterprise.
• IT/cybersecurity architects work with the Technology Infrastructure team to implement a “layered defense” network architecture that provides a defense-in-depth approach for redundancy and risk reduction for network-based security controls, including wired and wireless networking.
• Administrative processes and technologies configure boundary devices (e.g., firewalls, routers, etc.) to deny network traffic by default and allow network traffic by exception (e.g., deny all, permit by exception).
• Technologies automate the Access Control Lists (ACLs) and similar rulesets review process to identify security issues and/ or misconfigurations.
• Network segmentation exists to implement separate network addresses (e.g., different subnets) to connect systems in different security domains (e.g., sensitive/regulated data environments).
• Centrally-managed authentication and cryptographic technologies are configured to protect wireless access. | See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to protect wireless access through authentication and strong encryption. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to protect wireless access through authentication and strong encryption. | null | null | null | null | null | null | null | null | null | null | null | null | null | NDR 1.6 (15.2.3(1)) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | AC-18(1) | null | AC-18(1) | AC-18(1) | AC-18(1) | null | null | AC-18(1) | AC-18(1) | null | null | null | AC-18(1) | AC-18(1) | null | null | null | null | null | null | null | 3.1.17 | 3.1.16.a
3.1.16.b | 3.1.17[a]
3.1.17[b] | A.03.01.16.b | null | null | null | null | null | 4.1.1 | 2.3.1
2.3.2
4.2.1 | null | 4.2.1 | null | 2.3.1
2.3.2 | 2.3.1
2.3.2
4.2.1 | 2.3.1
2.3.2 | 2.3.1
2.3.2
4.2.1 | 2.3.1
2.3.2
4.2.1 | null | N.8.4 | null | null | null | null | null | null | null | null | 5.10.1.2 | null | AC.L2-3.1.17 | AC.L2-3.1.17 | null | AC.L2-3.1.17 | AC.L2-3.1.17 | AC-18(1) | null | null | null | null | null | null | null | AC-18(1) | null | AC-18(1) | AC-18(1) | null | AC-18(1) | null | AC-18(1) | AC-18(1) | null | null | null | null | null | null | null | null | null | null | AC-18(1) | null | null | null | null | null | null | null | null | null | null | null | AC-18(1) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | AC-18(1) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 12.14 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 18.2.10.C.01
18.2.10.C.02
18.2.11.C.01
18.2.11.C.02
18.2.11.C.03
18.2.11.C.04
18.2.11.C.05
18.2.12.C.01
18.2.12.C.02
18.2.13.C.01
18.2.14.C.01
18.2.15.C.01
18.2.16.C.01
18.2.17.C.01
18.2.18.C.01
18.2.19.C.01
18.2.20.C.01
18.2.20.C.02
18.2.20.C.03
18.2.21.C.01
18.2.22.C.01
18.2.23.C.01
18.2.23.C.02
18.2.24.C.01
18.2.25.C.01 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | null | x | null | R-AC-4
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-4
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-7
R-GV-1
R-GV-2
R-GV-4
R-GV-5
R-IR-1
R-IR-2
R-IR-4
R-SA-1 | null | null | null | R-AC-4 | null | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | null | R-BC-4 | null | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | R-EX-7 | R-GV-1 | R-GV-2 | null | R-GV-4 | R-GV-5 | null | null | null | R-IR-1 | R-IR-2 | null | R-IR-4 | R-SA-1 | null | NT-7
MT-1
MT-2
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | null | null | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Network Security | Disable Wireless Networking | NET-15.2 | Mechanisms exist to disable unnecessary wireless networking capabilities that are internally embedded within system components prior to issuance to end users. | null | null | Does the organization disable unnecessary wireless networking capabilities that are internally embedded within system components prior to issuance to end users? | 5 | Protect | null | null | X | There is no evidence of a capability to disable unnecessary wireless networking capabilities that are internally embedded within system components prior to issuance to end users. | Network Security (NET) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• IT personnel use an informal process to design, build and maintain secure networks for test, development, staging and production environments, including the implementation of appropriate cybersecurity & data privacy controls.
• Administrative processes are used to configure boundary devices (e.g., firewalls, routers, etc.) to deny network traffic by default and allow network traffic by exception (e.g., deny all, permit by exception).
• Network monitoring is primarily reactive in nature. | Network Security (NET) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Network security management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for network security management.
• IT personnel define secure networking practices to protect the confidentiality, integrity, availability and safety of the organization’s technology assets, data and network(s).
• Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• Administrative processes are used to configure boundary devices (e.g., firewalls, routers, etc.) to deny network traffic by default and allow network traffic by exception (e.g., deny all, permit by exception).
• Network segmentation exists to implement separate network addresses (e.g., different subnets) to connect systems in different security domains (e.g., sensitive/regulated data environments).
• Administrative processes and technologies disable unnecessary wireless networking capabilities. | Network Security (NET) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A Technology Infrastructure team, or similar function, defines centrally-managed network security controls for implementation across the enterprise.
• IT/cybersecurity architects work with the Technology Infrastructure team to implement a “layered defense” network architecture that provides a defense-in-depth approach for redundancy and risk reduction for network-based security controls, including wired and wireless networking.
• Administrative processes and technologies configure boundary devices (e.g., firewalls, routers, etc.) to deny network traffic by default and allow network traffic by exception (e.g., deny all, permit by exception).
• Technologies automate the Access Control Lists (ACLs) and similar rulesets review process to identify security issues and/ or misconfigurations.
• Network segmentation exists to implement separate network addresses (e.g., different subnets) to connect systems in different security domains (e.g., sensitive/regulated data environments).
• Administrative processes and technologies disable unnecessary wireless networking capabilities. | Network Security (NET) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to disable unnecessary wireless networking capabilities that are internally embedded within system components prior to issuance to end users. | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | AC-18(3) | null | null | null | AC-18(3) | null | null | AC-18(3) | AC-18(3) | null | null | null | AC-18(3) | AC-18(3) | null | null | null | null | null | null | null | null | 3.1.16.c | null | A.03.01.16.c | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | U.1.2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | AC-18(3) | null | null | AC-18(3) | null | AC-18(3) | null | AC-18(3) | AC-18(3) | null | null | null | null | null | null | null | null | null | null | AC-18(3) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 4.24 | null | null | null | null | null | null | null | null | null | null | null | 2-4-1-4 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 21.1.16.C.01
21.1.16.C.02 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | null | x | null | R-AC-4
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-4
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-7
R-GV-1
R-GV-2
R-GV-4
R-GV-5
R-IR-1
R-IR-2
R-IR-4
R-SA-1 | null | null | null | R-AC-4 | null | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | null | R-BC-4 | null | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | R-EX-7 | R-GV-1 | R-GV-2 | null | R-GV-4 | R-GV-5 | null | null | null | R-IR-1 | R-IR-2 | null | R-IR-4 | R-SA-1 | null | NT-7
MT-1
MT-2
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | null | null | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Network Security | Restrict Configuration By Users | NET-15.3 | Mechanisms exist to identify and explicitly authorize users who are allowed to independently configure wireless networking capabilities. | null | null | Does the organization identify and explicitly authorize users who are allowed to independently configure wireless networking capabilities? | 8 | Protect | null | null | X | There is no evidence of a capability to identify and explicitly authorize users who are allowed to independently configure wireless networking capabilities. | Network Security (NET) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• IT personnel use an informal process to design, build and maintain secure networks for test, development, staging and production environments, including the implementation of appropriate cybersecurity & data privacy controls.
• Administrative processes are used to configure boundary devices (e.g., firewalls, routers, etc.) to deny network traffic by default and allow network traffic by exception (e.g., deny all, permit by exception).
• Network monitoring is primarily reactive in nature. | Network Security (NET) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Network security management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for network security management.
• IT personnel define secure networking practices to protect the confidentiality, integrity, availability and safety of the organization’s technology assets, data and network(s).
• Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• Administrative processes are used to configure boundary devices (e.g., firewalls, routers, etc.) to deny network traffic by default and allow network traffic by exception (e.g., deny all, permit by exception).
• Network segmentation exists to implement separate network addresses (e.g., different subnets) to connect systems in different security domains (e.g., sensitive/regulated data environments). | Network Security (NET) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A Technology Infrastructure team, or similar function, defines centrally-managed network security controls for implementation across the enterprise.
• IT/cybersecurity architects work with the Technology Infrastructure team to implement a “layered defense” network architecture that provides a defense-in-depth approach for redundancy and risk reduction for network-based security controls, including wired and wireless networking.
• Administrative processes and technologies configure boundary devices (e.g., firewalls, routers, etc.) to deny network traffic by default and allow network traffic by exception (e.g., deny all, permit by exception).
• Technologies automate the Access Control Lists (ACLs) and similar rulesets review process to identify security issues and/ or misconfigurations.
• Network segmentation exists to implement separate network addresses (e.g., different subnets) to connect systems in different security domains (e.g., sensitive/regulated data environments). | See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to identify and explicitly authorize users who are allowed to independently configure wireless networking capabilities. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to identify and explicitly authorize users who are allowed to independently configure wireless networking capabilities. | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | AC-18(4) | null | null | AC-18(4) | AC-18(4) | null | null | null | AC-18(4) | null | null | null | null | AC-18(4) | null | null | null | null | null | null | null | null | 3.1.16.a
3.1.16.c | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | N.8.2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | AC-18(4) | null | null | AC-18(4) | null | AC-18(4) | null | null | AC-18(4) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 12.13 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | null | x | null | R-AC-4
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-4
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-7
R-GV-1
R-GV-2
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-IR-1
R-IR-2
R-IR-4
R-SA-1
R-SA-2 | null | null | null | R-AC-4 | null | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | null | R-BC-4 | null | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | R-EX-7 | R-GV-1 | R-GV-2 | null | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | null | R-IR-1 | R-IR-2 | null | R-IR-4 | R-SA-1 | R-SA-2 | NT-7
MT-1
MT-2
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | null | null | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Network Security | Wireless Boundaries | NET-15.4 | Mechanisms exist to confine wireless communications to organization-controlled boundaries. | null | null | Does the organization confine wireless communications to organization-controlled boundaries? | 5 | Protect | null | X | X | There is no evidence of a capability to confine wireless communications to organization-controlled boundaries. | Network Security (NET) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• IT personnel use an informal process to design, build and maintain secure networks for test, development, staging and production environments, including the implementation of appropriate cybersecurity & data privacy controls.
• Administrative processes are used to configure boundary devices (e.g., firewalls, routers, etc.) to deny network traffic by default and allow network traffic by exception (e.g., deny all, permit by exception).
• Network monitoring is primarily reactive in nature. | Network Security (NET) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Network security management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for network security management.
• IT personnel define secure networking practices to protect the confidentiality, integrity, availability and safety of the organization’s technology assets, data and network(s).
• Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• Administrative processes are used to configure boundary devices (e.g., firewalls, routers, etc.) to deny network traffic by default and allow network traffic by exception (e.g., deny all, permit by exception).
• Network segmentation exists to implement separate network addresses (e.g., different subnets) to connect systems in different security domains (e.g., sensitive/regulated data environments).
• Administrative processes and technologies confine wireless communications to organization-controlled boundaries. | Network Security (NET) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A Technology Infrastructure team, or similar function, defines centrally-managed network security controls for implementation across the enterprise.
• IT/cybersecurity architects work with the Technology Infrastructure team to implement a “layered defense” network architecture that provides a defense-in-depth approach for redundancy and risk reduction for network-based security controls, including wired and wireless networking.
• Administrative processes and technologies configure boundary devices (e.g., firewalls, routers, etc.) to deny network traffic by default and allow network traffic by exception (e.g., deny all, permit by exception).
• Technologies automate the Access Control Lists (ACLs) and similar rulesets review process to identify security issues and/ or misconfigurations.
• Network segmentation exists to implement separate network addresses (e.g., different subnets) to connect systems in different security domains (e.g., sensitive/regulated data environments).
• Administrative processes and technologies confine wireless communications to organization-controlled boundaries. | See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to confine wireless communications to organization-controlled boundaries. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to confine wireless communications to organization-controlled boundaries. | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | AC-18(5) | null | null | AC-18(5) | AC-18(5) | null | null | null | AC-18(5) | null | null | null | null | AC-18(5) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | N.8.5 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | AC-18(5) | null | null | AC-18(5) | null | AC-18(5) | null | null | AC-18(5) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 4.23 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 1338
1013 | null | null | null | null | null | null | null | null | null | null | null | null | null | 18.2.33.C.01 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | null | x | null | R-AC-4
R-AM-2
R-BC-1
R-BC-2
R-BC-4
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-7
R-GV-1
R-GV-2
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-IR-1
R-IR-2
R-IR-4
R-SA-1 | null | null | null | R-AC-4 | null | R-AM-2 | null | R-BC-1 | R-BC-2 | null | R-BC-4 | null | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | R-EX-7 | R-GV-1 | R-GV-2 | null | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | null | R-IR-1 | R-IR-2 | null | R-IR-4 | R-SA-1 | null | NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | null | null | NT-11 | NT-12 | NT-13 | NT-14 | MT-1 | MT-2 | MT-3 | MT-4 | MT-5 | MT-6 | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Network Security | Rogue Wireless Detection | NET-15.5 | Mechanisms exist to test for the presence of Wireless Access Points (WAPs) and identify all authorized and unauthorized WAPs within the facility(ies). | null | E-NET-02 | Does the organization test for the presence of Wireless Access Points (WAPs) and identify all authorized and unauthorized WAPs within the facility(ies)? | 8 | Detect | null | X | X | There is no evidence of a capability to test for the presence of Wireless Access Points (WAPs) and identify all authorized and unauthorized WAPs within the facility(ies). | Network Security (NET) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• IT personnel use an informal process to design, build and maintain secure networks for test, development, staging and production environments, including the implementation of appropriate cybersecurity & data privacy controls.
• Administrative processes are used to configure boundary devices (e.g., firewalls, routers, etc.) to deny network traffic by default and allow network traffic by exception (e.g., deny all, permit by exception).
• Network monitoring is primarily reactive in nature. | Network Security (NET) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Network security management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for network security management.
• IT personnel define secure networking practices to protect the confidentiality, integrity, availability and safety of the organization’s technology assets, data and network(s).
• Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• Administrative processes are used to configure boundary devices (e.g., firewalls, routers, etc.) to deny network traffic by default and allow network traffic by exception (e.g., deny all, permit by exception).
• Network segmentation exists to implement separate network addresses (e.g., different subnets) to connect systems in different security domains (e.g., sensitive/regulated data environments).
• IT/cybersecurity personnel receive feeds from Wireless Intrusion Detection / Protection Systems (WIDS / WIPS) to identify rogue wireless devices and to detect attack attempts via wireless networks. | Network Security (NET) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A Technology Infrastructure team, or similar function, defines centrally-managed network security controls for implementation across the enterprise.
• IT/cybersecurity architects work with the Technology Infrastructure team to implement a “layered defense” network architecture that provides a defense-in-depth approach for redundancy and risk reduction for network-based security controls, including wired and wireless networking.
• Administrative processes and technologies configure boundary devices (e.g., firewalls, routers, etc.) to deny network traffic by default and allow network traffic by exception (e.g., deny all, permit by exception).
• Technologies automate the Access Control Lists (ACLs) and similar rulesets review process to identify security issues and/ or misconfigurations.
• Network segmentation exists to implement separate network addresses (e.g., different subnets) to connect systems in different security domains (e.g., sensitive/regulated data environments).
• A SOC, or similar function receives feeds from Wireless Intrusion Detection / Protection Systems (WIDS / WIPS) to identify rogue wireless devices and to detect attack attempts via wireless networks. | Network Security (NET) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | Network Security (NET) efforts are “world-class” capabilities that leverage predictive analysis (e.g., machine learning, AI, etc.). In addition to CMM Level 4 criteria, CMM Level 5 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Stakeholders make time-sensitive decisions to support operational efficiency, which may include automated remediation actions.
▪ Based on predictive analysis, process improvements are implemented according to “continuous improvement” practices that affect process changes. | null | null | null | null | null | null | null | null | null | null | MON-10
SWS-06 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 11.1
11.1.1
11.1.2 | 11.2
11.2.1 | null | null | null | null | 11.2.1 | null | 11.2.1 | 11.2.1 | null | N.8.5 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | B2.b | null | null | null | null | null | null | null | null | null | 0829 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | null | null | null | R-AC-1
R-AC-4
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-7
R-GV-1
R-GV-2
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-IR-1
R-IR-2
R-IR-4
R-SA-1 | R-AC-1 | null | null | R-AC-4 | null | null | R-AM-3 | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | null | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | R-EX-7 | R-GV-1 | R-GV-2 | null | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | null | R-IR-1 | R-IR-2 | null | R-IR-4 | R-SA-1 | null | NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | null | null | NT-11 | NT-12 | NT-13 | NT-14 | MT-1 | MT-2 | MT-3 | MT-4 | MT-5 | MT-6 | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Network Security | Intranets | NET-16 | Mechanisms exist to establish trust relationships with other organizations owning, operating, and/or maintaining intranet systems, allowing authorized individuals to:
▪ Access the intranet from external systems; and
▪ Process, store, and/or transmit organization-controlled information using the external systems. | null | null | Does the organization establish trust relationships with other organizations owning, operating, and/or maintaining intranet systems, allowing authorized individuals to:
▪ Access the intranet from external systems; and
▪ Process, store, and/or transmit organization-controlled information using the external systems? | 8 | Protect | null | X | X | There is no evidence of a capability to establish trust relationships with other organizations owning, operating, and/ or maintaining intranet systems, allowing authorized individuals to:
▪ Access the intranet from external systems; and
▪ Process, store, and/ or transmit organization-controlled information using the external systems. | Network Security (NET) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• IT personnel use an informal process to design, build and maintain secure networks for test, development, staging and production environments, including the implementation of appropriate cybersecurity & data privacy controls.
• Administrative processes are used to configure boundary devices (e.g., firewalls, routers, etc.) to deny network traffic by default and allow network traffic by exception (e.g., deny all, permit by exception).
• Network monitoring is primarily reactive in nature. | Network Security (NET) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Network security management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for network security management.
• IT personnel define secure networking practices to protect the confidentiality, integrity, availability and safety of the organization’s technology assets, data and network(s).
• Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• Administrative processes are used to configure boundary devices (e.g., firewalls, routers, etc.) to deny network traffic by default and allow network traffic by exception (e.g., deny all, permit by exception).
• Network segmentation exists to implement separate network addresses (e.g., different subnets) to connect systems in different security domains (e.g., sensitive/regulated data environments).
• Administrative processes and technologies establish trust relationships with other organizations owning, operating, and/ or maintaining intranet systems, allowing authorized individuals to access the intranet from external systems, as well as process, store, and/ or transmit organization-controlled information using the external systems. | Network Security (NET) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A Technology Infrastructure team, or similar function, defines centrally-managed network security controls for implementation across the enterprise.
• IT/cybersecurity architects work with the Technology Infrastructure team to implement a “layered defense” network architecture that provides a defense-in-depth approach for redundancy and risk reduction for network-based security controls, including wired and wireless networking.
• Administrative processes and technologies configure boundary devices (e.g., firewalls, routers, etc.) to deny network traffic by default and allow network traffic by exception (e.g., deny all, permit by exception).
• Technologies automate the Access Control Lists (ACLs) and similar rulesets review process to identify security issues and/ or misconfigurations.
• Network segmentation exists to implement separate network addresses (e.g., different subnets) to connect systems in different security domains (e.g., sensitive/regulated data environments).
• Administrative processes and technologies establish trust relationships with other organizations owning, operating, and/ or maintaining intranet systems, allowing authorized individuals to access the intranet from external systems, as well as process, store, and/ or transmit organization-controlled information using the external systems. | Network Security (NET) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to establish trust relationships with other organizations owning, operating, and/ or maintaining intranet systems, allowing authorized individuals to:
▪ Access the intranet from external systems; and
▪ Process, store, and/ or transmit organization-controlled information using the external systems. | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 6.11.1.3 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | H.2.4 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | null | null | null | R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1 | R-AC-1 | R-AC-2 | R-AC-3 | R-AC-4 | R-AM-1 | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | R-EX-6 | R-EX-7 | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | R-GV-8 | R-IR-1 | R-IR-2 | R-IR-3 | R-IR-4 | R-SA-1 | null | NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | null | null | NT-11 | NT-12 | NT-13 | NT-14 | MT-1 | MT-2 | MT-3 | MT-4 | MT-5 | MT-6 | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Network Security | Data Loss Prevention (DLP) | NET-17 | Automated mechanisms exist to implement Data Loss Prevention (DLP) to protect sensitive information as it is stored, transmitted and processed. | - Data Loss Prevention (DLP) | null | Does the organization use automated mechanisms to implement Data Loss Prevention (DLP) to protect sensitive information as it is stored, transmitted and processed? | 8 | Protect | null | X | X | There is no evidence of a capability to implement Data Loss Prevention (DLP) to protect sensitive information as it is stored, transmitted and processed. | SP-CMM1 is N/A, since a structured process is required to implement Data Loss Prevention (DLP) to protect sensitive information as it is stored, transmitted and processed. | Network Security (NET) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Network security management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for network security management.
• IT personnel define secure networking practices to protect the confidentiality, integrity, availability and safety of the organization’s technology assets, data and network(s).
• Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• Administrative processes are used to configure boundary devices (e.g., firewalls, routers, etc.) to deny network traffic by default and allow network traffic by exception (e.g., deny all, permit by exception).
• Network segmentation exists to implement separate network addresses (e.g., different subnets) to connect systems in different security domains (e.g., sensitive/regulated data environments).
• Technologies are configured to implement Data Loss Prevention (DLP) techniques to protect sensitive/regulated data as it is stored, transmitted and processed.
• DLP prevents unauthorized devices from connecting to endpoint devices to control the distribution of sensitive/regulated data. | Network Security (NET) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A Technology Infrastructure team, or similar function, defines centrally-managed network security controls for implementation across the enterprise.
• IT/cybersecurity architects work with the Technology Infrastructure team to implement a “layered defense” network architecture that provides a defense-in-depth approach for redundancy and risk reduction for network-based security controls, including wired and wireless networking.
• Administrative processes and technologies configure boundary devices (e.g., firewalls, routers, etc.) to deny network traffic by default and allow network traffic by exception (e.g., deny all, permit by exception).
• Technologies automate the Access Control Lists (ACLs) and similar rulesets review process to identify security issues and/ or misconfigurations.
• Network segmentation exists to implement separate network addresses (e.g., different subnets) to connect systems in different security domains (e.g., sensitive/regulated data environments).
• Technologies are configured to implement Data Loss Prevention (DLP) techniques to protect sensitive/regulated data as it is stored, transmitted and processed.
• DLP prevents unauthorized devices from connecting to endpoint devices to control the distribution of sensitive/regulated data. | Network Security (NET) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | Network Security (NET) efforts are “world-class” capabilities that leverage predictive analysis (e.g., machine learning, AI, etc.). In addition to CMM Level 4 criteria, CMM Level 5 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Stakeholders make time-sensitive decisions to support operational efficiency, which may include automated remediation actions.
▪ Based on predictive analysis, process improvements are implemented according to “continuous improvement” practices that affect process changes. | null | CC6.7-POF1 | null | 3.13 | null | null | 3.13 | null | null | UEM-11 | DAT-02 | null | null | null | null | null | null | null | null | null | null | null | 6.5.3.1 | null | null | null | null | TS-1.8 | null | null | null | null | null | null | SC-7(10) | null | null | null | SC-7(10)
SI-4(18) | null | null | null | null | SC-7(10)
SI-4(18) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | A3.2.6 | null | null | null | null | null | null | null | null | null | D.10.2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 4.M.E | 4.M.E
4.L.A | SI-4(18) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 2-6-1-2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 4.1
4.2 | 3.2.5 | null | null | null | null | null | null | null | null | null | null | x | null | null | x | R-AM-3
R-BC-2
R-BC-4
R-BC-5
R-GV-1
R-GV-2
R-IR-4
R-SA-1 | null | null | null | null | null | null | R-AM-3 | null | R-BC-2 | null | R-BC-4 | R-BC-5 | null | null | null | null | null | null | null | R-GV-1 | R-GV-2 | null | null | null | null | null | null | null | null | null | R-IR-4 | R-SA-1 | null | NT-7
MT-1
MT-2
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | null | null | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | null | null | null |
Network Security | DNS & Content Filtering | NET-18 | Mechanisms exist to force Internet-bound network traffic through a proxy device for URL content filtering and DNS filtering to limit a user's ability to connect to dangerous or prohibited Internet sites. | null | E-NET-01 | Does the organization force Internet-bound network traffic through a proxy device for URL content filtering and DNS filtering to limit a user's ability to connect to dangerous or prohibited Internet sites? | 9 | Protect | null | X | X | There is no evidence of a capability to force Internet-bound network traffic through a proxy device for URL content filtering and DNS filtering to limit a user's ability to connect to dangerous or prohibited Internet sites. | Network Security (NET) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• IT personnel use an informal process to design, build and maintain secure networks for test, development, staging and production environments, including the implementation of appropriate cybersecurity & data privacy controls.
• Administrative processes are used to configure boundary devices (e.g., firewalls, routers, etc.) to deny network traffic by default and allow network traffic by exception (e.g., deny all, permit by exception).
• Network monitoring is primarily reactive in nature. | Network Security (NET) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Network security management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for network security management.
• IT personnel define secure networking practices to protect the confidentiality, integrity, availability and safety of the organization’s technology assets, data and network(s).
• Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• Administrative processes are used to configure boundary devices (e.g., firewalls, routers, etc.) to deny network traffic by default and allow network traffic by exception (e.g., deny all, permit by exception).
• Network segmentation exists to implement separate network addresses (e.g., different subnets) to connect systems in different security domains (e.g., sensitive/regulated data environments).
• Technologies are configured to force Internet-bound network traffic through a proxy device for URL content filtering to limit a user's ability to connect to prohibited content. | Network Security (NET) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A Technology Infrastructure team, or similar function, defines centrally-managed network security controls for implementation across the enterprise.
• IT/cybersecurity architects work with the Technology Infrastructure team to implement a “layered defense” network architecture that provides a defense-in-depth approach for redundancy and risk reduction for network-based security controls, including wired and wireless networking.
• Administrative processes and technologies configure boundary devices (e.g., firewalls, routers, etc.) to deny network traffic by default and allow network traffic by exception (e.g., deny all, permit by exception).
• Technologies automate the Access Control Lists (ACLs) and similar rulesets review process to identify security issues and/ or misconfigurations.
• Network segmentation exists to implement separate network addresses (e.g., different subnets) to connect systems in different security domains (e.g., sensitive/regulated data environments).
• Technologies are configured to force Internet-bound network traffic through a proxy device for URL content filtering to limit a user's ability to connect to prohibited content. | Network Security (NET) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | Network Security (NET) efforts are “world-class” capabilities that leverage predictive analysis (e.g., machine learning, AI, etc.). In addition to CMM Level 4 criteria, CMM Level 5 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Stakeholders make time-sensitive decisions to support operational efficiency, which may include automated remediation actions.
▪ Based on predictive analysis, process improvements are implemented according to “continuous improvement” practices that affect process changes. | null | null | null | 9.0
9.2
9.3
13.10 | 9.2 | 9.2
9.3 | 9.2
9.3
13.10 | null | null | null | null | null | null | null | null | null | null | null | null | 5.14
8.23 | null | null | null | null | null | null | null | TS-2.10 | null | null | null | null | null | null | SC-7(8)
SC-18(3) | null | null | SC-7(8) | SC-7(8)
SC-18(3) | null | null | SC-7(8) | SC-7(8) | SC-18(3) | null | null | SC-7(8) | SC-7(8) | null | null | null | null | null | null | null | 3.1.3 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | D.10.10 | 1.4 | null | null | null | null | null | null | null | null | null | AC.L2-3.1.3 | null | null | AC.L2-3.1.3 | AC.L2-3.1.3 | SC-7(8) | null | null | null | null | null | null | null | SC-7(8) | null | SC-7(8) | SC-7(8) | null | SC-7(8) | null | SC-7(8) | SC-7(8) | null | null | null | null | null | null | null | 8.S.A | 6.M.D | 6.M.D
6.L.B | SC-7(8) | null | null | null | null | 6.8 | null | null | null | null | null | null | SC-7(8) | III.D.1.b
III.D.1.c
III.D.1.e
III.D.2.a | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | SC-7(8) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 9.14 | null | null | null | null | null | null | null | null | null | null | null | null | TPC-57 | null | 2-5-3-3
2-5-3-8 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 1234
1502
0963
0961
0958
1171
1236
0659
1524
0649
1287 | null | null | null | null | null | null | null | null | null | null | null | null | null | 9.3.6.C.01
14.3.6.C.01
14.3.6.C.02
14.3.6.C.03
14.3.10.C.01
14.3.10.C.02
14.3.10.C.03
14.3.10.C.04
14.3.11.C.01
14.3.11.C.02
14.3.12.C.01
20.3.4.C.01
20.3.4.C.02
20.3.5.C.01
20.3.5.C.02
20.3.6.C.01
20.3.7.C.01
20.3.7.C.02
20.3.8.C.01
20.3.9.C.01
20.3.10.C.01
20.3.11.C.01
20.3.11.C.02
20.3.11.C.03
20.3.12.C.01
20.3.12.C.02
20.3.13.C.01
20.3.13.C.02
20.3.14.C.01
20.3.15.C.01
20.3.15.C.02
20.3.16.C.01 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | null | null | x | R-AM-3
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-7
R-GV-1
R-GV-2
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-SA-1 | null | null | null | null | null | null | R-AM-3 | null | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | R-EX-7 | R-GV-1 | R-GV-2 | null | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | R-GV-8 | R-IR-1 | null | null | null | R-SA-1 | null | NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | NT-9 | NT-10 | NT-11 | NT-12 | NT-13 | NT-14 | MT-1 | MT-2 | MT-3 | MT-4 | MT-5 | MT-6 | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Network Security | Route Traffic to Proxy Servers | NET-18.1 | Mechanisms exist to route internal communications traffic to external networks through organization-approved proxy servers at managed interfaces. | null | E-NET-01 | Does the organization route internal communications traffic to external networks through organization-approved proxy servers at managed interfaces? | 9 | Protect | null | null | X | There is no evidence of a capability to route internal communications traffic to external networks through organization-approved proxy servers at managed interfaces. | Network Security (NET) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• IT personnel use an informal process to design, build and maintain secure networks for test, development, staging and production environments, including the implementation of appropriate cybersecurity & data privacy controls.
• Administrative processes are used to configure boundary devices (e.g., firewalls, routers, etc.) to deny network traffic by default and allow network traffic by exception (e.g., deny all, permit by exception).
• Network monitoring is primarily reactive in nature. | Network Security (NET) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Network security management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for network security management.
• IT personnel define secure networking practices to protect the confidentiality, integrity, availability and safety of the organization’s technology assets, data and network(s).
• Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• Administrative processes are used to configure boundary devices (e.g., firewalls, routers, etc.) to deny network traffic by default and allow network traffic by exception (e.g., deny all, permit by exception).
• Network segmentation exists to implement separate network addresses (e.g., different subnets) to connect systems in different security domains (e.g., sensitive/regulated data environments).
• Technologies are configured to force Internet-bound network traffic through a proxy device for URL content filtering to limit a user's ability to connect to prohibited content. | Network Security (NET) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A Technology Infrastructure team, or similar function, defines centrally-managed network security controls for implementation across the enterprise.
• IT/cybersecurity architects work with the Technology Infrastructure team to implement a “layered defense” network architecture that provides a defense-in-depth approach for redundancy and risk reduction for network-based security controls, including wired and wireless networking.
• Administrative processes and technologies configure boundary devices (e.g., firewalls, routers, etc.) to deny network traffic by default and allow network traffic by exception (e.g., deny all, permit by exception).
• Technologies automate the Access Control Lists (ACLs) and similar rulesets review process to identify security issues and/ or misconfigurations.
• Network segmentation exists to implement separate network addresses (e.g., different subnets) to connect systems in different security domains (e.g., sensitive/regulated data environments).
• Technologies are configured to force Internet-bound network traffic through a proxy device for URL content filtering to limit a user's ability to connect to prohibited content. | See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to route internal communications traffic to external networks through organization-approved proxy servers at managed interfaces. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to route internal communications traffic to external networks through organization-approved proxy servers at managed interfaces. | null | null | null | 13.10 | null | null | 13.10 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | TS-2.8 | null | null | null | null | null | null | SC-7(8) | null | null | SC-7(8) | SC-7(8) | null | null | SC-7(8) | SC-7(8) | null | null | null | SC-7(8) | SC-7(8) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 1.3 | null | null | null | null | null | null | null | null | null | null | J.7.3 | 1.4 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | SC-7(8) | null | null | null | null | null | null | null | SC-7(8) | null | SC-7(8) | SC-7(8) | null | SC-7(8) | null | SC-7(8) | SC-7(8) | null | null | null | null | null | null | null | null | 6.M.D | 6.M.D
6.L.B | SC-7(8) | null | null | null | null | 6.8 | null | null | null | null | null | null | SC-7(8) | III.D.1.b | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | SC-7(8) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 9.14 | null | null | null | null | null | null | null | null | null | null | null | 2-4-1-3 | null | null | 2-5-3-8 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0570
0260
1237 | null | null | null | null | null | null | null | null | null | null | null | null | null | 14.3.6.C.01
14.3.6.C.02
14.3.6.C.03 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | null | null | x | R-AM-3
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-7
R-GV-1
R-GV-2
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-SA-1 | null | null | null | null | null | null | R-AM-3 | null | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | R-EX-7 | R-GV-1 | R-GV-2 | null | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | R-GV-8 | R-IR-1 | null | null | null | R-SA-1 | null | NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | NT-9 | NT-10 | NT-11 | NT-12 | NT-13 | NT-14 | MT-1 | MT-2 | MT-3 | MT-4 | MT-5 | MT-6 | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Network Security | Visibility of Encrypted Communications | NET-18.2 | Mechanisms exist to configure the proxy to make encrypted communications traffic visible to monitoring tools and mechanisms. | null | null | Does the organization configure the proxy to make encrypted communications traffic visible to monitoring tools and mechanisms? | 5 | Detect | null | X | X | There is no evidence of a capability to configure the proxy to make encrypted communications traffic visible to monitoring tools and mechanisms. | SP-CMM1 is N/A, since a structured process is required to configure the proxy to make encrypted communications traffic visible to monitoring tools and mechanisms. | Network Security (NET) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Network security management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for network security management.
• IT personnel define secure networking practices to protect the confidentiality, integrity, availability and safety of the organization’s technology assets, data and network(s).
• Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• Administrative processes are used to configure boundary devices (e.g., firewalls, routers, etc.) to deny network traffic by default and allow network traffic by exception (e.g., deny all, permit by exception).
• Network segmentation exists to implement separate network addresses (e.g., different subnets) to connect systems in different security domains (e.g., sensitive/regulated data environments).
• Technologies are configured to force Internet-bound network traffic through a proxy device for URL content filtering to limit a user's ability to connect to prohibited content. | Network Security (NET) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A Technology Infrastructure team, or similar function, defines centrally-managed network security controls for implementation across the enterprise.
• IT/cybersecurity architects work with the Technology Infrastructure team to implement a “layered defense” network architecture that provides a defense-in-depth approach for redundancy and risk reduction for network-based security controls, including wired and wireless networking.
• Administrative processes and technologies configure boundary devices (e.g., firewalls, routers, etc.) to deny network traffic by default and allow network traffic by exception (e.g., deny all, permit by exception).
• Technologies automate the Access Control Lists (ACLs) and similar rulesets review process to identify security issues and/ or misconfigurations.
• Network segmentation exists to implement separate network addresses (e.g., different subnets) to connect systems in different security domains (e.g., sensitive/regulated data environments).
• Technologies are configured to force Internet-bound network traffic through a proxy device for URL content filtering to limit a user's ability to connect to prohibited content.
• Content filtering restricts unauthorized content, when transferring information between different security domains. | See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to configure the proxy to make encrypted communications traffic visible to monitoring tools and mechanisms. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to configure the proxy to make encrypted communications traffic visible to monitoring tools and mechanisms. | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | SI-4(10) | null | null | null | SI-4(10) | null | null | null | null | SI-4(10) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | D.10.10 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | SI-4(10) | null | null | SI-4(10) | null | null | null | null | null | null | null | null | null | null | SI-4(10) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 1293
0263 | null | null | null | null | null | null | null | null | null | null | null | null | null | 14.3.8.C.01
14.3.9.C.01
20.3.14.C.01 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | R-AM-3
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-7
R-GV-1
R-GV-2
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-SA-1 | null | null | null | null | null | null | R-AM-3 | null | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | R-EX-7 | R-GV-1 | R-GV-2 | null | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | R-GV-8 | R-IR-1 | null | null | null | R-SA-1 | null | NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | NT-9 | NT-10 | NT-11 | NT-12 | NT-13 | NT-14 | MT-1 | MT-2 | MT-3 | MT-4 | MT-5 | MT-6 | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Network Security | Route Privileged Network Access | NET-18.3 | Automated mechanisms exist to route networked, privileged accesses through a dedicated, managed interface for purposes of access control and auditing. | null | null | Does the organization use automated mechanisms to route networked, privileged accesses through a dedicated, managed interface for purposes of access control and auditing? | 1 | Detect | null | null | X | There is no evidence of a capability to route networked, privileged accesses through a dedicated, managed interface for purposes of access control and auditing. | SP-CMM1 is N/A, since a structured process is required to route networked, privileged accesses through a dedicated, managed interface for purposes of access control and auditing. | SP-CMM2 is N/A, since a well-defined process is required to route networked, privileged accesses through a dedicated, managed interface for purposes of access control and auditing. | Network Security (NET) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A Technology Infrastructure team, or similar function, defines centrally-managed network security controls for implementation across the enterprise.
• IT/cybersecurity architects work with the Technology Infrastructure team to implement a “layered defense” network architecture that provides a defense-in-depth approach for redundancy and risk reduction for network-based security controls, including wired and wireless networking.
• Administrative processes and technologies configure boundary devices (e.g., firewalls, routers, etc.) to deny network traffic by default and allow network traffic by exception (e.g., deny all, permit by exception).
• Technologies automate the Access Control Lists (ACLs) and similar rulesets review process to identify security issues and/ or misconfigurations.
• Network segmentation exists to implement separate network addresses (e.g., different subnets) to connect systems in different security domains (e.g., sensitive/regulated data environments).
• Technologies are configured to route internal communications traffic to external networks through organization-approved proxy servers at managed interfaces.
• Content filtering restricts unauthorized content, when transferring information between different security domains. | See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to route networked, privileged accesses through a dedicated, managed interface for purposes of access control and auditing. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to route networked, privileged accesses through a dedicated, managed interface for purposes of access control and auditing. | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | SC-7(15) | null | null | null | null | SC-7(15) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | SC-7(15) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Principle 5.2 | Principle 5.4
Principle 5.9 | Principle 5.5 | null | null | 1653 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-3
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1 | R-AC-1 | R-AC-2 | R-AC-3 | R-AC-4 | null | null | R-AM-3 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | R-IR-1 | R-IR-2 | R-IR-3 | R-IR-4 | R-SA-1 | null | NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14 | null | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | NT-9 | NT-10 | NT-11 | NT-12 | NT-13 | NT-14 | MT-1 | MT-2 | MT-3 | MT-4 | MT-5 | MT-6 | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | null | null | null |
Physical & Environmental Security | Physical & Environmental Protections | PES-01 | Mechanisms exist to facilitate the operation of physical and environmental protection controls. | null | E-PES-01 | Does the organization facilitate the operation of physical and environmental protection controls? | 9 | Protect | X | X | X | There is no evidence of a capability to facilitate the operation of physical and environmental protection controls. | Physical & Environmental Security (PES) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Physical access control is decentralized.
• Physical security controls are primarily administrative in nature (e.g., policies & standards), focusing on protecting High Value Assets (HVAs).
• Human Resources, or a similar function, maintains a current list of personnel and facilitates the implementation of physical access management controls.
• IT personnel implement appropriate physical security practices to protect the confidentiality, integrity, availability and safety of the organization’s technology assets and data. | Physical & Environmental Security (PES) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Physical access control is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for physical access control.
• Human Resources, or a similar function, maintains a current list of personnel with authorized access to organizational facilities and facilitates the implementation of physical access management controls.
• Physical security controls are primarily administrative in nature (e.g., policies & standards).
• Physical controls, administrative processes and technologies are primarily designed and implemented for offices, rooms and facilities that focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• A facilities maintenance team, or similar function, manages the operation of automated physical and environmental protection controls. | Physical & Environmental Security (PES) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• The Chief Information Security Officer (CISO), or similar function, analyzes the organization’s business strategy to determine prioritized and authoritative guidance for physical access control practices.
• The CISO, or similar function, develops a security-focused Concept of Operations (CONOPS) that documents management, operational and technical measures to apply defense-in-depth techniques across the enterprise for physical access controls.
• A Governance, Risk & Compliance (GRC) function, or similar function, provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data with regards to physical access controls.
• A steering committee is formally established to provide executive oversight of the cybersecurity & data privacy program, including physical access controls.
• A physical security team, or similar function:
o Performs the centralized-management of physical security controls across the enterprise.
o Maintains a current list of personnel with authorized access to organizational facilities and implements physical access management controls.
• A facilities maintenance team, or similar function, manages the operation of environmental protection controls.
• Administrative processes exist to authorize physical access to facilities based on the position or role of the individual.
• Administrative processes and physical controls restrict unescorted access to facilities to personnel with required security clearances, formal access authorizations and validated the need for access. | Physical & Environmental Security (PES) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to facilitate the operation of physical and environmental protection controls. | CC6.4
A1.2 | CC6.4-POF1
CC6.4-POF2
A1.2-POF1
A1.2-POF2
A1.2-POF3
A1.2-POF4
A1.2-POF5
A1.2-POF6
A1.2-POF7
A1.2-POF8
A1.2-POF9
A1.2-POF10 | null | null | null | null | null | DSS01.04
DSS01.05
DSS05.05 | null | DCS-03 | PHY-01 | SO9 | 8.2.3
8.2.4 | null | null | null | null | null | 11.1.4 | 5.14
5.15
5.18
7.1
7.5 | 11.1.4 | null | 6.8.1.4
6.15.1.4 | null | null | null | null | OR-3.1
PS-1.0
PS-1.2
PS-1.5
PS-2.0 | Sec 4(D)(2)(b)
Sec 4(D)(2)(c) | null | PR.AC-P2
PR.PO-P4 | null | null | null | PE-1 | PE-1 | PE-1 | PE-1 | PE-1
PE-23 | null | PE-1 | PE-1 | PE-1 | PE-23 | null | PE-1 | PE-1 | PE-1 | null | PE-1 | PE-1 | null | PE-1 | PE-1 | PE-1 | 3.10.2
NFO - PE-1 | 3.10.7.a
3.10.7.a.1
3.10.7.a.2
3.10.7.b
3.10.7.c
3.10.7.d | 3.10.2[a]
3.10.2[b]
3.10.2[c]
3.10.2[d] | null | null | null | null | PR.AA
PR.AA-06 | null | null | 9.1
9.1.1
9.1.2 | null | null | null | 9.1.1 | 9.1.1 | 9.1.1 | 9.1.1
9.1.2 | 9.1.1
9.1.2 | 9.1.1 | F.1 | 3.1 | 3.1.1
8.1.2
8.1.3
8.2.6
8.2.7
8.4.2
8.4.3
8.5.2 | null | null | null | ACCESS-3.A.MIL1
ACCESS-3.D.MIL2
ACCESS-3.E.MIL2
ACCESS-3.F.MIL2
ACCESS-3.G.MIL2
ACCESS-3.H.MIL2 | AM:SG1.SP1 | null | 5.9
5.9.1 | null | PE.L2-3.10.2 | PE.L2-3.10.2 | null | PE.L2-3.10.2 | PE.L2-3.10.2 | PE-1 | null | null | null | null | null | null | null | PE-1 | PE-1 | PE-1 | PE-1 | PE-1 | PE-1 | PE-1 | PE-1 | PE-1 | PE-1 | null | null | null | null | null | 164.310
164.310(a)
164.310(a)(1)
164.310(a)(2)(ii) | 6.S.B | 4.M.C | 4.M.C | 2.B.3
2.B.3.4
PE-1 | null | CIP-006-6
R1 & R3 | 8-308 | 10.6
11.1
11.2
11.3 | null | null | null | null | null | PE-1 | PE-1 | PE-1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 38-99-20(D)(2)(b)
38-99-20(D)(2)(c) | null | null | PE-1 | PE-1 | PE-1 | null | null | § 2447(b)(7) | 3.4.3(33) | null | null | Art 32.1
Art 32.2 | null | null | null | Sec 14
Sec 15 | Art 16 | null | null | null | null | null | null | PS-01 | null | null | null | 9.15
12.27
18.1
18.2
18.10 | null | null | null | null | null | null | null | null | null | null | null | 2-3 | TPC-46 | 3.3.2 | 2-3-1
2-3-2
2-3-4
2-14-1
2-14-2
2-14-3
2-14-4 | 2-13
2-13-1
2-13-1-8
2-13-1-9
2-13-2 | null | null | Sec 19 | null | null | null | null | null | null | B2.a | null | null | null | null | null | null | null | null | null | 0810 | null | null | null | null | null | null | null | null | null | null | 11.1.4 | null | 7.1 | 5.7.4.C.01
8.1.10.C.01 | null | null | null | null | 8.5.1
8.5.2
8.5.5
8.5.6(a)
8.5.6(b)
8.5.6(c)
8.5.6(d)
8.5.6(e)
8.5.6(f) | null | null | null | null | null | null | null | null | 3.2.10 | null | null | null | null | null | null | null | null | null | null | x | NAIC | x | null | R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-4
R-SA-1
R-SA-2 | R-AC-1 | R-AC-2 | R-AC-3 | R-AC-4 | R-AM-1 | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | R-EX-7 | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | R-GV-8 | R-IR-1 | R-IR-2 | null | R-IR-4 | R-SA-1 | R-SA-2 | NT-1
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15
MT-16 | NT-1 | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | NT-9 | NT-10 | NT-11 | NT-12 | NT-13 | NT-14 | MT-1 | MT-2 | MT-3 | MT-4 | MT-5 | MT-6 | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | MT-16 | null |
Physical & Environmental Security | Site Security Plan (SitePlan) | PES-01.1 | Mechanisms exist to document a Site Security Plan (SitePlan) for each server and communications room to summarize the implemented security controls to protect physical access to technology assets, as well as applicable risks and threats. | null | E-PES-04 | Does the organization document a Site Security Plan (SitePlan) for each server and communications room to summarize the implemented security controls to protect physical access to technology assets, as well as applicable risks and threats? | 4 | Identify | X | X | null | There is no evidence of a capability to document a Site Security Plan (SitePlan) for each server and communications room to summarize the implemented security controls to protect physical access to technology assets, as well as applicable risks and threats. | SP-CMM1 is N/A, since a structured process is required to document a Site Security Plan (SitePlan) for each server and communications room to summarize the implemented security controls to protect physical access to technology assets, as well as applicable risks and threats. | Physical & Environmental Security (PES) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Physical access control is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for physical access control.
• Human Resources, or a similar function, maintains a current list of personnel with authorized access to organizational facilities and facilitates the implementation of physical access management controls.
• Physical security controls are primarily administrative in nature (e.g., policies & standards).
• Physical controls, administrative processes and technologies are primarily designed and implemented for offices, rooms and facilities that focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• A facilities maintenance team, or similar function, manages the operation of automated physical and environmental protection controls.
• Administrative processes exist to ensure Business process owners (BPOs) develop and maintain System Security Plans (SSPs) or similar documentation, to identify and maintain key architectural information on each business-critical system, application or service. | Physical & Environmental Security (PES) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A physical security team, or similar function:
o Performs the centralized-management of physical security controls across the enterprise.
o Maintains a current list of personnel with authorized access to organizational facilities and implements physical access management controls.
• A facilities maintenance team, or similar function, manages the operation of environmental protection controls.
• Administrative processes exist to authorize physical access to facilities based on the position or role of the individual.
• Administrative processes and physical controls restrict unescorted access to facilities to personnel with required security clearances, formal access authorizations and validated the need for access.
• Administrative processes exist to ensure Business Process Owners (BPOs) develop and maintain System Security Plans (SSPs) or similar documentation, to identify and maintain key architectural information on each business-critical system, application or service. | See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to document a Site Security Plan (SitePlan) for each server and communications room to summarize the implemented security controls to protect physical access to technology assets, as well as applicable risks and threats. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to document a Site Security Plan (SitePlan) for each server and communications room to summarize the implemented security controls to protect physical access to technology assets, as well as applicable risks and threats. | null | null | null | null | null | null | null | null | null | DCS-11 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | F.1.2 | null | 3.1.1
8.4.2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 8.1.1 [MP.IF.1] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 8.2.7.C.01 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1 | R-AC-1 | R-AC-2 | R-AC-3 | R-AC-4 | R-AM-1 | R-AM-2 | null | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | R-EX-6 | R-EX-7 | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | null | R-IR-1 | R-IR-2 | R-IR-3 | R-IR-4 | R-SA-1 | null | NT-7
MT-1
MT-2
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | null | null | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Physical & Environmental Security | Physical Access Authorizations | PES-02 | Physical access control mechanisms exist to maintain a current list of personnel with authorized access to organizational facilities (except for those areas within the facility officially designated as publicly accessible). | null | E-PES-03 | Does the organization maintain a current list of personnel with authorized access to organizational facilities (except for those areas within the facility officially designated as publicly accessible)? | 7 | Protect | null | X | X | There is no evidence of a capability to maintain a current list of personnel with authorized access to organizational facilities (except for those areas within the facility officially designated as publicly accessible). | Physical & Environmental Security (PES) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Physical access control is decentralized.
• Physical security controls are primarily administrative in nature (e.g., policies & standards), focusing on protecting High Value Assets (HVAs).
• Human Resources, or a similar function, maintains a current list of personnel and facilitates the implementation of physical access management controls. | Physical & Environmental Security (PES) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Physical access control is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for physical access control.
• Human Resources, or a similar function, maintains a current list of personnel with authorized access to organizational facilities and facilitates the implementation of physical access management controls.
• Physical security controls are primarily administrative in nature (e.g., policies & standards).
• Physical controls, administrative processes and technologies are primarily designed and implemented for offices, rooms and facilities that focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• A facilities maintenance team, or similar function, manages the operation of automated physical and environmental protection controls. | Physical & Environmental Security (PES) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A physical security team, or similar function:
o Performs the centralized-management of physical security controls across the enterprise.
o Maintains a current list of personnel with authorized access to organizational facilities and implements physical access management controls.
• A facilities maintenance team, or similar function, manages the operation of environmental protection controls.
• Administrative processes exist to authorize physical access to facilities based on the position or role of the individual.
• Administrative processes and physical controls restrict unescorted access to facilities to personnel with required security clearances, formal access authorizations and validated the need for access.
• An Identity and Access Management (IAM), or similar function, centrally manages permissions and implements “least privileges” practices for the management of user, group and system accounts. IAM integrates into physical access using a holistic approach to physical and logical access. | Physical & Environmental Security (PES) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to maintain a current list of personnel with authorized access to organizational facilities (except for those areas within the facility officially designated as publicly accessible). | CC6.4 | CC6.4-POF1
CC6.4-POF2 | null | null | null | null | null | DSS05.05 | null | DCS-09 | null | null | null | null | null | null | null | null | 11.1.1 | 5.15
5.18
7.1 | 11.1.1 | null | 6.8
6.8.1
6.8.1.1 | null | null | null | null | OR-3.1
PS-1.0
PS-1.2 | null | null | null | null | null | null | PE-2 | PE-2 | PE-2 | PE-2 | PE-2 | null | PE-2 | PE-2 | PE-2 | null | null | PE-2 | PE-2 | PE-2 | null | PE-2 | PE-2 | PE-2 | null | PE-2 | PE-2 | 3.10.1 | 3.10.1.a
3.10.1.b
3.10.1.c
3.10.1.d | 3.10.1[a]
3.10.1[b]
3.10.1[c]
3.10.1[d] | A.03.04.05[01]
A.03.10.01.a[01]
A.03.10.01.a[02]
A.03.10.01.a[03]
A.03.10.01.b
A.03.10.01.c
A.03.10.01.d
A.03.10.07.a.01 | null | null | null | PR.AA-01
PR.AA-06 | null | 9.2 | 9.1
9.2
9.2.1
9.3
9.3.1 | null | 9.2.1 | null | null | 9.2.1 | 9.2.1 | 9.2.1
9.3.1 | 9.2.1
9.3.1 | null | F.1.2.8 | null | 8.4.2 | null | null | null | ACCESS-3.B.MIL1
ACCESS-3.I.MIL3 | AM:SG1.SP1
EC:SG2.SP2
HRM:SG2.SP1
ID:SG1.SP1
ID:SG1.SP2
ID:SG1.SP3 | null | 5.9.1.2 | PE.L1-3.10.1 | PE.L1-3.10.1 | PE.L1-3.10.1 | PE.L1-b.1.viii | PE.L2-3.10.1 | PE.L2-3.10.1 | PE-2 | null | null | null | 52.204-21(b)(1)(viii) | null | null | null | PE-2 | PE-2 | PE-2 | PE-2 | PE-2 | PE-2 | PE-2 | PE-2 | PE-2 | PE-2 | null | null | null | null | null | 164.310(a)(2)(ii)
164.310(a)(2)(iii) | null | null | null | 2.B.3
PE-2 | null | null | 8-308
5-306
5-308
6-104 | 10.6
11.1
11.2
11.3 | null | null | null | null | null | PE-2 | PE-2 | PE-2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | PE-2 | PE-2 | PE-2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 12.27
18.3 | null | null | null | null | null | null | null | null | null | null | null | null | TPC-86 | null | 2-14-3-1 | 2-13-1-1 | null | null | null | null | 8.1.1 [MP.IF.1] | null | null | null | null | B2.a | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 11.1.1 | null | null | 8.1.11.C.01
8.1.11.C.02 | null | null | null | null | 8.5.6(a) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | FAR 52.204-21 | null | x | R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-4
R-SA-1 | R-AC-1 | R-AC-2 | R-AC-3 | R-AC-4 | R-AM-1 | R-AM-2 | null | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | R-EX-7 | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | R-GV-8 | R-IR-1 | R-IR-2 | null | R-IR-4 | R-SA-1 | null | NT-7
MT-1
MT-2
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | null | null | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Physical & Environmental Security | Role-Based Physical Access | PES-02.1 | Physical access control mechanisms exist to authorize physical access to facilities based on the position or role of the individual. | null | E-PES-03 | Does the organization authorize physical access to facilities based on the position or role of the individual? | 9 | Protect | null | X | X | There is no evidence of a capability to authorize physical access to facilities based on the position or role of the individual. | Physical & Environmental Security (PES) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Physical access control is decentralized.
• Physical security controls are primarily administrative in nature (e.g., policies & standards), focusing on protecting High Value Assets (HVAs).
• Human Resources, or a similar function, maintains a current list of personnel and facilitates the implementation of physical access management controls.
• IT personnel implement appropriate physical security practices to protect the confidentiality, integrity, availability and safety of the organization’s technology assets and data. | Physical & Environmental Security (PES) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Physical access control is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for physical access control.
• Human Resources, or a similar function, maintains a current list of personnel with authorized access to organizational facilities and facilitates the implementation of physical access management controls.
• Physical security controls are primarily administrative in nature (e.g., policies & standards).
• Physical controls, administrative processes and technologies are primarily designed and implemented for offices, rooms and facilities that focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• A facilities maintenance team, or similar function, manages the operation of automated physical and environmental protection controls. | Physical & Environmental Security (PES) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A physical security team, or similar function:
o Performs the centralized-management of physical security controls across the enterprise.
o Maintains a current list of personnel with authorized access to organizational facilities and implements physical access management controls.
• A facilities maintenance team, or similar function, manages the operation of environmental protection controls.
• Administrative processes exist to authorize physical access to facilities based on the position or role of the individual.
• Administrative processes and physical controls restrict unescorted access to facilities to personnel with required security clearances, formal access authorizations and validated the need for access.
• An Identity and Access Management (IAM), or similar function, centrally manages permissions and implements “least privileges” practices for the management of user, group and system accounts. IAM integrates into physical access using a holistic approach to physical and logical access. | Physical & Environmental Security (PES) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | Physical & Environmental Security (PES) efforts are “world-class” capabilities that leverage predictive analysis (e.g., machine learning, AI, etc.). In addition to CMM Level 4 criteria, CMM Level 5 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Stakeholders make time-sensitive decisions to support operational efficiency, which may include automated remediation actions.
▪ Based on predictive analysis, process improvements are implemented according to “continuous improvement” practices that affect process changes. | CC6.4 | CC6.4-POF1
CC6.4-POF2 | null | null | null | null | null | DSS05.05 | null | DCS-09
LOG-12 | null | null | null | null | null | null | null | null | null | 5.15
5.18 | null | null | null | null | null | null | null | OR-3.1
PS-1.0
PS-1.2 | Sec 4(D)(2)(c) | null | null | null | null | null | PE-2(1) | null | null | null | PE-2(1) | null | null | null | null | PE-2(1) | null | null | null | null | null | PE-2(1) | null | null | null | PE-2(1) | PE-2(1) | null | 3.10.1.a
3.10.1.b
3.10.1.c
3.10.1.d | null | null | null | null | null | null | null | null | 9.1
9.2
9.2.1
9.3
9.3.1
9.3.1.1 | null | 9.2.1 | null | null | 9.2.1 | 9.2.1 | 9.2.1
9.3.1
9.3.1.1 | 9.2.1
9.3.1
9.3.1.1 | null | F.1.2.8.2 | null | 3.1.1 | null | null | null | ACCESS-3.E.MIL2
ACCESS-3.I.MIL3 | null | null | 5.9.1.3 | null | null | null | null | null | null | PE-2(1) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 164.310(a)(2)(ii)
164.310(a)(2)(iii) | null | null | null | null | null | null | null | 10.6
11.1
11.2
11.3 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 38-99-20(D)(2)(c) | null | null | null | null | null | null | null | null | 3.4.3(34) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 12.27
18.4 | null | null | null | null | null | null | null | null | null | null | null | null | TPC-86 | null | null | null | null | null | null | null | 8.1.1 [MP.IF.1] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Article 27 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | NAIC | null | x | R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-4
R-SA-1 | R-AC-1 | R-AC-2 | R-AC-3 | R-AC-4 | R-AM-1 | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | R-EX-7 | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | R-GV-8 | R-IR-1 | R-IR-2 | null | R-IR-4 | R-SA-1 | null | NT-7
MT-1
MT-2
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | null | null | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Physical & Environmental Security | Dual Authorization for Physical Access | PES-02.2 | Mechanisms exist to enforce a "two-person rule" for physical access by requiring two authorized individuals with separate access cards, keys or PINs, to access highly-sensitive areas (e.g., safe, high-security cage, etc.). | null | null | Does the organization enforce a "two-person rule" for physical access by requiring two authorized individuals with separate access cards, keys or PINs, to access highly-sensitive areas (e?g?, safe, high-security cage, etc?)? | 2 | Protect | null | X | null | There is no evidence of a capability to enforce a "two-pers on rule" for physical access by requiring two authorized individuals with separate access cards, keys or PINs, to access highly-sensitive areas (e.g., safe, high-security cage, etc.). | SP-CMM1 is N/A, since a structured process is required to enforce a "two-pers on rule" for physical access by requiring two authorized individuals with separate access cards, keys or PINs, to access highly-sensitive areas (e.g., safe, high-security cage, etc.). | Physical & Environmental Security (PES) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Physical access control is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for physical access control.
• Human Resources, or a similar function, maintains a current list of personnel with authorized access to organizational facilities and facilitates the implementation of physical access management controls.
• Physical security controls are primarily administrative in nature (e.g., policies & standards).
• Physical controls, administrative processes and technologies are primarily designed and implemented for offices, rooms and facilities that focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• A facilities maintenance team, or similar function, manages the operation of automated physical and environmental protection controls. | Physical & Environmental Security (PES) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A physical security team, or similar function:
o Performs the centralized-management of physical security controls across the enterprise.
o Maintains a current list of personnel with authorized access to organizational facilities and implements physical access management controls.
• A facilities maintenance team, or similar function, manages the operation of environmental protection controls.
• Administrative processes exist to authorize physical access to facilities based on the position or role of the individual.
• Administrative processes and physical controls restrict unescorted access to facilities to personnel with required security clearances, formal access authorizations and validated the need for access.
• An Identity and Access Management (IAM), or similar function, centrally manages permissions and implements “least privileges” practices for the management of user, group and system accounts. IAM integrates into physical access using a holistic approach to physical and logical access. | See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to enforce a "two-pers on rule" for physical access by requiring two authorized individuals with separate access cards, keys or PINs, to access highly-sensitive areas (e.g., safe, high-security cage, etc.). | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to enforce a "two-pers on rule" for physical access by requiring two authorized individuals with separate access cards, keys or PINs, to access highly-sensitive areas (e.g., safe, high-security cage, etc.). | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | F.1.2.2 | null | null | null | null | null | ACCESS-3.F.MIL2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 8.2.8.C.01 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-4
R-SA-1 | R-AC-1 | R-AC-2 | R-AC-3 | R-AC-4 | R-AM-1 | R-AM-2 | null | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | R-EX-7 | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | R-GV-8 | R-IR-1 | R-IR-2 | null | R-IR-4 | R-SA-1 | null | NT-7
MT-1
MT-2
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | null | null | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Physical & Environmental Security | Physical Access Control | PES-03 | Physical access control mechanisms exist to enforce physical access authorizations for all physical access points (including designated entry/exit points) to facilities (excluding those areas within the facility officially designated as publicly accessible). | - Security guards
- Verify individual access authorizations before granting access to the facility.
- Control entry to the facility containing the system using physical access devices and/or guards.
- Control access to areas officially designated as publicly accessible in accordance with the organization’s assessment of risk.
- Secure keys, combinations and other physical access devices.
- Change combinations and keys and when keys are lost, combinations are compromised or individuals are transferred or terminated. | E-PES-02 | Does the organization enforce physical access authorizations for all physical access points (including designated entry/exit points) to facilities (excluding those areas within the facility officially designated as publicly accessible)? | 10 | Protect | null | X | X | There is no evidence of a capability to enforce physical access authorizations for all physical access points (including designated entry/exit points) to facilities (excluding those areas within the facility officially designated as publicly accessible). | SP-CMM1 is N/A, since a structured process is required to enforce physical access authorizations for all physical access points (including designated entry/exit points) to facilities (excluding those areas within the facility officially designated as publicly accessible). | Physical & Environmental Security (PES) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Physical access control is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for physical access control.
• Human Resources, or a similar function, maintains a current list of personnel with authorized access to organizational facilities and facilitates the implementation of physical access management controls.
• Physical security controls are primarily administrative in nature (e.g., policies & standards).
• Physical controls, administrative processes and technologies are primarily designed and implemented for offices, rooms and facilities that focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• A facilities maintenance team, or similar function, manages the operation of automated physical and environmental protection controls.
• Physical controls and technologies are configured to enforce physical access authorizations for all physical access points (including designated entry/exit points) to facilities (excluding those areas within the facility officially designated as publicly accessible). | Physical & Environmental Security (PES) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A physical security team, or similar function:
o Performs the centralized-management of physical security controls across the enterprise.
o Maintains a current list of personnel with authorized access to organizational facilities and implements physical access management controls.
• A facilities maintenance team, or similar function, manages the operation of environmental protection controls.
• Administrative processes exist to authorize physical access to facilities based on the position or role of the individual.
• Administrative processes and physical controls restrict unescorted access to facilities to personnel with required security clearances, formal access authorizations and validated the need for access.
• Physical controls and technologies are configured to enforce physical access authorizations for all physical access points (including designated entry/exit points) to facilities (excluding those areas within the facility officially designated as publicly accessible). | Physical & Environmental Security (PES) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to enforce physical access authorizations for all physical access points (including designated entry/exit points) to facilities (excluding those areas within the facility officially designated as publicly accessible). | CC6.4 | CC6.4-POF1
CC6.4-POF2 | null | null | null | null | null | DSS01.05
DSS05.05 | null | DCS-07
LOG-12 | PHY-01 | SO9 | null | null | null | null | null | null | 11.1.1 | 5.15
5.18
7.1
7.4 | 11.1.1 | null | 6.6
6.6.1
6.6.1.1 | null | null | null | null | OP-3.2
PS-1.0
PS-1.2
PS-1.5
PS-2.0 | Sec 4(D)(2)(c) | null | PR.AC-P2 | null | null | null | PE-3
PE-3(2)
PE-3(3) | PE-3 | PE-3 | PE-3 | PE-3
PE-3(2)
PE-3(3) | null | PE-3 | PE-3 | PE-3 | PE-3(2)
PE-3(3) | null | PE-3 | PE-3 | PE-3 | null | PE-3
PE-3(2) | PE-3 | null | null | PE-3
PE-3(2) | PE-3
PE-3(2) | 3.10.5 | 3.10.7.a
3.10.7.a.1
3.10.7.a.2
3.10.7.b
3.10.7.c
3.10.7.d | 3.10.5[a]
3.10.5[b]
3.10.5[c] | A.03.10.07.a.01
A.03.10.07.a.02
A.03.10.07.d[01]
A.03.10.07.d[02]
A.03.10.07.d[03] | null | null | PR.AC-2 | PR.AA-01
PR.AA-06 | null | 9.1
9.1.1
9.1.2
9.2
9.4.2
9.4.3 | 9.1
9.1.2
9.2
9.2.1 | null | 9.2.1 | null | null | 9.2.1 | 9.2.1 | 9.1.2
9.2.1 | 9.1.2
9.2.1 | null | F.1.2.2 | 3.1 | 3.1.1
8.1.2
8.1.3
8.1.5
8.4.2 | null | null | null | ACCESS-3.A.MIL1
ACCESS-3.D.MIL2
ACCESS-3.E.MIL2
ACCESS-3.F.MIL2
ACCESS-3.G.MIL2
ACCESS-3.H.MIL2
ACCESS-3.J.MIL3 | AM:SG1.SP1
EC:SG2.SP1
EC:SG2.SP2 | null | 5.9.1.3 | PE.L1-3.10.5 | PE.L1-3.10.5 | PE.L1-3.10.5 | PE.L1-b.1.ix | PE.L2-3.10.5 | PE.L2-3.10.5 | PE-3 | null | null | null | 52.204-21(b)(1)(ix) | null | null | null | PE-3 | PE-3 | PE-3 | PE-3 | PE-3 | PE-3 | PE-3 | PE-3 | PE-3 | PE-3 | null | D3.PC.Am.B.11
D3.PC.Am.B.17 | null | null | null | null | 6.S.B | 5.M.C
6.M.E | 5.M.C
6.M.E | 2.B.3
2.B.3.2
2.B.3.5
PE-3
PE-3(2) | null | null | 5-300
6-104 | 10.6
11.1
11.2
11.3 | null | null | null | null | null | PE-3 | PE-3 | PE-3 | null | null | null | null | null | null | null | null | null | 17.03(2)(g) | null | null | null | 622(2)(d)(C)(ii) | 38-99-20(D)(2)(c) | null | null | PE-3 | PE-3 | PE-3 | null | null | § 2447(b)(7) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | PS-03
PS-04 | null | null | null | 9.15
12.27
18.4 | null | null | null | null | null | null | null | null | null | null | null | null | TPC-47
TPC-82
TPC-86 | null | 2-14-3-1 | 2-13-1-3 | null | null | null | null | 8.1.1 [MP.IF.1] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 1296 | null | null | null | null | null | null | null | null | null | null | 11.1.1 | null | null | null | null | null | null | null | 8.5.6(c)
5.5.6(f) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | FAR 52.204-21
NAIC
MA 201 CMR 17
OR 6464A | null | x | R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-4
R-SA-1 | R-AC-1 | R-AC-2 | R-AC-3 | R-AC-4 | R-AM-1 | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | R-EX-7 | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | R-GV-8 | R-IR-1 | R-IR-2 | null | R-IR-4 | R-SA-1 | null | NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | NT-9 | NT-10 | NT-11 | NT-12 | NT-13 | NT-14 | MT-1 | MT-2 | MT-3 | MT-4 | MT-5 | MT-6 | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Physical & Environmental Security | Controlled Ingress & Egress Points | PES-03.1 | Physical access control mechanisms exist to limit and monitor physical access through controlled ingress and egress points. | null | null | Does the organization limit and monitor physical access through controlled ingress and egress points? | 9 | Protect | null | X | null | There is no evidence of a capability to limit and monitor physical access through controlled ingress and egress points. | SP-CMM1 is N/A, since a structured process is required to limit and monitor physical access through controlled ingress and egress points. | Physical & Environmental Security (PES) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Physical access control is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for physical access control.
• Human Resources, or a similar function, maintains a current list of personnel with authorized access to organizational facilities and facilitates the implementation of physical access management controls.
• Physical security controls are primarily administrative in nature (e.g., policies & standards).
• Physical controls, administrative processes and technologies are primarily designed and implemented for offices, rooms and facilities that focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• A facilities maintenance team, or similar function, manages the operation of automated physical and environmental protection controls.
• Physical controls and technologies are configured to enforce physical access authorizations for all physical access points (including designated entry/exit points) to facilities (excluding those areas within the facility officially designated as publicly accessible). | Physical & Environmental Security (PES) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A physical security team, or similar function:
o Performs the centralized-management of physical security controls across the enterprise.
o Maintains a current list of personnel with authorized access to organizational facilities and implements physical access management controls.
• A facilities maintenance team, or similar function, manages the operation of environmental protection controls.
• Administrative processes exist to authorize physical access to facilities based on the position or role of the individual.
• Administrative processes and physical controls restrict unescorted access to facilities to personnel with required security clearances, formal access authorizations and validated the need for access.
• Physical controls and technologies are configured to enforce physical access authorizations for all physical access points (including designated entry/exit points) to facilities (excluding those areas within the facility officially designated as publicly accessible). | Physical & Environmental Security (PES) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to limit and monitor physical access through controlled ingress and egress points. | null | null | null | null | null | null | null | DSS05.05 | null | DCS-07 | null | null | null | null | null | null | null | null | null | 7.1
7.2 | null | null | null | null | null | null | null | PS-1.0
PS-1.4
PS-2.0 | null | null | PR.AC-P2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 3.10.7.a
3.10.7.a.1
3.10.7.a.2 | null | A.03.10.07.a.02 | null | null | null | null | null | 9.1
9.1.1
9.1.2
9.1.3 | 9.2
9.2.1
9.3
9.3.1 | null | 9.2.1 | null | null | 9.2.1 | 9.2.1 | 9.2.1
9.3.1 | 9.2.1
9.3.1 | null | F.1.2.5 | null | 3.1.1
8.1.2
8.1.5
8.4.2 | null | null | null | null | null | null | 5.9.1.1 | null | null | null | PE.L1-b.1.ix | null | null | null | null | null | null | 52.204-21(b)(1)(ix) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 6.S.B | null | null | null | null | null | null | 10.6 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | PS-03 | null | null | null | 12.27
18.6
18.8 | null | null | null | null | null | null | null | null | null | null | null | null | TPC-82 | null | 2-14-3-1 | 2-13-1-3 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 5.5.6(f) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | FAR 52.204-21 | null | null | R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-4
R-SA-1 | R-AC-1 | R-AC-2 | R-AC-3 | R-AC-4 | R-AM-1 | R-AM-2 | null | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | R-EX-7 | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | R-GV-8 | R-IR-1 | R-IR-2 | null | R-IR-4 | R-SA-1 | null | NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | NT-9 | NT-10 | NT-11 | NT-12 | NT-13 | NT-14 | MT-1 | MT-2 | MT-3 | MT-4 | MT-5 | MT-6 | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Physical & Environmental Security | Lockable Physical Casings | PES-03.2 | Physical access control mechanisms exist to protect system components from unauthorized physical access (e.g., lockable physical casings). | - CCTV
- Lockable server/network racks
- Logged access badges to access server rooms | null | Does the organization protect system components from unauthorized physical access (e?g?, lockable physical casings)? | 5 | Protect | null | X | X | There is no evidence of a capability to protect system components from unauthorized physical access (e.g., lockable physical casings). | Physical & Environmental Security (PES) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Physical access control is decentralized.
• Physical security controls are primarily administrative in nature (e.g., policies & standards), focusing on protecting High Value Assets (HVAs).
• Human Resources, or a similar function, maintains a current list of personnel and facilitates the implementation of physical access management controls. | Physical & Environmental Security (PES) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Physical access control is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for physical access control.
• Human Resources, or a similar function, maintains a current list of personnel with authorized access to organizational facilities and facilitates the implementation of physical access management controls.
• Physical security controls are primarily administrative in nature (e.g., policies & standards).
• Physical controls, administrative processes and technologies are primarily designed and implemented for offices, rooms and facilities that focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• A facilities maintenance team, or similar function, manages the operation of automated physical and environmental protection controls.
• Physical controls and technologies are configured to protect system components from unauthorized physical access (e.g., lockable physical casings). | Physical & Environmental Security (PES) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A physical security team, or similar function:
o Performs the centralized-management of physical security controls across the enterprise.
o Maintains a current list of personnel with authorized access to organizational facilities and implements physical access management controls.
• A facilities maintenance team, or similar function, manages the operation of environmental protection controls.
• Administrative processes exist to authorize physical access to facilities based on the position or role of the individual.
• Administrative processes and physical controls restrict unescorted access to facilities to personnel with required security clearances, formal access authorizations and validated the need for access.
• Physical controls and technologies are configured to protect system components from unauthorized physical access (e.g., lockable physical casings). | Physical & Environmental Security (PES) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to protect system components from unauthorized physical access (e.g., lockable physical casings). | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | PR.AC-P2 | null | null | null | PE-3(4)
SC-7(14) | null | null | null | PE-3(4)
SC-7(14) | null | null | null | null | PE-3(4)
SC-7(14) | null | null | null | null | null | SC-7(14) | null | null | null | SC-7(14) | SC-7(14) | null | null | null | null | null | null | null | null | null | null | 9.2.4 | null | null | null | null | null | null | 9.2.4 | 9.2.4 | null | F.10 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 5.M.C | 5.M.C | null | null | null | null | 10.5
10.6
10.8 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 18.6
18.11 | null | null | null | null | null | null | null | null | null | null | null | null | TPC-46 | null | null | 2-13-1-4 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 8.2.5.C.01 | null | null | null | null | 8.5.6(d) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | R-AC-1
R-AC-4
R-AM-1
R-AM-2
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-IR-1
R-IR-4
R-SA-1 | R-AC-1 | null | null | R-AC-4 | R-AM-1 | R-AM-2 | null | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | R-EX-7 | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | null | R-IR-1 | null | null | R-IR-4 | R-SA-1 | null | NT-7
MT-1
MT-2
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | null | null | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Physical & Environmental Security | Physical Access Logs | PES-03.3 | Physical access control mechanisms exist to generate a log entry for each access through controlled ingress and egress points. | - Visitor logbook
- iLobby (https://goilobby.com/)
- The Receptionist (https://thereceptionist.com/)
- LobbyGuard (http://lobbyguard.com/) | E-PES-02 | Does the organization generate a log entry for each access through controlled ingress and egress points? | 6 | Protect | null | X | X | There is no evidence of a capability to generate a log entry for each access through controlled ingress and egress points. | Physical & Environmental Security (PES) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Physical access control is decentralized.
• Physical security controls are primarily administrative in nature (e.g., policies & standards), focusing on protecting High Value Assets (HVAs).
• Human Resources, or a similar function, maintains a current list of personnel and facilitates the implementation of physical access management controls. | Physical & Environmental Security (PES) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Physical access control is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for physical access control.
• Human Resources, or a similar function, maintains a current list of personnel with authorized access to organizational facilities and facilitates the implementation of physical access management controls.
• Physical security controls are primarily administrative in nature (e.g., policies & standards).
• Physical controls, administrative processes and technologies are primarily designed and implemented for offices, rooms and facilities that focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• A facilities maintenance team, or similar function, manages the operation of automated physical and environmental protection controls.
• Physical controls and technologies are configured to generate a log entry for each access through controlled ingress and egress points. | Physical & Environmental Security (PES) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A physical security team, or similar function:
o Performs the centralized-management of physical security controls across the enterprise.
o Maintains a current list of personnel with authorized access to organizational facilities and implements physical access management controls.
• A facilities maintenance team, or similar function, manages the operation of environmental protection controls.
• Administrative processes exist to authorize physical access to facilities based on the position or role of the individual.
• Administrative processes and physical controls restrict unescorted access to facilities to personnel with required security clearances, formal access authorizations and validated the need for access.
• Physical controls and technologies are configured to generate a log entry for each access through controlled ingress and egress points. | Physical & Environmental Security (PES) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to generate a log entry for each access through controlled ingress and egress points. | null | CC6.4-POF3 | null | null | null | null | null | null | null | LOG-12 | null | null | null | null | null | null | null | null | 11.1.2 | 7.2 | 11.1.2 | null | null | null | null | null | null | OP-3.2
PS-1.1
PS-1.2 | null | null | null | null | null | null | PE-8 | PE-8 | PE-8 | PE-8 | PE-8 | null | PE-8 | PE-8 | PE-8 | null | null | PE-8 | PE-8 | PE-8 | null | null | null | null | null | null | null | 3.10.4
NFO - PE-8 | 3.10.7.b | 3.10.4 | A.03.10.07.b | null | null | null | null | null | 9.4.4 | 9.2.1
9.2.1.1 | null | 9.2.1 | null | null | 9.2.1 | 9.2.1 | 9.2.1 | 9.2.1 | null | F.1.2.8 | null | 8.1.6 | null | null | null | ACCESS-3.C.MIL1
ACCESS-3.J.MIL3 | ADM:SG1.SP1
EC:SG2.SP2 | null | null | PE.L1-3.10.4 | PE.L1-3.10.4 | PE.L1-3.10.4 | PE.L1-b.1.ix | PE.L2-3.10.4 | PE.L2-3.10.4 | PE-8 | null | null | null | 52.204-21(b)(1)(ix) | null | null | null | PE-8 | PE-8 | PE-8 | PE-8 | PE-8 | PE-8 | PE-8 | PE-8 | PE-8 | PE-8 | null | null | null | null | null | null | null | null | null | PE-8 | null | null | null | null | null | null | null | null | null | PE-8 | PE-8 | PE-8 | null | null | null | null | null | null | null | null | null | null | null | null | null | 622(2)(d)(C)(ii) | null | null | null | PE-8 | PE-8 | PE-8 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 18.5 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 2-14-3-3 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 11.1.2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | FAR 52.204-21
OR 6464A | null | null | R-AC-1
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-IR-1
R-IR-4
R-SA-1 | R-AC-1 | null | null | R-AC-4 | R-AM-1 | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | R-EX-7 | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | null | R-IR-1 | null | null | R-IR-4 | R-SA-1 | null | NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | NT-9 | NT-10 | NT-11 | NT-12 | NT-13 | NT-14 | MT-1 | MT-2 | MT-3 | MT-4 | MT-5 | MT-6 | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Physical & Environmental Security | Access To Information Systems | PES-03.4 | Physical access control mechanisms exist to enforce physical access to critical information systems or sensitive/regulated data, in addition to the physical access controls for the facility. | null | null | Does the organization enforce physical access to critical information systems or sensitive/regulated data, in addition to the physical access controls for the facility? | 5 | Protect | null | X | X | There is no evidence of a capability to enforce physical access to critical information systems or sensitive/regulated data, in addition to the physical access controls for the facility. | SP-CMM1 is N/A, since a structured process is required to enforce physical access to critical information systems or sensitive/regulated data, in addition to the physical access controls for the facility. | Physical & Environmental Security (PES) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Physical access control is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for physical access control.
• Human Resources, or a similar function, maintains a current list of personnel with authorized access to organizational facilities and facilitates the implementation of physical access management controls.
• Physical security controls are primarily administrative in nature (e.g., policies & standards).
• Physical controls, administrative processes and technologies are primarily designed and implemented for offices, rooms and facilities that focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• A facilities maintenance team, or similar function, manages the operation of automated physical and environmental protection controls. | Physical & Environmental Security (PES) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A physical security team, or similar function:
o Performs the centralized-management of physical security controls across the enterprise.
o Maintains a current list of personnel with authorized access to organizational facilities and implements physical access management controls.
• A facilities maintenance team, or similar function, manages the operation of environmental protection controls.
• Administrative processes exist to authorize physical access to facilities based on the position or role of the individual.
• Administrative processes and physical controls restrict unescorted access to facilities to personnel with required security clearances, formal access authorizations and validated the need for access. | See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to enforce physical access to critical information systems or sensitive/regulated data, in addition to the physical access controls for the facility. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to enforce physical access to critical information systems or sensitive/regulated data, in addition to the physical access controls for the facility. | null | null | null | null | null | null | null | DSS05.05 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | PS-1.0 | null | null | PR.AC-P2 | null | null | null | PE-3(1) | null | null | PE-3(1) | PE-3(1) | null | null | null | PE-3(1) | null | null | null | null | PE-3(1) | null | PE-3(1) | null | null | null | PE-3(1) | PE-3(1) | null | 3.10.1.a
3.10.7.a
3.10.7.a.1
3.10.7.a.2
3.10.7.c | null | A.03.04.05[02]
A.03.04.05[03] | null | null | PR.AC-2 | null | null | null | null | null | null | null | null | null | null | null | null | null | F.1.2.9 | 3.1 | 3.1.1
8.1.2
8.1.3
8.1.4 | null | null | null | ARCHITECTURE-3.J.MIL2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | PE-3(1) | null | null | PE-3(1) | null | PE-3(1) | null | null | PE-3(1) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 11.1
11.2
11.3 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | PS-04 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | TPC-46
TPC-49 | null | 2-3-3-2 | 2-13-1-5 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 1053
1530
0813
1074 | null | null | null | null | null | null | null | null | null | null | null | null | null | 8.3.3.C.01
8.3.4.C.01
8.3.4.C.02
8.3.5.C.01 | null | null | null | null | 8.5.6(d) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-4
R-SA-1 | R-AC-1 | R-AC-2 | R-AC-3 | R-AC-4 | R-AM-1 | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | R-EX-7 | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | R-GV-8 | R-IR-1 | R-IR-2 | null | R-IR-4 | R-SA-1 | null | NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | NT-9 | NT-10 | NT-11 | NT-12 | NT-13 | NT-14 | MT-1 | MT-2 | MT-3 | MT-4 | MT-5 | MT-6 | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Physical & Environmental Security | Physical Security of Offices, Rooms & Facilities | PES-04 | Mechanisms exist to identify systems, equipment and respective operating environments that require limited physical access so that appropriate physical access controls are designed and implemented for offices, rooms and facilities. | - "clean desk" policy
- Management spot checks | null | Does the organization identify systems, equipment and respective operating environments that require limited physical access so that appropriate physical access controls are designed and implemented for offices, rooms and facilities? | 10 | Protect | null | X | null | There is no evidence of a capability to identify systems, equipment and respective operating environments that require limited physical access so that appropriate physical access controls are designed and implemented for offices, rooms and facilities. | Physical & Environmental Security (PES) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Physical access control is decentralized.
• Physical security controls are primarily administrative in nature (e.g., policies & standards), focusing on protecting High Value Assets (HVAs).
• Human Resources, or a similar function, maintains a current list of personnel and facilitates the implementation of physical access management controls.
• Facility security mechanisms exist to monitor physical access to business-critical information systems or sensitive/regulated data, in addition to the physical access monitoring of the facility. | Physical & Environmental Security (PES) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Physical access control is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for physical access control.
• Human Resources, or a similar function, maintains a current list of personnel with authorized access to organizational facilities and facilitates the implementation of physical access management controls.
• Physical security controls are primarily administrative in nature (e.g., policies & standards).
• Physical controls, administrative processes and technologies are primarily designed and implemented for offices, rooms and facilities that focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• A facilities maintenance team, or similar function, manages the operation of automated physical and environmental protection controls.
• Physical controls are designed and implemented for offices, rooms and facilities. | Physical & Environmental Security (PES) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A physical security team, or similar function:
o Performs the centralized-management of physical security controls across the enterprise.
o Maintains a current list of personnel with authorized access to organizational facilities and implements physical access management controls.
• A facilities maintenance team, or similar function, manages the operation of environmental protection controls.
• Administrative processes exist to authorize physical access to facilities based on the position or role of the individual.
• Administrative processes and physical controls restrict unescorted access to facilities to personnel with required security clearances, formal access authorizations and validated the need for access.
• Physical controls are designed and implemented for offices, rooms and facilities. | Physical & Environmental Security (PES) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to identify systems, equipment and respective operating environments that require limited physical access so that appropriate physical access controls are designed and implemented for offices, rooms and facilities. | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 11.1.1
11.1.3
11.2.9 | 5.15
7.1
7.3
7.5
7.7 | 11.1.1
11.1.3
11.2.9 | null | 6.8
6.8.1
6.8.1.1
6.8.1.3
6.8.2.9 | null | null | null | null | OP-3.2
PS-1.0
PS-1.2 | null | null | PR.AC-P2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 3.10.5 | 3.10.7.a
3.10.7.a.1
3.10.7.a.2
3.10.7.b
3.10.7.c
3.10.7.d | null | null | null | null | null | PR.AA-06 | null | 9.3 | 9.3.1.1 | null | null | null | null | null | null | 9.3.1.1 | 9.3.1.1 | null | F.1.2 | 3.1 | 3.1.1
8.1.2
8.1.3
8.1.4
8.2.5 | null | null | null | null | null | null | 5.9.1.5
5.9.2 | PE.L1-3.10.5 | PE.L1-3.10.5 | null | PE.L1-b.1.viii | PE.L2-3.10.5 | PE.L2-3.10.5 | null | null | null | null | 52.204-21(b)(1)(viii) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 5.M.C
6.M.E | 5.M.C
6.M.E | 2.B.3.3
2.B.5 | null | null | null | 11.1
11.2
11.3 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | § 2447(b)(7) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | PS-04 | null | null | null | 9.15
18.6 | null | null | null | null | null | null | null | null | null | null | null | null | TPC-46 | null | 2-14-3-5 | 2-13-1-4 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 11.1.1
11.1.3
11.2.9 | null | null | 8.2.6.C.01
8.2.6.C.02 | null | null | null | null | 8.5.6(e) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | FAR 52.204-21 | null | null | R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-4
R-SA-1 | R-AC-1 | R-AC-2 | R-AC-3 | R-AC-4 | R-AM-1 | R-AM-2 | null | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | R-EX-7 | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | R-GV-8 | R-IR-1 | R-IR-2 | null | R-IR-4 | R-SA-1 | null | NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | NT-9 | NT-10 | NT-11 | NT-12 | NT-13 | NT-14 | MT-1 | MT-2 | MT-3 | MT-4 | MT-5 | MT-6 | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Physical & Environmental Security | Working in Secure Areas | PES-04.1 | Physical security mechanisms exist to allow only authorized personnel access to secure areas. | - Visitor escorts | null | Does the organization allow only authorized personnel access to secure areas? | 10 | Protect | null | X | null | There is no evidence of a capability to allow only authorized personnel access to secure areas. | Physical & Environmental Security (PES) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Physical access control is decentralized.
• Physical security controls are primarily administrative in nature (e.g., policies & standards), focusing on protecting High Value Assets (HVAs).
• Human Resources, or a similar function, maintains a current list of personnel and facilitates the implementation of physical access management controls.
• Facility security mechanisms exist to monitor physical access to business-critical information systems or sensitive/regulated data, in addition to the physical access monitoring of the facility. | Physical & Environmental Security (PES) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Physical access control is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for physical access control.
• Human Resources, or a similar function, maintains a current list of personnel with authorized access to organizational facilities and facilitates the implementation of physical access management controls.
• Physical security controls are primarily administrative in nature (e.g., policies & standards).
• Physical controls, administrative processes and technologies are primarily designed and implemented for offices, rooms and facilities that focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• A facilities maintenance team, or similar function, manages the operation of automated physical and environmental protection controls.
• Administrative processes, physical controls and technologies ensure that only authorized personnel are allowed access to secure areas. | Physical & Environmental Security (PES) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A physical security team, or similar function:
o Performs the centralized-management of physical security controls across the enterprise.
o Maintains a current list of personnel with authorized access to organizational facilities and implements physical access management controls.
• A facilities maintenance team, or similar function, manages the operation of environmental protection controls.
• Administrative processes exist to authorize physical access to facilities based on the position or role of the individual.
• Administrative processes and physical controls restrict unescorted access to facilities to personnel with required security clearances, formal access authorizations and validated the need for access.
• Administrative processes, physical controls and technologies ensure that only authorized personnel are allowed access to secure areas. | Physical & Environmental Security (PES) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to allow only authorized personnel access to secure areas. | null | null | null | null | null | null | null | null | null | DCS-09
HRS-03 | null | null | null | null | null | null | null | null | 11.1.2
11.1.5 | 5.15
7.2
7.3
7.5
7.6 | 11.1.2
11.1.5 | null | 6.8.1.2
6.8.1.5 | null | null | null | null | OP-3.2
PS-1.0
PS-1.2 | null | null | PR.AC-P2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 3.10.7.a
3.10.7.a.1
3.10.7.a.2
3.10.7.b
3.10.7.c
3.10.7.d | null | null | null | null | null | PR.AA-06 | null | null | 9.3.1.1 | null | null | null | null | null | null | 9.3.1.1 | 9.3.1.1 | null | F.9.2 | 3.1 | 3.1.1
8.1.2
8.1.3
8.1.4
8.2.5
8.2.6
8.2.7 | null | null | null | null | null | null | 5.9.1.5
5.9.2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 6.M.E | 6.M.E | 2.B.3
2.B.3.3 | null | null | null | 11.1
11.2
11.3 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | § 2447(b)(7) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 18.6 | null | null | null | null | null | null | null | null | null | null | null | null | TPC-49 | null | 2-14-3-5 | 2-13-1-5 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0164 | null | null | null | null | null | null | null | null | null | null | 11.1.2
11.1.5 | null | null | null | null | null | null | null | 8.5.6(e)
5.5.6(f) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | null | null | null | R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-4
R-SA-1 | R-AC-1 | R-AC-2 | R-AC-3 | R-AC-4 | R-AM-1 | R-AM-2 | null | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | R-EX-7 | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | R-GV-8 | R-IR-1 | R-IR-2 | null | R-IR-4 | R-SA-1 | null | NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | NT-9 | NT-10 | NT-11 | NT-12 | NT-13 | NT-14 | MT-1 | MT-2 | MT-3 | MT-4 | MT-5 | MT-6 | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Physical & Environmental Security | Searches | PES-04.2 | Physical access control mechanisms exist to inspect personnel and their personal effects (e.g., personal property ordinarily worn or carried by the individual, including vehicles) to prevent the unauthorized exfiltration of data and technology assets. | null | null | Does the organization inspect personnel and their personal effects (e?g?, personal property ordinarily worn or carried by the individual, including vehicles) to prevent the unauthorized exfiltration of data and technology assets? | 1 | Detect | null | X | null | There is no evidence of a capability to inspect personnel and their personal effects (e.g., personal property ordinarily worn or carried by the individual, including vehicles) to prevent the unauthorized exfiltration of data and technology assets. | SP-CMM1 is N/A, since a structured process is required to inspect personnel and their personal effects (e.g., personal property ordinarily worn or carried by the individual, including vehicles) to prevent the unauthorized exfiltration of data and technology assets. | SP-CMM2 is N/A, since a well-defined process is required to inspect personnel and their personal effects (e.g., personal property ordinarily worn or carried by the individual, including vehicles) to prevent the unauthorized exfiltration of data and technology assets. | Physical & Environmental Security (PES) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A physical security team, or similar function:
o Performs the centralized-management of physical security controls across the enterprise.
o Maintains a current list of personnel with authorized access to organizational facilities and implements physical access management controls.
• A facilities maintenance team, or similar function, manages the operation of environmental protection controls.
• Administrative processes exist to authorize physical access to facilities based on the position or role of the individual.
• Administrative processes and physical controls restrict unescorted access to facilities to personnel with required security clearances, formal access authorizations and validated the need for access. | See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to inspect personnel and their personal effects (e.g., personal property ordinarily worn or carried by the individual, including vehicles) to prevent the unauthorized exfiltration of data and technology assets. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to inspect personnel and their personal effects (e.g., personal property ordinarily worn or carried by the individual, including vehicles) to prevent the unauthorized exfiltration of data and technology assets. | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | PS-2.0 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | F.1.1.1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 8.1.12.C.01
8.1.13.C.01
8.1.13.C.02 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-4
R-SA-1 | R-AC-1 | R-AC-2 | R-AC-3 | R-AC-4 | R-AM-1 | R-AM-2 | null | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | R-EX-7 | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | R-GV-8 | R-IR-1 | R-IR-2 | null | R-IR-4 | R-SA-1 | null | NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | NT-9 | NT-10 | NT-11 | NT-12 | NT-13 | NT-14 | MT-1 | MT-2 | MT-3 | MT-4 | MT-5 | MT-6 | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Physical & Environmental Security | Temporary Storage | PES-04.3 | Physical access control mechanisms exist to temporarily store undelivered packages or deliveries in a dedicated, secure area (e.g., security cage, secure room) that is locked, access-controlled and monitored with surveillance cameras and/or security guards. | null | null | Does the organization temporarily store undelivered packages or deliveries in a dedicated, secure area (e?g?, security cage, secure room) that is locked, access-controlled and monitored with surveillance cameras and/or security guards? | 2 | Protect | null | X | null | There is no evidence of a capability to temporarily store undelivered packages or deliveries in a dedicated, secure area (e.g., security cage, secure room) that is locked, access-controlled and monitored with surveillance cameras and/ or security guards. | SP-CMM1 is N/A, since a structured process is required to temporarily store undelivered packages or deliveries in a dedicated, secure area (e.g., security cage, secure room) that is locked, access-controlled and monitored with surveillance cameras and/ or security guards. | Physical & Environmental Security (PES) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Physical access control is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for physical access control.
• Human Resources, or a similar function, maintains a current list of personnel with authorized access to organizational facilities and facilitates the implementation of physical access management controls.
• Physical security controls are primarily administrative in nature (e.g., policies & standards).
• Physical controls, administrative processes and technologies are primarily designed and implemented for offices, rooms and facilities that focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• A facilities maintenance team, or similar function, manages the operation of automated physical and environmental protection controls. | Physical & Environmental Security (PES) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A physical security team, or similar function:
o Performs the centralized-management of physical security controls across the enterprise.
o Maintains a current list of personnel with authorized access to organizational facilities and implements physical access management controls.
• A facilities maintenance team, or similar function, manages the operation of environmental protection controls.
• Administrative processes exist to authorize physical access to facilities based on the position or role of the individual.
• Administrative processes and physical controls restrict unescorted access to facilities to personnel with required security clearances, formal access authorizations and validated the need for access. | See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to temporarily store undelivered packages or deliveries in a dedicated, secure area (e.g., security cage, secure room) that is locked, access-controlled and monitored with surveillance cameras and/ or security guards. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to temporarily store undelivered packages or deliveries in a dedicated, secure area (e.g., security cage, secure room) that is locked, access-controlled and monitored with surveillance cameras and/ or security guards. | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | OP-3.2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | F.7.1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-4
R-SA-1 | R-AC-1 | R-AC-2 | R-AC-3 | R-AC-4 | R-AM-1 | R-AM-2 | null | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | R-EX-7 | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | R-GV-8 | R-IR-1 | R-IR-2 | null | R-IR-4 | R-SA-1 | null | NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | NT-9 | NT-10 | NT-11 | NT-12 | NT-13 | NT-14 | MT-1 | MT-2 | MT-3 | MT-4 | MT-5 | MT-6 | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Physical & Environmental Security | Monitoring Physical Access | PES-05 | Physical access control mechanisms exist to monitor for, detect and respond to physical security incidents. | null | null | Does the organization monitor for, detect and respond to physical security incidents? | 7 | Detect | X | X | X | There is no evidence of a capability to monitor for, detect and respond to physical security incidents. | Physical & Environmental Security (PES) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Physical access control is decentralized.
• Physical security controls are primarily administrative in nature (e.g., policies & standards), focusing on protecting High Value Assets (HVAs).
• Human Resources, or a similar function, maintains a current list of personnel and facilitates the implementation of physical access management controls. | Physical & Environmental Security (PES) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Physical access control is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for physical access control.
• Human Resources, or a similar function, maintains a current list of personnel with authorized access to organizational facilities and facilitates the implementation of physical access management controls.
• Physical security controls are primarily administrative in nature (e.g., policies & standards).
• Physical controls, administrative processes and technologies are primarily designed and implemented for offices, rooms and facilities that focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• A facilities maintenance team, or similar function, manages the operation of automated physical and environmental protection controls. | Physical & Environmental Security (PES) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A physical security team, or similar function:
o Performs the centralized-management of physical security controls across the enterprise.
o Maintains a current list of personnel with authorized access to organizational facilities and implements physical access management controls.
• A facilities maintenance team, or similar function, manages the operation of environmental protection controls.
• Administrative processes exist to authorize physical access to facilities based on the position or role of the individual.
• Administrative processes and physical controls restrict unescorted access to facilities to personnel with required security clearances, formal access authorizations and validated the need for access.
• A physical security team, or similar function, monitors physical intrusion alarms and surveillance equipment. | Physical & Environmental Security (PES) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to monitor for, detect and respond to physical security incidents. | null | CC6.4-POF3 | null | null | null | null | null | null | null | DCS-10 | PHY-01 | SO9 | null | null | null | null | null | null | null | 7.4 | null | null | null | null | null | null | null | PS-1.3 | null | null | null | null | null | null | PE-6 | PE-6 | PE-6 | PE-6 | PE-6 | null | PE-6 | PE-6 | PE-6 | null | null | PE-6 | PE-6 | PE-6 | null | PE-6 | PE-6 | null | PE-6 | PE-6 | PE-6 | 3.10.2 | 3.10.1.c
3.10.2.a
3.10.2.b | null | A.03.10.02.a[01]
A.03.10.02.a[02]
A.03.10.02.b | null | null | DE.CM-2 | DE.CM-02 | null | 9.1
9.1.1 | 9.2.1.1 | null | null | null | null | 9.2.1.1 | null | 9.2.1.1 | 9.2.1.1 | null | J.7.7 | 3.1 | 8.1.6 | null | null | null | ACCESS-3.C.MIL1
ACCESS-3.J.MIL3 | EC:SG2.SP1
IMC:SG2.SP1 | null | 5.9.1.6 | null | PE.L2-3.10.2 | null | PE.L1-b.1.ix | PE.L2-3.10.2 | PE.L2-3.10.2 | PE-6 | null | null | null | 52.204-21(b)(1)(ix) | null | null | null | PE-6 | PE-6 | PE-6 | PE-6 | PE-6 | PE-6 | PE-6 | PE-6 | PE-6 | PE-6 | null | D3.PC.Am.E.4
D3.Dc.Ev.B.5 | null | null | null | null | null | null | null | PE-6 | null | null | 5-300 | null | null | null | null | null | null | PE-6 | PE-6 | PE-6 | null | null | null | null | null | null | null | null | null | null | null | null | null | 622(2)(d)(C)(ii) | null | null | null | PE-6 | PE-6 | PE-6 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 18.8
18.10
18.11 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 2-14-3-2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 5.5.5 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | FAR 52.204-21
OR 6464A | null | x | R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-4
R-SA-1 | R-AC-1 | R-AC-2 | R-AC-3 | R-AC-4 | R-AM-1 | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | R-EX-7 | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | R-GV-8 | R-IR-1 | R-IR-2 | null | R-IR-4 | R-SA-1 | null | NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | NT-9 | NT-10 | NT-11 | NT-12 | NT-13 | NT-14 | MT-1 | MT-2 | MT-3 | MT-4 | MT-5 | MT-6 | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Physical & Environmental Security | Intrusion Alarms / Surveillance Equipment | PES-05.1 | Physical access control mechanisms exist to monitor physical intrusion alarms and surveillance equipment. | - CCTV | null | Does the organization monitor physical intrusion alarms and surveillance equipment? | 9 | Detect | null | X | X | There is no evidence of a capability to monitor physical intrusion alarms and surveillance equipment. | Physical & Environmental Security (PES) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Physical access control is decentralized.
• Physical security controls are primarily administrative in nature (e.g., policies & standards), focusing on protecting High Value Assets (HVAs).
• Human Resources, or a similar function, maintains a current list of personnel and facilitates the implementation of physical access management controls. | Physical & Environmental Security (PES) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Physical access control is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for physical access control.
• Human Resources, or a similar function, maintains a current list of personnel with authorized access to organizational facilities and facilitates the implementation of physical access management controls.
• Physical security controls are primarily administrative in nature (e.g., policies & standards).
• Physical controls, administrative processes and technologies are primarily designed and implemented for offices, rooms and facilities that focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• A facilities maintenance team, or similar function, manages the operation of automated physical and environmental protection controls.
• Physical controls and technologies are configured to monitor for, detect and respond to physical security incidents. | Physical & Environmental Security (PES) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A physical security team, or similar function:
o Performs the centralized-management of physical security controls across the enterprise.
o Maintains a current list of personnel with authorized access to organizational facilities and implements physical access management controls.
• A facilities maintenance team, or similar function, manages the operation of environmental protection controls.
• Administrative processes exist to authorize physical access to facilities based on the position or role of the individual.
• Administrative processes and physical controls restrict unescorted access to facilities to personnel with required security clearances, formal access authorizations and validated the need for access.
• A physical security team, or similar function, monitors physical intrusion alarms and surveillance equipment.
• Physical controls and technologies are configured to monitor for, detect and respond to physical security incidents. | Physical & Environmental Security (PES) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | Physical & Environmental Security (PES) efforts are “world-class” capabilities that leverage predictive analysis (e.g., machine learning, AI, etc.). In addition to CMM Level 4 criteria, CMM Level 5 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Stakeholders make time-sensitive decisions to support operational efficiency, which may include automated remediation actions.
▪ Based on predictive analysis, process improvements are implemented according to “continuous improvement” practices that affect process changes. | null | null | null | null | null | null | null | null | null | DCS-10 | PHY-01 | null | null | null | null | null | null | null | null | 7.4 | null | null | null | null | null | null | null | PS-1.3
PS-1.4
PS-3.0 | null | null | null | null | null | null | PE-6(1) | null | PE-6(1) | PE-6(1) | PE-6(1) | null | null | PE-6(1) | PE-6(1) | null | null | null | PE-6(1) | PE-6(1) | null | null | null | null | null | null | null | 3.10.2
NFO - PE-6(1) | null | null | null | null | null | null | null | null | null | 9.2.1.1 | null | null | null | null | 9.2.1.1 | null | 9.2.1.1 | 9.2.1.1 | null | F.1.2.5 | null | 8.1.6 | null | null | null | null | null | null | null | null | PE.L2-3.10.2 | null | null | PE.L2-3.10.2 | PE.L2-3.10.2 | PE-6(1) | null | null | null | null | null | null | null | PE-6(1) | null | PE-6(1) | PE-6(1) | null | PE-6(1) | null | PE-6(1) | PE-6(1) | null | null | null | null | null | null | null | null | null | null | PE-6(1) | null | null | null | null | null | null | null | null | null | null | null | PE-6(1) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | PE-6(1) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 18.9
18.11 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 2-14-3-2 | 2-13-1-2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Article 26 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-7
R-GV-1
R-GV-2
R-GV-4
R-GV-5
R-IR-1
R-IR-2
R-IR-4
R-SA-1 | null | null | null | R-AC-4 | R-AM-1 | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | null | null | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | R-EX-7 | R-GV-1 | R-GV-2 | null | R-GV-4 | R-GV-5 | null | null | null | R-IR-1 | R-IR-2 | null | R-IR-4 | R-SA-1 | null | NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | NT-9 | NT-10 | NT-11 | NT-12 | NT-13 | NT-14 | MT-1 | MT-2 | MT-3 | MT-4 | MT-5 | MT-6 | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Physical & Environmental Security | Monitoring Physical Access To Information Systems | PES-05.2 | Facility security mechanisms exist to monitor physical access to critical information systems or sensitive/regulated data, in addition to the physical access monitoring of the facility. | null | null | Does the organization monitor physical access to critical information systems or sensitive/regulated data, in addition to the physical access monitoring of the facility? | 5 | Detect | null | X | X | There is no evidence of a capability to monitor physical access to critical information systems or sensitive/regulated data, in addition to the physical access monitoring of the facility. | Physical & Environmental Security (PES) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Physical access control is decentralized.
• Physical security controls are primarily administrative in nature (e.g., policies & standards), focusing on protecting High Value Assets (HVAs).
• Human Resources, or a similar function, maintains a current list of personnel and facilitates the implementation of physical access management controls. | Physical & Environmental Security (PES) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Physical access control is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for physical access control.
• Human Resources, or a similar function, maintains a current list of personnel with authorized access to organizational facilities and facilitates the implementation of physical access management controls.
• Physical security controls are primarily administrative in nature (e.g., policies & standards).
• Physical controls, administrative processes and technologies are primarily designed and implemented for offices, rooms and facilities that focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• A facilities maintenance team, or similar function, manages the operation of automated physical and environmental protection controls.
• Physical controls and technologies are configured to monitor for, detect and respond to physical security incidents. | Physical & Environmental Security (PES) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A physical security team, or similar function:
o Performs the centralized-management of physical security controls across the enterprise.
o Maintains a current list of personnel with authorized access to organizational facilities and implements physical access management controls.
• A facilities maintenance team, or similar function, manages the operation of environmental protection controls.
• Administrative processes exist to authorize physical access to facilities based on the position or role of the individual.
• Administrative processes and physical controls restrict unescorted access to facilities to personnel with required security clearances, formal access authorizations and validated the need for access.
• A physical security team, or similar function, monitors physical intrusion alarms and surveillance equipment.
• Physical controls and technologies are configured to monitor for, detect and respond to physical security incidents. | See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to monitor physical access to critical information systems or sensitive/regulated data, in addition to the physical access monitoring of the facility. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to monitor physical access to critical information systems or sensitive/regulated data, in addition to the physical access monitoring of the facility. | null | null | null | null | null | null | null | null | null | null | PHY-01 | null | null | null | null | null | null | null | null | 7.4 | null | null | null | null | null | null | null | PS-1.3 | null | null | null | null | null | null | PE-6(4) | null | null | PE-6(4) | PE-6(4) | null | null | null | PE-6(4) | null | null | null | PE-6(4) | PE-6(4) | null | null | null | null | null | null | null | 3.10.2 | 3.10.1.c
3.10.2.a
3.10.2.b | null | null | null | null | null | null | null | null | 9.2.1.1 | null | null | null | null | 9.2.1.1 | null | 9.2.1.1 | 9.2.1.1 | null | F.10.2 | null | 8.1.6 | null | null | null | null | null | null | null | null | PE.L2-3.10.2 | null | null | PE.L2-3.10.2 | PE.L2-3.10.2 | null | null | null | null | null | null | null | null | PE-6(4) | null | null | PE-6(4) | null | PE-6(4) | null | null | PE-6(4) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 8.5.5 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-7
R-GV-1
R-GV-2
R-GV-4
R-GV-5
R-IR-1
R-IR-2
R-IR-4
R-SA-1 | null | null | null | R-AC-4 | R-AM-1 | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | null | null | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | R-EX-7 | R-GV-1 | R-GV-2 | null | R-GV-4 | R-GV-5 | null | null | null | R-IR-1 | R-IR-2 | null | R-IR-4 | R-SA-1 | null | NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | NT-9 | NT-10 | NT-11 | NT-12 | NT-13 | NT-14 | MT-1 | MT-2 | MT-3 | MT-4 | MT-5 | MT-6 | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | - Added NIST 800-53 R5 mapping for PE-6(4) |
Physical & Environmental Security | Visitor Control | PES-06 | Physical access control mechanisms exist to identify, authorize and monitor visitors before allowing access to the facility (other than areas designated as publicly accessible). | - Visitor logbook
- iLobby (https://goilobby.com/)
- The Receptionist (https://thereceptionist.com/)
- LobbyGuard (http://lobbyguard.com/) | E-PES-02 | Does the organization identify, authorize and monitor visitors before allowing access to the facility (other than areas designated as publicly accessible)? | 9 | Protect | null | X | null | There is no evidence of a capability to identify, authorize and monitor visitors before allowing access to the facility (other than areas designated as publicly accessible). | Physical & Environmental Security (PES) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Physical access control is decentralized.
• Physical security controls are primarily administrative in nature (e.g., policies & standards), focusing on protecting High Value Assets (HVAs).
• Human Resources, or a similar function, maintains a current list of personnel and facilitates the implementation of physical access management controls. | Physical & Environmental Security (PES) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Physical access control is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for physical access control.
• Human Resources, or a similar function, maintains a current list of personnel with authorized access to organizational facilities and facilitates the implementation of physical access management controls.
• Physical security controls are primarily administrative in nature (e.g., policies & standards).
• Physical controls, administrative processes and technologies are primarily designed and implemented for offices, rooms and facilities that focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• A facilities maintenance team, or similar function, manages the operation of automated physical and environmental protection controls. | Physical & Environmental Security (PES) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A physical security team, or similar function:
o Performs the centralized-management of physical security controls across the enterprise.
o Maintains a current list of personnel with authorized access to organizational facilities and implements physical access management controls.
• A facilities maintenance team, or similar function, manages the operation of environmental protection controls.
• Administrative processes exist to authorize physical access to facilities based on the position or role of the individual.
• Administrative processes and physical controls restrict unescorted access to facilities to personnel with required security clearances, formal access authorizations and validated the need for access.
• Administrative processes, physical controls and technologies easily distinguish between onsite personnel and visitors, especially in areas where sensitive/regulated data is accessible.
• Administrative processes, physical controls and technologies identify, authorize and monitor visitors before allowing access to the facility (other than areas designated as publicly accessible). | Physical & Environmental Security (PES) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | Physical & Environmental Security (PES) efforts are “world-class” capabilities that leverage predictive analysis (e.g., machine learning, AI, etc.). In addition to CMM Level 4 criteria, CMM Level 5 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Stakeholders make time-sensitive decisions to support operational efficiency, which may include automated remediation actions.
▪ Based on predictive analysis, process improvements are implemented according to “continuous improvement” practices that affect process changes. | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 11.1.2 | 7.2 | 11.1.2 | null | null | null | null | null | null | OP-1.0
PS-1.1 | null | null | PR.AC-P2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 3.10.3 | 3.10.7.c | 3.10.3[a]
3.10.3[b] | A.03.10.07.c[01]
A.03.10.07.c[02]
A.03.10.07.ODP[01] | null | null | null | null | null | 9.4
9.4.1
9.4.2
9.4.3
9.4.4 | 9.3.2
9.3.3
9.3.4 | null | null | null | null | null | null | 9.3.2
9.3.3
9.3.4 | 9.3.2
9.3.3
9.3.4 | null | F.2.1 | 3.1 | 8.1.7 | null | null | null | null | null | null | 5.9.1.7 | PE.L1-3.10.3 | PE.L1-3.10.3 | PE.L1-3.10.3 | PE.L1-b.1.ix | PE.L2-3.10.3 | PE.L2-3.10.3 | null | null | null | null | 52.204-21(b)(1)(ix) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 2.B.3.1 | null | CIP-006-6
R2 | null | 11.1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | PS-04 | null | null | null | 18.3
18.12 | null | null | null | null | null | null | null | null | null | null | null | null | TPC-47 | null | null | 2-13-1-6 | null | null | null | null | 8.1.2 [MP.IF.2]
8.1.7 [MP.IF.7] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0164 | null | null | null | null | null | null | null | null | null | null | 11.1.2 | null | null | 9.4.4.C.01
9.4.5.C.01
9.4.5.C.02
9.4.6.C.01
9.4.6.C.02
9.4.7.C.01
9.4.8.C.01
9.4.9.C.01
9.4.10.C.01 | null | null | null | null | 8.5.6(b)
5.5.6(f) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | FAR 52.204-21 | null | null | R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-4
R-SA-1
R-SA-2 | R-AC-1 | R-AC-2 | R-AC-3 | R-AC-4 | R-AM-1 | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | null | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | R-EX-7 | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | R-GV-8 | R-IR-1 | R-IR-2 | null | R-IR-4 | R-SA-1 | R-SA-2 | NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | NT-9 | NT-10 | NT-11 | NT-12 | NT-13 | NT-14 | MT-1 | MT-2 | MT-3 | MT-4 | MT-5 | MT-6 | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Physical & Environmental Security | Distinguish Visitors from On-Site Personnel | PES-06.1 | Physical access control mechanisms exist to easily distinguish between onsite personnel and visitors, especially in areas where sensitive/regulated data is accessible. | - Visible badges for visitors that are different from organizational personnel
| null | Does the organization easily distinguish between onsite personnel and visitors, especially in areas where sensitive/regulated data is accessible? | 8 | Protect | null | X | null | There is no evidence of a capability to easily distinguish between onsite personnel and visitors, especially in areas where sensitive/regulated data is accessible. | Physical & Environmental Security (PES) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Physical access control is decentralized.
• Physical security controls are primarily administrative in nature (e.g., policies & standards), focusing on protecting High Value Assets (HVAs).
• Human Resources, or a similar function, maintains a current list of personnel and facilitates the implementation of physical access management controls. | Physical & Environmental Security (PES) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Physical access control is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for physical access control.
• Human Resources, or a similar function, maintains a current list of personnel with authorized access to organizational facilities and facilitates the implementation of physical access management controls.
• Physical security controls are primarily administrative in nature (e.g., policies & standards).
• Physical controls, administrative processes and technologies are primarily designed and implemented for offices, rooms and facilities that focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• A facilities maintenance team, or similar function, manages the operation of automated physical and environmental protection controls.
• Administrative processes, physical controls and technologies easily distinguish between onsite personnel and visitors, especially in areas where sensitive/regulated data is accessible. | Physical & Environmental Security (PES) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A physical security team, or similar function:
o Performs the centralized-management of physical security controls across the enterprise.
o Maintains a current list of personnel with authorized access to organizational facilities and implements physical access management controls.
• A facilities maintenance team, or similar function, manages the operation of environmental protection controls.
• Administrative processes exist to authorize physical access to facilities based on the position or role of the individual.
• Administrative processes and physical controls restrict unescorted access to facilities to personnel with required security clearances, formal access authorizations and validated the need for access.
• Administrative processes, physical controls and technologies easily distinguish between onsite personnel and visitors, especially in areas where sensitive/regulated data is accessible.
• Administrative processes, physical controls and technologies identify, authorize and monitor visitors before allowing access to the facility (other than areas designated as publicly accessible). | See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to easily distinguish between onsite personnel and visitors, especially in areas where sensitive/regulated data is accessible. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to easily distinguish between onsite personnel and visitors, especially in areas where sensitive/regulated data is accessible. | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 3.10.1.b | null | null | null | null | null | null | null | 9.2 | 9.3.2 | null | null | null | null | null | null | 9.3.2 | 9.3.2 | null | F.2.4 | null | null | null | null | null | null | null | null | null | null | null | null | PE.L1-b.1.ix | null | null | null | null | null | null | 52.204-21(b)(1)(ix) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | TPC-47 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | FAR 52.204-21 | null | null | R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-BC-1
R-BC-2
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-4
R-SA-1
R-SA-2 | R-AC-1 | R-AC-2 | R-AC-3 | R-AC-4 | R-AM-1 | R-AM-2 | null | R-BC-1 | R-BC-2 | null | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | R-EX-7 | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | R-GV-8 | R-IR-1 | R-IR-2 | null | R-IR-4 | R-SA-1 | R-SA-2 | NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | NT-9 | NT-10 | NT-11 | NT-12 | NT-13 | NT-14 | MT-1 | MT-2 | MT-3 | MT-4 | MT-5 | MT-6 | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Physical & Environmental Security | Identification Requirement | PES-06.2 | Physical access control mechanisms exist to requires at least one (1) form of government-issued or organization-issued photo identification to authenticate individuals before they can gain access to the facility. | null | null | Does the organization require at least one (1) form of government-issued or organization-issued photo identification to authenticate individuals before they can gain access to the facility? | 8 | Protect | null | X | null | There is no evidence of a capability to requires at least one (1) form of government-issued or organization-issued photo identification to authenticate individuals before they can gain access to the facility. | Physical & Environmental Security (PES) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Physical access control is decentralized.
• Physical security controls are primarily administrative in nature (e.g., policies & standards), focusing on protecting High Value Assets (HVAs).
• Human Resources, or a similar function, maintains a current list of personnel and facilitates the implementation of physical access management controls. | Physical & Environmental Security (PES) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Physical access control is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for physical access control.
• Human Resources, or a similar function, maintains a current list of personnel with authorized access to organizational facilities and facilitates the implementation of physical access management controls.
• Physical security controls are primarily administrative in nature (e.g., policies & standards).
• Physical controls, administrative processes and technologies are primarily designed and implemented for offices, rooms and facilities that focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• A facilities maintenance team, or similar function, manages the operation of automated physical and environmental protection controls.
• Administrative processes require at least one (1) form of government-issued or organization-issued photo identification to authenticate individuals before they can gain access to the facility. | Physical & Environmental Security (PES) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A physical security team, or similar function:
o Performs the centralized-management of physical security controls across the enterprise.
o Maintains a current list of personnel with authorized access to organizational facilities and implements physical access management controls.
• A facilities maintenance team, or similar function, manages the operation of environmental protection controls.
• Administrative processes exist to authorize physical access to facilities based on the position or role of the individual.
• Administrative processes and physical controls restrict unescorted access to facilities to personnel with required security clearances, formal access authorizations and validated the need for access.
• Administrative processes require at least one (1) form of government-issued or organization-issued photo identification to authenticate individuals before they can gain access to the facility. | See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to requires at least one (1) form of government-issued or organization-issued photo identification to authenticate individuals before they can gain access to the facility. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to requires at least one (1) form of government-issued or organization-issued photo identification to authenticate individuals before they can gain access to the facility. | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | PS-1.1 | null | null | null | null | null | null | PE-2(2) | null | null | null | PE-2(2) | null | null | null | null | PE-2(2) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 9.4
9.4.1
9.4.2
9.4.3 | 9.3.2 | null | null | null | null | null | null | 9.3.2 | 9.3.2 | null | F.2.2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 622(2)(d)(C)(ii) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | TPC-47 | null | null | null | null | null | null | null | 8.1.2 [MP.IF.2] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | OR 6464A | null | x | R-AC-4
R-BC-2
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-7
R-GV-1
R-GV-2
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-IR-1
R-SA-1 | null | null | null | R-AC-4 | null | null | null | null | R-BC-2 | null | null | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | R-EX-7 | R-GV-1 | R-GV-2 | null | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | null | R-IR-1 | null | null | null | R-SA-1 | null | NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | NT-9 | NT-10 | NT-11 | NT-12 | NT-13 | NT-14 | MT-1 | MT-2 | MT-3 | MT-4 | MT-5 | MT-6 | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Physical & Environmental Security | Restrict Unescorted Access | PES-06.3 | Physical access control mechanisms exist to restrict unescorted access to facilities to personnel with required security clearances, formal access authorizations and validate the need for access. | null | null | Does the organization restrict unescorted access to facilities to personnel with required security clearances, formal access authorizations and validate the need for access? | 10 | Protect | null | X | null | There is no evidence of a capability to restrict unescorted access to facilities to personnel with required security clearances, formal access authorizations and validate the need for access. | Physical & Environmental Security (PES) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Physical access control is decentralized.
• Physical security controls are primarily administrative in nature (e.g., policies & standards), focusing on protecting High Value Assets (HVAs).
• Human Resources, or a similar function, maintains a current list of personnel and facilitates the implementation of physical access management controls. | Physical & Environmental Security (PES) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Physical access control is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for physical access control.
• Human Resources, or a similar function, maintains a current list of personnel with authorized access to organizational facilities and facilitates the implementation of physical access management controls.
• Physical security controls are primarily administrative in nature (e.g., policies & standards).
• Physical controls, administrative processes and technologies are primarily designed and implemented for offices, rooms and facilities that focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• A facilities maintenance team, or similar function, manages the operation of automated physical and environmental protection controls. | Physical & Environmental Security (PES) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A physical security team, or similar function:
o Performs the centralized-management of physical security controls across the enterprise.
o Maintains a current list of personnel with authorized access to organizational facilities and implements physical access management controls.
• A facilities maintenance team, or similar function, manages the operation of environmental protection controls.
• Administrative processes exist to authorize physical access to facilities based on the position or role of the individual.
• Administrative processes and physical controls restrict unescorted access to facilities to personnel with required security clearances, formal access authorizations and validated the need for access. | See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to restrict unescorted access to facilities to personnel with required security clearances, formal access authorizations and validate the need for access. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to restrict unescorted access to facilities to personnel with required security clearances, formal access authorizations and validate the need for access. | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | PR.AC-P2 | null | null | null | PE-2(3) | null | null | null | PE-2(3) | null | null | null | null | PE-2(3) | null | null | null | null | null | null | null | null | null | null | null | 3.10.3 | 3.10.7.c | 3.10.3[a]
3.10.3[b] | A.03.10.07.c[01] | null | null | null | null | null | 9.3 | 9.3.2 | null | null | null | null | null | null | 9.3.2 | 9.3.2 | null | F.2.3 | 3.1 | null | null | null | null | null | null | null | null | PE.L1-3.10.3 | PE.L1-3.10.3 | PE.L1-3.10.3 | PE.L1-b.1.ix | PE.L2-3.10.3 | PE.L2-3.10.3 | null | null | null | null | 52.204-21(b)(1)(ix) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | TPC-48 | null | null | 2-13-1-7 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0164 | null | null | null | null | null | null | null | null | null | null | null | null | null | 9.4.7.C.01 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | FAR 52.204-21 | null | x | R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-BC-1
R-BC-2
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-4
R-SA-1
R-SA-2 | R-AC-1 | R-AC-2 | R-AC-3 | R-AC-4 | R-AM-1 | R-AM-2 | null | R-BC-1 | R-BC-2 | null | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | R-EX-7 | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | R-GV-8 | R-IR-1 | R-IR-2 | null | R-IR-4 | R-SA-1 | R-SA-2 | NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | NT-9 | NT-10 | NT-11 | NT-12 | NT-13 | NT-14 | MT-1 | MT-2 | MT-3 | MT-4 | MT-5 | MT-6 | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Physical & Environmental Security | Automated Records Management & Review | PES-06.4 | Automated mechanisms exist to facilitate the maintenance and review of visitor access records. | null | E-PES-02 | Does the organization use automated mechanisms to facilitate the maintenance and review of visitor access records? | 5 | Protect | null | X | X | There is no evidence of a capability to facilitate the maintenance and review of visit or access records. | SP-CMM1 is N/A, since a structured process is required to facilitate the maintenance and review of visit or access records. | SP-CMM2 is N/A, since a well-defined process is required to facilitate the maintenance and review of visit or access records. | Physical & Environmental Security (PES) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A physical security team, or similar function:
o Performs the centralized-management of physical security controls across the enterprise.
o Maintains a current list of personnel with authorized access to organizational facilities and implements physical access management controls.
• A facilities maintenance team, or similar function, manages the operation of environmental protection controls.
• Administrative processes exist to authorize physical access to facilities based on the position or role of the individual.
• Administrative processes and physical controls restrict unescorted access to facilities to personnel with required security clearances, formal access authorizations and validated the need for access. | See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to facilitate the maintenance and review of visit or access records. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to facilitate the maintenance and review of visit or access records. | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | PE-8(1) | null | null | PE-8(1) | PE-8(1) | null | null | null | PE-8(1) | null | null | null | null | PE-8(1) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | F.2.5 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | PE-8(1) | null | null | PE-8(1) | null | PE-8(1) | null | null | PE-8(1) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 9.4.9.C.01 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | R-AC-1
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-5
R-GV-1
R-GV-2
R-IR-1
R-IR-4
R-SA-1 | R-AC-1 | null | null | R-AC-4 | R-AM-1 | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | R-BC-3 | null | R-BC-5 | null | null | null | null | null | null | null | R-GV-1 | R-GV-2 | null | null | null | null | null | null | R-IR-1 | null | null | R-IR-4 | R-SA-1 | null | NT-7
MT-1
MT-2
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | null | null | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | null | null | null |
Physical & Environmental Security | Minimize Visitor Personal Data (PD) | PES-06.5 | Mechanisms exist to minimize the collection of Personal Data (PD) contained in visitor access records. | null | null | Does the organization minimize the collection of Personal Data (PD) contained in visitor access records? | 3 | Protect | null | X | X | There is no evidence of a capability to minimize the collection of Personal Data (PD) contained in visit or access records. | SP-CMM1 is N/A, since a structured process is required to minimize the collection of Personal Data (PD) contained in visit or access records. | Physical & Environmental Security (PES) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Physical access control is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for physical access control.
• Human Resources, or a similar function, maintains a current list of personnel with authorized access to organizational facilities and facilitates the implementation of physical access management controls.
• Physical security controls are primarily administrative in nature (e.g., policies & standards).
• Physical controls, administrative processes and technologies are primarily designed and implemented for offices, rooms and facilities that focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• A facilities maintenance team, or similar function, manages the operation of automated physical and environmental protection controls. | Physical & Environmental Security (PES) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A physical security team, or similar function:
o Performs the centralized-management of physical security controls across the enterprise.
o Maintains a current list of personnel with authorized access to organizational facilities and implements physical access management controls.
• A facilities maintenance team, or similar function, manages the operation of environmental protection controls.
• Administrative processes exist to authorize physical access to facilities based on the position or role of the individual.
• Administrative processes and physical controls restrict unescorted access to facilities to personnel with required security clearances, formal access authorizations and validated the need for access. | See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to minimize the collection of Personal Data (PD) contained in visit or access records. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to minimize the collection of Personal Data (PD) contained in visit or access records. | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | PE-8(3)
PM-25
SA-8(33) | PE-8(3)
PM-25
SA-8(33) | null | null | null | null | null | null | null | null | null | PM-25 | null | null | null | PM-25 | null | null | null | null | null | null | null | null | null | null | null | 9.3.4 | null | null | null | null | null | null | 9.3.4 | 9.3.4 | null | P.5 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 6-1-1308(3) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 9.4.9.C.01 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-4
R-SA-1
R-SA-2 | R-AC-1 | R-AC-2 | R-AC-3 | R-AC-4 | R-AM-1 | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | null | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | R-EX-7 | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | R-GV-8 | R-IR-1 | R-IR-2 | null | R-IR-4 | R-SA-1 | R-SA-2 | NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-11
MT-12
MT-13
MT-14
MT-15 | null | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | NT-9 | NT-10 | NT-11 | NT-12 | NT-13 | NT-14 | MT-1 | MT-2 | MT-3 | MT-4 | MT-5 | MT-6 | MT-7 | MT-8 | MT-9 | null | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Physical & Environmental Security | Visitor Access Revocation | PES-06.6 | Mechanisms exist to ensure visitor badges, or other issued identification, are surrendered before visitors leave the facility or are deactivated at a pre-determined time/date of expiration. | null | null | Does the organization ensure visitor badges, or other issued identification, are surrendered before visitors leave the facility or are deactivated at a pre-determined time/date of expiration? | 7 | Protect | null | X | X | There is no evidence of a capability to ensure visit or badges, or other issued identification, are surrendered before visitors leave the facility or are deactivated at a pre-determined time/date of expiration. | SP-CMM1 is N/A, since a structured process is required to ensure visit or badges, or other issued identification, are surrendered before visitors leave the facility or are deactivated at a pre-determined time/date of expiration. | Physical & Environmental Security (PES) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Physical access control is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for physical access control.
• Human Resources, or a similar function, maintains a current list of personnel with authorized access to organizational facilities and facilitates the implementation of physical access management controls.
• Physical security controls are primarily administrative in nature (e.g., policies & standards).
• Physical controls, administrative processes and technologies are primarily designed and implemented for offices, rooms and facilities that focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• A facilities maintenance team, or similar function, manages the operation of automated physical and environmental protection controls. | Physical & Environmental Security (PES) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A physical security team, or similar function:
o Performs the centralized-management of physical security controls across the enterprise.
o Maintains a current list of personnel with authorized access to organizational facilities and implements physical access management controls.
• A facilities maintenance team, or similar function, manages the operation of environmental protection controls.
• Administrative processes exist to authorize physical access to facilities based on the position or role of the individual.
• Administrative processes and physical controls restrict unescorted access to facilities to personnel with required security clearances, formal access authorizations and validated the need for access. | See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to ensure visit or badges, or other issued identification, are surrendered before visitors leave the facility or are deactivated at a pre-determined time/date of expiration. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to ensure visit or badges, or other issued identification, are surrendered before visitors leave the facility or are deactivated at a pre-determined time/date of expiration. | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 9.3.3 | null | null | null | null | null | null | 9.3.3 | 9.3.3 | null | F.1.2.8.1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | TPC-47 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1 | null | null | null | R-AC-4 | R-AM-1 | R-AM-2 | R-AM-3 | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | R-EX-6 | R-EX-7 | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | null | R-IR-1 | R-IR-2 | R-IR-3 | R-IR-4 | R-SA-1 | null | NT-1
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-8
MT-9
MT-10
MT-12
MT-13
MT-14
MT-15 | NT-1 | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | NT-9 | NT-10 | NT-11 | NT-12 | NT-13 | NT-14 | null | null | null | null | null | null | null | MT-8 | MT-9 | MT-10 | null | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Physical & Environmental Security | Supporting Utilities | PES-07 | Facility security mechanisms exist to protect power equipment and power cabling for the system from damage and destruction. | null | E-PES-01 | Does the organization protect power equipment and power cabling for the system from damage and destruction? | 9 | Protect | null | X | null | There is no evidence of a capability to protect power equipment and power cabling for the system from damage and destruction. | Physical & Environmental Security (PES) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Physical access control is decentralized.
• Physical security controls are primarily administrative in nature (e.g., policies & standards), focusing on protecting High Value Assets (HVAs).
• Human Resources, or a similar function, maintains a current list of personnel and facilitates the implementation of physical access management controls. | Physical & Environmental Security (PES) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Physical access control is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for physical access control.
• Human Resources, or a similar function, maintains a current list of personnel with authorized access to organizational facilities and facilitates the implementation of physical access management controls.
• Physical security controls are primarily administrative in nature (e.g., policies & standards).
• Physical controls, administrative processes and technologies are primarily designed and implemented for offices, rooms and facilities that focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• A facilities maintenance team, or similar function, manages the operation of automated physical and environmental protection controls. | Physical & Environmental Security (PES) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A physical security team, or similar function:
o Performs the centralized-management of physical security controls across the enterprise.
o Maintains a current list of personnel with authorized access to organizational facilities and implements physical access management controls.
• A facilities maintenance team, or similar function, manages the operation of environmental protection controls.
• Administrative processes exist to authorize physical access to facilities based on the position or role of the individual.
• Administrative processes and physical controls restrict unescorted access to facilities to personnel with required security clearances, formal access authorizations and validated the need for access.
• Administrative processes and physical controls address system component location within the facility to minimize potential damage from physical and environmental hazards and to minimize the opportunity for unauthorized access. | Physical & Environmental Security (PES) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to protect power equipment and power cabling for the system from damage and destruction. | A1.2 | null | null | null | null | null | null | DSS01.04 | null | DCS-12
DCS-14 | null | SO10 | null | null | null | null | null | null | 11.2.2
11.2.3 | 7.11
7.12 | 11.2.2
11.2.3 | null | 6.8.2.2
6.8.2.3 | null | null | null | null | PS-3.1 | null | null | null | null | null | null | PE-9 | null | PE-9 | PE-9 | PE-9 | null | null | PE-9 | PE-9 | null | null | null | PE-9 | PE-9 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | PR.IR-02 | null | null | null | null | null | null | null | null | null | null | null | null | F.3.1 | null | null | null | null | null | null | EC:SG2.SP1 | null | null | null | null | null | null | null | null | PE-9 | null | null | null | null | null | null | null | PE-9 | null | PE-9 | PE-9 | null | PE-9 | null | PE-9 | PE-9 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | PE-9 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | PE-9 | null | null | null | 3.4.3(35) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | PS-01
PS-06 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 8.1.3 [MP.IF.3]
8.1.4 [MP.IF.4] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 11.2.2
11.2.3 | null | null | 8.3.3.C.01
8.3.4.C.01
8.3.4.C.02
8.3.5.C.01 | null | null | null | null | 8.5.2
8.5.2(a)
8.5.2(b)
8.5.2(c) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | null | null | x | R-AM-1
R-AM-3
R-BC-1
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-7
R-GV-1
R-GV-2
R-GV-4
R-GV-5
R-IR-4
R-SA-1 | null | null | null | null | R-AM-1 | null | R-AM-3 | R-BC-1 | null | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | R-EX-7 | R-GV-1 | R-GV-2 | null | R-GV-4 | R-GV-5 | null | null | null | null | null | null | R-IR-4 | R-SA-1 | null | NT-1
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | NT-1 | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | NT-9 | NT-10 | NT-11 | NT-12 | NT-13 | NT-14 | MT-1 | MT-2 | MT-3 | MT-4 | MT-5 | MT-6 | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Physical & Environmental Security | Automatic Voltage Controls | PES-07.1 | Facility security mechanisms exist to utilize automatic voltage controls for critical system components. | null | null | Does the organization utilize automatic voltage controls for critical system components? | 8 | Protect | null | X | null | There is no evidence of a capability to utilize automatic voltage controls for critical system components. | Physical & Environmental Security (PES) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Physical access control is decentralized.
• Physical security controls are primarily administrative in nature (e.g., policies & standards), focusing on protecting High Value Assets (HVAs).
• Human Resources, or a similar function, maintains a current list of personnel and facilitates the implementation of physical access management controls. | Physical & Environmental Security (PES) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Physical access control is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for physical access control.
• Human Resources, or a similar function, maintains a current list of personnel with authorized access to organizational facilities and facilitates the implementation of physical access management controls.
• Physical security controls are primarily administrative in nature (e.g., policies & standards).
• Physical controls, administrative processes and technologies are primarily designed and implemented for offices, rooms and facilities that focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• A facilities maintenance team, or similar function, manages the operation of automated physical and environmental protection controls. | Physical & Environmental Security (PES) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A physical security team, or similar function:
o Performs the centralized-management of physical security controls across the enterprise.
o Maintains a current list of personnel with authorized access to organizational facilities and implements physical access management controls.
• A facilities maintenance team, or similar function, manages the operation of environmental protection controls.
• Administrative processes exist to authorize physical access to facilities based on the position or role of the individual.
• Administrative processes and physical controls restrict unescorted access to facilities to personnel with required security clearances, formal access authorizations and validated the need for access. | Physical & Environmental Security (PES) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to utilize automatic voltage controls for critical system components. | A1.2 | null | null | null | null | null | null | DSS01.04 | null | null | null | null | null | null | null | null | null | null | 11.2.2 | 7.11 | 11.2.2 | null | 6.8.2.2 | null | null | null | null | PS-3.1 | null | null | null | null | null | null | PE-9(2) | null | null | null | PE-9(2) | null | null | null | null | PE-9(2) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | F.5 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 3.4.3(35) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 8.1.4 [MP.IF.4] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 11.2.2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | null | null | null | R-AM-1
R-AM-3
R-BC-1
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-7
R-GV-1
R-GV-2
R-GV-4
R-GV-5
R-IR-4
R-SA-1 | null | null | null | null | R-AM-1 | null | R-AM-3 | R-BC-1 | null | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | R-EX-7 | R-GV-1 | R-GV-2 | null | R-GV-4 | R-GV-5 | null | null | null | null | null | null | R-IR-4 | R-SA-1 | null | NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | NT-9 | NT-10 | NT-11 | NT-12 | NT-13 | NT-14 | MT-1 | MT-2 | MT-3 | MT-4 | MT-5 | MT-6 | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Physical & Environmental Security | Emergency Shutoff | PES-07.2 | Facility security mechanisms exist to shut off power in emergency situations by:
▪ Placing emergency shutoff switches or devices in close proximity to systems or system components to facilitate safe and easy access for personnel; and
▪ Protecting emergency power shutoff capability from unauthorized activation. | null | null | Does the organization shut off power in emergency situations by:
▪ Placing emergency shutoff switches or devices in close proximity to systems or system components to facilitate safe and easy access for personnel; and
▪ Protecting emergency power shutoff capability from unauthorized activation? | 8 | Protect | null | X | null | There is no evidence of a capability to shut off power in emergency situations by:
▪ Placing emergency shutoff switches or devices in close proximity to systems or system components to facilitate safe and easy access for personnel; and
▪ Protecting emergency power shutoff capability from unauthorized activation. | Physical & Environmental Security (PES) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Physical access control is decentralized.
• Physical security controls are primarily administrative in nature (e.g., policies & standards), focusing on protecting High Value Assets (HVAs).
• Human Resources, or a similar function, maintains a current list of personnel and facilitates the implementation of physical access management controls. | Physical & Environmental Security (PES) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Physical access control is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for physical access control.
• Human Resources, or a similar function, maintains a current list of personnel with authorized access to organizational facilities and facilitates the implementation of physical access management controls.
• Physical security controls are primarily administrative in nature (e.g., policies & standards).
• Physical controls, administrative processes and technologies are primarily designed and implemented for offices, rooms and facilities that focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• A facilities maintenance team, or similar function, manages the operation of automated physical and environmental protection controls. | Physical & Environmental Security (PES) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A physical security team, or similar function:
o Performs the centralized-management of physical security controls across the enterprise.
o Maintains a current list of personnel with authorized access to organizational facilities and implements physical access management controls.
• A facilities maintenance team, or similar function, manages the operation of environmental protection controls.
• Administrative processes exist to authorize physical access to facilities based on the position or role of the individual.
• Administrative processes and physical controls restrict unescorted access to facilities to personnel with required security clearances, formal access authorizations and validated the need for access. | Physical & Environmental Security (PES) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to shut off power in emergency situations by:
▪ Placing emergency shutoff switches or devices in close proximity to systems or system components to facilitate safe and easy access for personnel; and
▪ Protecting emergency power shutoff capability from unauthorized activation. | A1.2 | null | null | null | null | null | null | DSS01.04 | null | null | null | null | null | null | null | null | null | null | 11.2.2 | 7.11 | 11.2.2 | null | null | null | null | null | null | PS-3.1 | null | null | null | null | null | null | PE-10 | null | PE-10 | PE-10 | PE-10 | null | null | PE-10 | PE-10 | null | null | null | PE-10 | PE-10 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | F.3.12 | null | null | null | null | null | null | EC:SG4.SP1
EC:SG4.SP2 | null | null | null | null | null | null | null | null | PE-10 | null | null | null | null | null | null | null | PE-10 | null | PE-10 | PE-10 | null | PE-10 | null | PE-10 | PE-10 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | PE-10 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | PE-10 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 11.2.2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | R-AM-1
R-AM-3
R-BC-1
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-7
R-GV-1
R-GV-2
R-GV-4
R-GV-5
R-IR-4
R-SA-1 | null | null | null | null | R-AM-1 | null | R-AM-3 | R-BC-1 | null | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | R-EX-7 | R-GV-1 | R-GV-2 | null | R-GV-4 | R-GV-5 | null | null | null | null | null | null | R-IR-4 | R-SA-1 | null | NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | NT-9 | NT-10 | NT-11 | NT-12 | NT-13 | NT-14 | MT-1 | MT-2 | MT-3 | MT-4 | MT-5 | MT-6 | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Physical & Environmental Security | Emergency Power | PES-07.3 | Facility security mechanisms exist to supply alternate power, capable of maintaining minimally-required operational capability, in the event of an extended loss of the primary power source. | null | null | Does the organization supply alternate power, capable of maintaining minimally-required operational capability, in the event of an extended loss of the primary power source? | 8 | Protect | null | X | null | There is no evidence of a capability to supply alternate power, capable of maintaining minimally-required operational capability, in the event of an extended loss of the primary power source. | Physical & Environmental Security (PES) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Physical access control is decentralized.
• Physical security controls are primarily administrative in nature (e.g., policies & standards), focusing on protecting High Value Assets (HVAs).
• Human Resources, or a similar function, maintains a current list of personnel and facilitates the implementation of physical access management controls. | Physical & Environmental Security (PES) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Physical access control is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for physical access control.
• Human Resources, or a similar function, maintains a current list of personnel with authorized access to organizational facilities and facilitates the implementation of physical access management controls.
• Physical security controls are primarily administrative in nature (e.g., policies & standards).
• Physical controls, administrative processes and technologies are primarily designed and implemented for offices, rooms and facilities that focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• A facilities maintenance team, or similar function, manages the operation of automated physical and environmental protection controls. | Physical & Environmental Security (PES) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A physical security team, or similar function:
o Performs the centralized-management of physical security controls across the enterprise.
o Maintains a current list of personnel with authorized access to organizational facilities and implements physical access management controls.
• A facilities maintenance team, or similar function, manages the operation of environmental protection controls.
• Administrative processes exist to authorize physical access to facilities based on the position or role of the individual.
• Administrative processes and physical controls restrict unescorted access to facilities to personnel with required security clearances, formal access authorizations and validated the need for access. | Physical & Environmental Security (PES) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to supply alternate power, capable of maintaining minimally-required operational capability, in the event of an extended loss of the primary power source. | A1.2 | null | null | null | null | null | null | DSS01.04 | null | null | null | null | null | CR 7.5 (11.7) | null | null | null | null | 11.2.2 | 7.11 | 11.2.2 | null | null | null | null | null | null | PS-3.1 | null | null | null | null | null | null | PE-11
PE-11(1)
PE-11(2) | null | PE-11 | PE-11 | PE-11
PE-11(1)
PE-11(2) | null | null | PE-11 | PE-11
PE-11(1) | null | null | null | PE-11 | PE-11
PE-11(1) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | PR.IR-02 | null | null | null | null | null | null | null | null | null | null | null | null | F.6.1 | null | null | null | null | null | null | EC:SG4.SP1
EC:SG4.SP2
TM:SG5.SP1 | null | null | null | null | null | null | null | null | PE-11 | null | null | null | null | null | null | null | PE-11
PE-11(1) | null | PE-11 | PE-11
PE-11(1) | null | PE-11
PE-11(1) | null | PE-11 | PE-11
PE-11(1) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | PE-11 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | PE-11 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | PS-01
PS-06 | null | null | null | 18.14
18.15 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 1123 | null | null | null | null | null | null | null | null | null | null | 11.2.2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | R-AM-1
R-AM-3
R-BC-1
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-7
R-GV-1
R-GV-2
R-GV-4
R-GV-5
R-IR-4
R-SA-1 | null | null | null | null | R-AM-1 | null | R-AM-3 | R-BC-1 | null | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | R-EX-7 | R-GV-1 | R-GV-2 | null | R-GV-4 | R-GV-5 | null | null | null | null | null | null | R-IR-4 | R-SA-1 | null | NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | NT-9 | NT-10 | NT-11 | NT-12 | NT-13 | NT-14 | MT-1 | MT-2 | MT-3 | MT-4 | MT-5 | MT-6 | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Physical & Environmental Security | Emergency Lighting | PES-07.4 | Facility security mechanisms exist to utilize and maintain automatic emergency lighting that activates in the event of a power outage or disruption and that covers emergency exits and evacuation routes within the facility. | null | null | Does the organization utilize and maintain automatic emergency lighting that activates in the event of a power outage or disruption and that covers emergency exits and evacuation routes within the facility? | 7 | Protect | null | X | null | There is no evidence of a capability to utilize and maintain automatic emergency lighting that activates in the event of a power outage or disruption and that covers emergency exits and evacuation routes within the facility. | Physical & Environmental Security (PES) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Physical access control is decentralized.
• Physical security controls are primarily administrative in nature (e.g., policies & standards), focusing on protecting High Value Assets (HVAs).
• Human Resources, or a similar function, maintains a current list of personnel and facilitates the implementation of physical access management controls. | Physical & Environmental Security (PES) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Physical access control is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for physical access control.
• Human Resources, or a similar function, maintains a current list of personnel with authorized access to organizational facilities and facilitates the implementation of physical access management controls.
• Physical security controls are primarily administrative in nature (e.g., policies & standards).
• Physical controls, administrative processes and technologies are primarily designed and implemented for offices, rooms and facilities that focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• A facilities maintenance team, or similar function, manages the operation of automated physical and environmental protection controls. | Physical & Environmental Security (PES) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A physical security team, or similar function:
o Performs the centralized-management of physical security controls across the enterprise.
o Maintains a current list of personnel with authorized access to organizational facilities and implements physical access management controls.
• A facilities maintenance team, or similar function, manages the operation of environmental protection controls.
• Administrative processes exist to authorize physical access to facilities based on the position or role of the individual.
• Administrative processes and physical controls restrict unescorted access to facilities to personnel with required security clearances, formal access authorizations and validated the need for access. | Physical & Environmental Security (PES) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to utilize and maintain automatic emergency lighting that activates in the event of a power outage or disruption and that covers emergency exits and evacuation routes within the facility. | A1.2 | null | null | null | null | null | null | DSS01.04 | null | null | null | null | null | null | null | null | null | null | 11.2.2 | 7.11 | 11.2.2 | null | null | null | null | null | null | PS-3.1 | null | null | null | null | null | null | PE-12 | PE-12 | PE-12 | PE-12 | PE-12 | null | PE-12 | PE-12 | PE-12 | null | null | PE-12 | PE-12 | PE-12 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | PR.IR-02 | null | null | null | null | null | null | null | null | null | null | null | null | F.1.2.15 | null | null | null | null | null | null | EC:SG4.SP1
EC:SG4.SP2 | null | null | null | null | null | null | null | null | PE-12 | null | null | null | null | null | null | null | PE-12 | PE-12 | PE-12 | PE-12 | PE-12 | PE-12 | PE-12 | PE-12 | PE-12 | PE-12 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | PE-12 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | PE-12 | null | PE-12 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 18.16 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 11.2.2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | R-AM-1
R-AM-3
R-BC-1
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-7
R-GV-1
R-GV-2
R-GV-4
R-GV-5
R-IR-4
R-SA-1 | null | null | null | null | R-AM-1 | null | R-AM-3 | R-BC-1 | null | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | R-EX-7 | R-GV-1 | R-GV-2 | null | R-GV-4 | R-GV-5 | null | null | null | null | null | null | R-IR-4 | R-SA-1 | null | NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | NT-9 | NT-10 | NT-11 | NT-12 | NT-13 | NT-14 | MT-1 | MT-2 | MT-3 | MT-4 | MT-5 | MT-6 | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Physical & Environmental Security | Water Damage Protection | PES-07.5 | Facility security mechanisms exist to protect systems from damage resulting from water leakage by providing master shutoff valves that are accessible, working properly and known to key personnel. | - Water leak sensors
- Humidity sensors | null | Does the organization protect systems from damage resulting from water leakage by providing master shutoff valves that are accessible, working properly and known to key personnel? | 8 | Protect | null | X | null | There is no evidence of a capability to protect systems from damage resulting from water leakage by providing master shutoff valves that are accessible, working properly and known to key personnel. | Physical & Environmental Security (PES) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Physical access control is decentralized.
• Physical security controls are primarily administrative in nature (e.g., policies & standards), focusing on protecting High Value Assets (HVAs).
• Human Resources, or a similar function, maintains a current list of personnel and facilitates the implementation of physical access management controls. | Physical & Environmental Security (PES) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Physical access control is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for physical access control.
• Human Resources, or a similar function, maintains a current list of personnel with authorized access to organizational facilities and facilitates the implementation of physical access management controls.
• Physical security controls are primarily administrative in nature (e.g., policies & standards).
• Physical controls, administrative processes and technologies are primarily designed and implemented for offices, rooms and facilities that focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• A facilities maintenance team, or similar function, manages the operation of automated physical and environmental protection controls.
• Administrative processes and physical controls address system component location within the facility to minimize potential damage from physical and environmental hazards and to minimize the opportunity for unauthorized access. | Physical & Environmental Security (PES) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A physical security team, or similar function:
o Performs the centralized-management of physical security controls across the enterprise.
o Maintains a current list of personnel with authorized access to organizational facilities and implements physical access management controls.
• A facilities maintenance team, or similar function, manages the operation of environmental protection controls.
• Administrative processes exist to authorize physical access to facilities based on the position or role of the individual.
• Administrative processes and physical controls restrict unescorted access to facilities to personnel with required security clearances, formal access authorizations and validated the need for access.
• Administrative processes and physical controls address system component location within the facility to minimize potential damage from physical and environmental hazards and to minimize the opportunity for unauthorized access. | Physical & Environmental Security (PES) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to protect systems from damage resulting from water leakage by providing master shutoff valves that are accessible, working properly and known to key personnel. | A1.2 | null | null | null | null | null | null | DSS01.04 | null | DCS-13 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | PS-3.1 | null | null | null | null | null | null | PE-15 | PE-15 | PE-15 | PE-15 | PE-15 | null | PE-15 | PE-15 | PE-15 | null | null | PE-15 | PE-15 | PE-15 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | PR.IR-02 | null | null | null | null | null | null | null | null | null | null | null | null | F.3.4 | null | null | null | null | null | null | EC:SG4.SP1
EC:SG4.SP2 | null | null | null | null | null | null | null | null | PE-15 | null | null | null | null | null | null | null | PE-15 | PE-15 | PE-15 | PE-15 | PE-15 | PE-15 | PE-15 | PE-15 | PE-15 | PE-15 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | PE-15 | PE-15 | PE-15 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | PE-15 | PE-15 | PE-15 | null | null | null | 3.4.3(35) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | PS-01 | null | null | null | 18.19 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | R-AM-1
R-AM-3
R-BC-1
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-7
R-GV-1
R-GV-2
R-GV-4
R-GV-5
R-IR-4
R-SA-1 | null | null | null | null | R-AM-1 | null | R-AM-3 | R-BC-1 | null | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | R-EX-7 | R-GV-1 | R-GV-2 | null | R-GV-4 | R-GV-5 | null | null | null | null | null | null | R-IR-4 | R-SA-1 | null | NT-1
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | NT-1 | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | NT-9 | NT-10 | NT-11 | NT-12 | NT-13 | NT-14 | MT-1 | MT-2 | MT-3 | MT-4 | MT-5 | MT-6 | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Physical & Environmental Security | Automation Support for Water Damage Protection | PES-07.6 | Facility security mechanisms exist to detect the presence of water in the vicinity of critical information systems and alert facility maintenance and IT personnel. | null | null | Does the organization detect the presence of water in the vicinity of critical information systems and alert facility maintenance and IT personnel? | 5 | Protect | null | X | null | There is no evidence of a capability to detect the presence of water in the vicinity of critical information systems and alert facility maintenance and IT personnel. | SP-CMM1 is N/A, since a structured process is required to detect the presence of water in the vicinity of critical information systems and alert facility maintenance and IT personnel. | Physical & Environmental Security (PES) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Physical access control is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for physical access control.
• Human Resources, or a similar function, maintains a current list of personnel with authorized access to organizational facilities and facilitates the implementation of physical access management controls.
• Physical security controls are primarily administrative in nature (e.g., policies & standards).
• Physical controls, administrative processes and technologies are primarily designed and implemented for offices, rooms and facilities that focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• A facilities maintenance team, or similar function, manages the operation of automated physical and environmental protection controls. | Physical & Environmental Security (PES) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A physical security team, or similar function:
o Performs the centralized-management of physical security controls across the enterprise.
o Maintains a current list of personnel with authorized access to organizational facilities and implements physical access management controls.
• A facilities maintenance team, or similar function, manages the operation of environmental protection controls.
• Administrative processes exist to authorize physical access to facilities based on the position or role of the individual.
• Administrative processes and physical controls restrict unescorted access to facilities to personnel with required security clearances, formal access authorizations and validated the need for access. | See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to detect the presence of water in the vicinity of critical information systems and alert facility maintenance and IT personnel. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to detect the presence of water in the vicinity of critical information systems and alert facility maintenance and IT personnel. | null | null | null | null | null | null | null | DSS01.04 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | PE-15(1) | null | null | PE-15(1) | PE-15(1) | null | null | null | PE-15(1) | null | null | null | null | PE-15(1) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | F.3.4 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | PE-15(1) | null | null | PE-15(1) | null | PE-15(1) | null | null | PE-15(1) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 8.1.6 [MP.IF.6] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | R-AM-1
R-AM-3
R-BC-1
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-7
R-GV-1
R-GV-2
R-GV-4
R-GV-5
R-IR-4
R-SA-1 | null | null | null | null | R-AM-1 | null | R-AM-3 | R-BC-1 | null | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | R-EX-7 | R-GV-1 | R-GV-2 | null | R-GV-4 | R-GV-5 | null | null | null | null | null | null | R-IR-4 | R-SA-1 | null | NT-1
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | NT-1 | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | NT-9 | NT-10 | NT-11 | NT-12 | NT-13 | NT-14 | MT-1 | MT-2 | MT-3 | MT-4 | MT-5 | MT-6 | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Physical & Environmental Security | Redundant Cabling | PES-07.7 | Mechanisms exist to employ redundant power cabling paths that are physically separated to ensure that power continues to flow in the event one of the cables is cut or otherwise damaged. | null | null | Does the organization employ redundant power cabling paths that are physically separated to ensure that power continues to flow in the event one of the cables is cut or otherwise damaged? | 2 | Protect | null | null | X | There is no evidence of a capability to employ redundant power cabling paths that are physically separated to ensure that power continues to flow in the event one of the cables is cut or otherwise damaged. | SP-CMM1 is N/A, since a structured process is required to employ redundant power cabling paths that are physically separated to ensure that power continues to flow in the event one of the cables is cut or otherwise damaged. | Physical & Environmental Security (PES) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Physical access control is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for physical access control.
• Human Resources, or a similar function, maintains a current list of personnel with authorized access to organizational facilities and facilitates the implementation of physical access management controls.
• Physical security controls are primarily administrative in nature (e.g., policies & standards).
• Physical controls, administrative processes and technologies are primarily designed and implemented for offices, rooms and facilities that focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• A facilities maintenance team, or similar function, manages the operation of automated physical and environmental protection controls. | Physical & Environmental Security (PES) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A physical security team, or similar function:
o Performs the centralized-management of physical security controls across the enterprise.
o Maintains a current list of personnel with authorized access to organizational facilities and implements physical access management controls.
• A facilities maintenance team, or similar function, manages the operation of environmental protection controls.
• Administrative processes exist to authorize physical access to facilities based on the position or role of the individual.
• Administrative processes and physical controls restrict unescorted access to facilities to personnel with required security clearances, formal access authorizations and validated the need for access. | See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to employ redundant power cabling paths that are physically separated to ensure that power continues to flow in the event one of the cables is cut or otherwise damaged. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to employ redundant power cabling paths that are physically separated to ensure that power continues to flow in the event one of the cables is cut or otherwise damaged. | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | PE-9(1) | null | null | null | PE-9(1) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | F.3.9 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | R-AM-1
R-BC-1
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-7
R-GV-1
R-GV-2
R-GV-4
R-GV-5
R-IR-4
R-SA-1 | null | null | null | null | R-AM-1 | null | null | R-BC-1 | null | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | R-EX-7 | R-GV-1 | R-GV-2 | null | R-GV-4 | R-GV-5 | null | null | null | null | null | null | R-IR-4 | R-SA-1 | null | NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-8
MT-9
MT-10
MT-12
MT-13
MT-14
MT-15 | null | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | NT-9 | NT-10 | NT-11 | NT-12 | NT-13 | NT-14 | null | null | null | null | null | null | null | MT-8 | MT-9 | MT-10 | null | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Physical & Environmental Security | Fire Protection | PES-08 | Facility security mechanisms exist to utilize and maintain fire suppression and detection devices/systems for the system that are supported by an independent energy source. | null | E-PES-01 | Does the organization utilize and maintain fire suppression and detection devices/systems for the system that are supported by an independent energy source? | 7 | Protect | null | X | null | There is no evidence of a capability to Facility security utilize and maintain fire suppression and detection devices/systems for the system that are supported by an independent energy source. | Physical & Environmental Security (PES) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Physical access control is decentralized.
• Physical security controls are primarily administrative in nature (e.g., policies & standards), focusing on protecting High Value Assets (HVAs).
• Human Resources, or a similar function, maintains a current list of personnel and facilitates the implementation of physical access management controls. | Physical & Environmental Security (PES) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Physical access control is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for physical access control.
• Human Resources, or a similar function, maintains a current list of personnel with authorized access to organizational facilities and facilitates the implementation of physical access management controls.
• Physical security controls are primarily administrative in nature (e.g., policies & standards).
• Physical controls, administrative processes and technologies are primarily designed and implemented for offices, rooms and facilities that focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• A facilities maintenance team, or similar function, manages the operation of automated physical and environmental protection controls. | Physical & Environmental Security (PES) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A physical security team, or similar function:
o Performs the centralized-management of physical security controls across the enterprise.
o Maintains a current list of personnel with authorized access to organizational facilities and implements physical access management controls.
• A facilities maintenance team, or similar function, manages the operation of environmental protection controls.
• Administrative processes exist to authorize physical access to facilities based on the position or role of the individual.
• Administrative processes and physical controls restrict unescorted access to facilities to personnel with required security clearances, formal access authorizations and validated the need for access. | Physical & Environmental Security (PES) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to Facility security utilize and maintain fire suppression and detection devices/systems for the system that are supported by an independent energy source. | A1.2 | null | null | null | null | null | null | DSS01.04 | null | DCS-13 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | PS-3.1 | null | null | null | null | null | null | PE-13 | PE-13 | PE-13 | PE-13 | PE-13 | null | PE-13 | PE-13 | PE-13 | null | null | PE-13 | PE-13 | PE-13 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | PR.IR-02 | null | null | null | null | null | null | null | null | null | null | null | null | F.3.8 | null | null | null | null | null | null | EC:SG2.SP1
EC:SG4.SP1
EC:SG4.SP2 | null | null | null | null | null | null | null | null | PE-13 | null | null | null | null | null | null | null | PE-13 | PE-13 | PE-13 | PE-13 | PE-13 | PE-13 | PE-13 | PE-13 | PE-13 | PE-13 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | PE-13 | PE-13 | PE-13 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | PE-13 | PE-13 | PE-13 | null | null | null | 3.4.3(35) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | PS-01
PS-05 | null | null | null | 18.17 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 8.1.5 [MP.IF.5] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 8.5.3
8.5.4 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | R-AM-1
R-AM-3
R-BC-1
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-7
R-GV-1
R-GV-2
R-GV-4
R-GV-5
R-IR-4
R-SA-1 | null | null | null | null | R-AM-1 | null | R-AM-3 | R-BC-1 | null | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | R-EX-7 | R-GV-1 | R-GV-2 | null | R-GV-4 | R-GV-5 | null | null | null | null | null | null | R-IR-4 | R-SA-1 | null | NT-1
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | NT-1 | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | NT-9 | NT-10 | NT-11 | NT-12 | NT-13 | NT-14 | MT-1 | MT-2 | MT-3 | MT-4 | MT-5 | MT-6 | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Physical & Environmental Security | Fire Detection Devices | PES-08.1 | Facility security mechanisms exist to utilize and maintain fire detection devices/systems that activate automatically and notify organizational personnel and emergency responders in the event of a fire. | null | null | Does the organization utilize and maintain fire detection devices/systems that activate automatically and notify organizational personnel and emergency responders in the event of a fire? | 9 | Detect | null | X | null | There is no evidence of a capability to utilize and maintain fire detection devices/systems that activate automatically and notify organizational personnel and emergency responders in the event of a fire. | Physical & Environmental Security (PES) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Physical access control is decentralized.
• Physical security controls are primarily administrative in nature (e.g., policies & standards), focusing on protecting High Value Assets (HVAs).
• Human Resources, or a similar function, maintains a current list of personnel and facilitates the implementation of physical access management controls. | Physical & Environmental Security (PES) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Physical access control is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for physical access control.
• Human Resources, or a similar function, maintains a current list of personnel with authorized access to organizational facilities and facilitates the implementation of physical access management controls.
• Physical security controls are primarily administrative in nature (e.g., policies & standards).
• Physical controls, administrative processes and technologies are primarily designed and implemented for offices, rooms and facilities that focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• A facilities maintenance team, or similar function, manages the operation of automated physical and environmental protection controls. | Physical & Environmental Security (PES) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A physical security team, or similar function:
o Performs the centralized-management of physical security controls across the enterprise.
o Maintains a current list of personnel with authorized access to organizational facilities and implements physical access management controls.
• A facilities maintenance team, or similar function, manages the operation of environmental protection controls.
• Administrative processes exist to authorize physical access to facilities based on the position or role of the individual.
• Administrative processes and physical controls restrict unescorted access to facilities to personnel with required security clearances, formal access authorizations and validated the need for access. | Physical & Environmental Security (PES) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to utilize and maintain fire detection devices/systems that activate automatically and notify organizational personnel and emergency responders in the event of a fire. | A1.2 | null | null | null | null | null | null | DSS01.04 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | PS-3.1 | null | null | null | null | null | null | PE-13(1) | null | null | PE-13(1) | PE-13(1) | null | null | PE-13(1) | PE-13(1) | null | null | null | PE-13(1) | PE-13(1) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | PR.IR-02 | null | null | null | null | null | null | null | null | null | null | null | null | F.1.2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | PE-13(1) | null | null | null | null | null | null | null | PE-13(1) | null | null | PE-13(1) | null | PE-13(1) | null | PE-13(1) | PE-13(1) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | PS-05 | null | null | null | 18.17 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 8.5.3
8.5.4 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | R-AM-1
R-AM-3
R-BC-1
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-7
R-GV-1
R-GV-2
R-GV-4
R-GV-5
R-IR-4
R-SA-1 | null | null | null | null | R-AM-1 | null | R-AM-3 | R-BC-1 | null | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | R-EX-7 | R-GV-1 | R-GV-2 | null | R-GV-4 | R-GV-5 | null | null | null | null | null | null | R-IR-4 | R-SA-1 | null | NT-1
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | NT-1 | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | NT-9 | NT-10 | NT-11 | NT-12 | NT-13 | NT-14 | MT-1 | MT-2 | MT-3 | MT-4 | MT-5 | MT-6 | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Physical & Environmental Security | Fire Suppression Devices | PES-08.2 | Facility security mechanisms exist to utilize fire suppression devices/systems that provide automatic notification of any activation to organizational personnel and emergency responders. | null | null | Does the organization utilize fire suppression devices/systems that provide automatic notification of any activation to organizational personnel and emergency responders? | 3 | Protect | null | X | null | There is no evidence of a capability to utilize fire suppression devices/systems that provide automatic notification of any activation to organizational personnel and emergency responders. | Physical & Environmental Security (PES) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Physical access control is decentralized.
• Physical security controls are primarily administrative in nature (e.g., policies & standards), focusing on protecting High Value Assets (HVAs).
• Human Resources, or a similar function, maintains a current list of personnel and facilitates the implementation of physical access management controls. | Physical & Environmental Security (PES) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Physical access control is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for physical access control.
• Human Resources, or a similar function, maintains a current list of personnel with authorized access to organizational facilities and facilitates the implementation of physical access management controls.
• Physical security controls are primarily administrative in nature (e.g., policies & standards).
• Physical controls, administrative processes and technologies are primarily designed and implemented for offices, rooms and facilities that focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• A facilities maintenance team, or similar function, manages the operation of automated physical and environmental protection controls. | Physical & Environmental Security (PES) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A physical security team, or similar function:
o Performs the centralized-management of physical security controls across the enterprise.
o Maintains a current list of personnel with authorized access to organizational facilities and implements physical access management controls.
• A facilities maintenance team, or similar function, manages the operation of environmental protection controls.
• Administrative processes exist to authorize physical access to facilities based on the position or role of the individual.
• Administrative processes and physical controls restrict unescorted access to facilities to personnel with required security clearances, formal access authorizations and validated the need for access. | Physical & Environmental Security (PES) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to utilize fire suppression devices/systems that provide automatic notification of any activation to organizational personnel and emergency responders. | A1.2 | null | null | null | null | null | null | DSS01.04 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | PE-13(2) | null | null | PE-13(2) | PE-13(2) | null | null | null | PE-13(2) | null | null | null | null | PE-13(2) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | F.3.8 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | PE-13(2) | null | null | null | null | null | null | null | PE-13(2) | null | PE-13(2) | PE-13(2) | null | PE-13(2) | null | PE-13(2) | PE-13(2) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | PE-13(2) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | PE-13(2) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | PS-05 | null | null | null | 18.17 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | R-AM-1
R-AM-3
R-BC-1
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-7
R-GV-1
R-GV-2
R-GV-4
R-GV-5
R-IR-4
R-SA-1 | null | null | null | null | R-AM-1 | null | R-AM-3 | R-BC-1 | null | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | R-EX-7 | R-GV-1 | R-GV-2 | null | R-GV-4 | R-GV-5 | null | null | null | null | null | null | R-IR-4 | R-SA-1 | null | NT-1
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | NT-1 | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | NT-9 | NT-10 | NT-11 | NT-12 | NT-13 | NT-14 | MT-1 | MT-2 | MT-3 | MT-4 | MT-5 | MT-6 | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Physical & Environmental Security | Automatic Fire Suppression | PES-08.3 | Facility security mechanisms exist to employ an automatic fire suppression capability for critical information systems when the facility is not staffed on a continuous basis. | null | null | Does the organization employ an automatic fire suppression capability for critical information systems when the facility is not staffed on a continuous basis? | 5 | Respond | null | X | X | There is no evidence of a capability to employ an automatic fire suppression capability for critical information systems when the facility is not staffed on a continuous basis. | SP-CMM1 is N/A, since a structured process is required to employ an automatic fire suppression capability for critical information systems when the facility is not staffed on a continuous basis. | Physical & Environmental Security (PES) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Physical access control is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for physical access control.
• Human Resources, or a similar function, maintains a current list of personnel with authorized access to organizational facilities and facilitates the implementation of physical access management controls.
• Physical security controls are primarily administrative in nature (e.g., policies & standards).
• Physical controls, administrative processes and technologies are primarily designed and implemented for offices, rooms and facilities that focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• A facilities maintenance team, or similar function, manages the operation of automated physical and environmental protection controls. | Physical & Environmental Security (PES) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A physical security team, or similar function:
o Performs the centralized-management of physical security controls across the enterprise.
o Maintains a current list of personnel with authorized access to organizational facilities and implements physical access management controls.
• A facilities maintenance team, or similar function, manages the operation of environmental protection controls.
• Administrative processes exist to authorize physical access to facilities based on the position or role of the individual.
• Administrative processes and physical controls restrict unescorted access to facilities to personnel with required security clearances, formal access authorizations and validated the need for access. | See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to employ an automatic fire suppression capability for critical information systems when the facility is not staffed on a continuous basis. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to employ an automatic fire suppression capability for critical information systems when the facility is not staffed on a continuous basis. | null | null | null | null | null | null | null | DSS01.04 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | PE-13(3) | null | PE-13(3) | PE-13(3) | PE-13(2) | null | null | null | PE-13(2) | null | null | null | null | PE-13(2) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | F.5.3 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | PE-13(3) | null | null | null | null | null | null | null | PE-13(3) | null | null | PE-13(3) | null | PE-13(2) | null | PE-13(2) | PE-13(2) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | PE-13(3) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | PS-05 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | R-AM-1
R-AM-3
R-BC-1
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-7
R-GV-1
R-GV-2
R-GV-4
R-GV-5
R-IR-4
R-SA-1 | null | null | null | null | R-AM-1 | null | R-AM-3 | R-BC-1 | null | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | R-EX-7 | R-GV-1 | R-GV-2 | null | R-GV-4 | R-GV-5 | null | null | null | null | null | null | R-IR-4 | R-SA-1 | null | NT-1
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | NT-1 | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | NT-9 | NT-10 | NT-11 | NT-12 | NT-13 | NT-14 | MT-1 | MT-2 | MT-3 | MT-4 | MT-5 | MT-6 | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Physical & Environmental Security | Temperature & Humidity Controls | PES-09 | Facility security mechanisms exist to maintain and monitor temperature and humidity levels within the facility. | null | E-PES-01 | Does the organization maintain and monitor temperature and humidity levels within the facility? | 9 | Protect | null | X | X | There is no evidence of a capability to maintain and monitor temperature and humidity levels within the facility. | Physical & Environmental Security (PES) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Physical access control is decentralized.
• Physical security controls are primarily administrative in nature (e.g., policies & standards), focusing on protecting High Value Assets (HVAs).
• Human Resources, or a similar function, maintains a current list of personnel and facilitates the implementation of physical access management controls. | Physical & Environmental Security (PES) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Physical access control is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for physical access control.
• Human Resources, or a similar function, maintains a current list of personnel with authorized access to organizational facilities and facilitates the implementation of physical access management controls.
• Physical security controls are primarily administrative in nature (e.g., policies & standards).
• Physical controls, administrative processes and technologies are primarily designed and implemented for offices, rooms and facilities that focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• A facilities maintenance team, or similar function, manages the operation of automated physical and environmental protection controls. | Physical & Environmental Security (PES) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A physical security team, or similar function:
o Performs the centralized-management of physical security controls across the enterprise.
o Maintains a current list of personnel with authorized access to organizational facilities and implements physical access management controls.
• A facilities maintenance team, or similar function, manages the operation of environmental protection controls.
• Administrative processes exist to authorize physical access to facilities based on the position or role of the individual.
• Administrative processes and physical controls restrict unescorted access to facilities to personnel with required security clearances, formal access authorizations and validated the need for access. | Physical & Environmental Security (PES) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to maintain and monitor temperature and humidity levels within the facility. | A1.2 | A1.2-POF2
A1.2-POF4 | null | null | null | null | null | DSS01.04 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | PS-3.1 | null | null | null | null | null | null | PE-14 | PE-14 | PE-14 | PE-14 | PE-14 | null | PE-14 | PE-14 | PE-14 | null | null | PE-14 | PE-14 | PE-14 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | PR.IR-02 | null | null | null | null | null | null | null | null | null | null | null | null | F.3.5 | null | null | null | null | null | null | EC:SG4.SP1
EC:SG4.SP2 | null | null | null | null | null | null | null | null | PE-14 | null | null | null | null | null | null | null | PE-14 | PE-14 | PE-14 | PE-14 | PE-14 | PE-14 | PE-14 | PE-14 | PE-14 | PE-14 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | PE-14 | PE-14 | PE-14 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | PE-14 | PE-14 | PE-14 | null | null | null | 3.4.3(35) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | PS-06
PS-07 | null | null | null | 18.18 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | R-AM-1
R-AM-3
R-BC-1
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-7
R-GV-1
R-GV-2
R-GV-4
R-GV-5
R-IR-4
R-SA-1 | null | null | null | null | R-AM-1 | null | R-AM-3 | R-BC-1 | null | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | R-EX-7 | R-GV-1 | R-GV-2 | null | R-GV-4 | R-GV-5 | null | null | null | null | null | null | R-IR-4 | R-SA-1 | null | NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | NT-9 | NT-10 | NT-11 | NT-12 | NT-13 | NT-14 | MT-1 | MT-2 | MT-3 | MT-4 | MT-5 | MT-6 | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Physical & Environmental Security | Monitoring with Alarms / Notifications | PES-09.1 | Facility security mechanisms exist to trigger an alarm or notification of temperature and humidity changes that be potentially harmful to personnel or equipment. | null | null | Does the organization trigger an alarm or notification of temperature and humidity changes that be potentially harmful to personnel or equipment? | 8 | Detect | null | X | X | There is no evidence of a capability to trigger an alarm or notification of temperature and humidity changes that be potentially harmful to personnel or equipment. | Physical & Environmental Security (PES) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Physical access control is decentralized.
• Physical security controls are primarily administrative in nature (e.g., policies & standards), focusing on protecting High Value Assets (HVAs).
• Human Resources, or a similar function, maintains a current list of personnel and facilitates the implementation of physical access management controls. | Physical & Environmental Security (PES) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Physical access control is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for physical access control.
• Human Resources, or a similar function, maintains a current list of personnel with authorized access to organizational facilities and facilitates the implementation of physical access management controls.
• Physical security controls are primarily administrative in nature (e.g., policies & standards).
• Physical controls, administrative processes and technologies are primarily designed and implemented for offices, rooms and facilities that focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• A facilities maintenance team, or similar function, manages the operation of automated physical and environmental protection controls. | Physical & Environmental Security (PES) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A physical security team, or similar function:
o Performs the centralized-management of physical security controls across the enterprise.
o Maintains a current list of personnel with authorized access to organizational facilities and implements physical access management controls.
• A facilities maintenance team, or similar function, manages the operation of environmental protection controls.
• Administrative processes exist to authorize physical access to facilities based on the position or role of the individual.
• Administrative processes and physical controls restrict unescorted access to facilities to personnel with required security clearances, formal access authorizations and validated the need for access. | Physical & Environmental Security (PES) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to trigger an alarm or notification of temperature and humidity changes that be potentially harmful to personnel or equipment. | A1.2 | A1.2-POF2
A1.2-POF4 | null | null | null | null | null | DSS01.04 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | PS-3.1 | null | null | null | null | null | null | PE-14(2) | null | null | null | PE-14(2) | null | null | null | null | PE-14(2) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | F.1.2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | PE-14(2) | null | PE-14(2) | PE-14(2) | null | PE-14(2) | null | null | PE-14(2) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | PE-14(2) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | PE-14(2) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | PS-06
PS-07 | null | null | null | 18.18 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | R-AM-1
R-AM-3
R-BC-1
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-7
R-GV-1
R-GV-2
R-GV-4
R-GV-5
R-IR-4
R-SA-1 | null | null | null | null | R-AM-1 | null | R-AM-3 | R-BC-1 | null | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | R-EX-7 | R-GV-1 | R-GV-2 | null | R-GV-4 | R-GV-5 | null | null | null | null | null | null | R-IR-4 | R-SA-1 | null | NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | NT-9 | NT-10 | NT-11 | NT-12 | NT-13 | NT-14 | MT-1 | MT-2 | MT-3 | MT-4 | MT-5 | MT-6 | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Physical & Environmental Security | Delivery & Removal | PES-10 | Physical security mechanisms exist to isolate information processing facilities from points such as delivery and loading areas and other points to avoid unauthorized access. | null | null | Does the organization isolate information processing facilities from points such as delivery and loading areas and other points to avoid unauthorized access? | 8 | Protect | null | X | X | There is no evidence of a capability to isolate information processing facilities from points such as delivery and loading areas and other points to avoid unauthorized access. | Physical & Environmental Security (PES) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Physical access control is decentralized.
• Physical security controls are primarily administrative in nature (e.g., policies & standards), focusing on protecting High Value Assets (HVAs).
• Human Resources, or a similar function, maintains a current list of personnel and facilitates the implementation of physical access management controls. | Physical & Environmental Security (PES) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Physical access control is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for physical access control.
• Human Resources, or a similar function, maintains a current list of personnel with authorized access to organizational facilities and facilitates the implementation of physical access management controls.
• Physical security controls are primarily administrative in nature (e.g., policies & standards).
• Physical controls, administrative processes and technologies are primarily designed and implemented for offices, rooms and facilities that focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• A facilities maintenance team, or similar function, manages the operation of automated physical and environmental protection controls.
• Administrative processes and physical controls isolate information processing facilities from points such as delivery and loading areas and other points to avoid unauthorized access. | Physical & Environmental Security (PES) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A physical security team, or similar function:
o Performs the centralized-management of physical security controls across the enterprise.
o Maintains a current list of personnel with authorized access to organizational facilities and implements physical access management controls.
• A facilities maintenance team, or similar function, manages the operation of environmental protection controls.
• Administrative processes exist to authorize physical access to facilities based on the position or role of the individual.
• Administrative processes and physical controls restrict unescorted access to facilities to personnel with required security clearances, formal access authorizations and validated the need for access.
• Administrative processes and physical controls isolate information processing facilities from points such as delivery and loading areas and other points to avoid unauthorized access. | Physical & Environmental Security (PES) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to isolate information processing facilities from points such as delivery and loading areas and other points to avoid unauthorized access. | A1.2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 11.1.6 | 7.2 | 11.1.6 | null | 6.8.1.6 | null | null | null | null | OP-1.0 | null | null | null | null | null | null | PE-16 | PE-16 | PE-16 | PE-16 | PE-16 | null | PE-16 | PE-16 | PE-16 | null | null | PE-16 | PE-16 | PE-16 | null | PE-16 | PE-16 | null | null | null | PE-16 | NFO - PE-16 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | F.3.2 | null | null | null | null | null | null | AM:SG1.SP1
EC:SG2.SP2 | null | 5.9.1.8 | null | null | null | null | null | null | PE-16 | null | null | null | null | null | null | null | PE-16 | PE-16 | PE-16 | PE-16 | PE-16 | PE-16 | PE-16 | PE-16 | PE-16 | PE-16 | null | null | null | null | null | null | null | null | null | PE-16 | null | null | null | null | null | null | null | null | null | PE-16 | PE-16 | PE-16 | null | null | null | null | null | null | null | null | null | null | null | null | null | 622(2)(d)(C)(ii) | null | null | null | PE-16 | PE-16 | PE-16 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 18.20 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 11.1.6 | null | null | null | null | null | null | null | 5.5.6(f) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | OR 6464A | null | null | R-AC-1
R-AC-4
R-AM-1
R-AM-2
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-IR-1
R-IR-4
R-SA-1 | R-AC-1 | null | null | R-AC-4 | R-AM-1 | R-AM-2 | null | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | R-EX-7 | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | null | R-IR-1 | null | null | R-IR-4 | R-SA-1 | null | NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-11
MT-12
MT-13
MT-14
MT-15 | null | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | NT-9 | NT-10 | NT-11 | NT-12 | NT-13 | NT-14 | MT-1 | MT-2 | MT-3 | MT-4 | MT-5 | MT-6 | MT-7 | MT-8 | MT-9 | null | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Physical & Environmental Security | Alternate Work Site | PES-11 | Physical security mechanisms exist to utilize appropriate management, operational and technical controls at alternate work sites. | null | null | Does the organization utilize appropriate management, operational and technical controls at alternate work sites? | 8 | Protect | null | X | X | There is no evidence of a capability to utilize appropriate management, operational and technical controls at alternate work sites. | Physical & Environmental Security (PES) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Physical access control is decentralized.
• Physical security controls are primarily administrative in nature (e.g., policies & standards), focusing on protecting High Value Assets (HVAs).
• Human Resources, or a similar function, maintains a current list of personnel and facilitates the implementation of physical access management controls. | Physical & Environmental Security (PES) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Physical access control is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for physical access control.
• Human Resources, or a similar function, maintains a current list of personnel with authorized access to organizational facilities and facilitates the implementation of physical access management controls.
• Physical security controls are primarily administrative in nature (e.g., policies & standards).
• Physical controls, administrative processes and technologies are primarily designed and implemented for offices, rooms and facilities that focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• A facilities maintenance team, or similar function, manages the operation of automated physical and environmental protection controls.
• Administrative processes, physical controls and technologies are employed at alternate work sites to provide “equal protection” of physical and digital assets. | Physical & Environmental Security (PES) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A physical security team, or similar function:
o Performs the centralized-management of physical security controls across the enterprise.
o Maintains a current list of personnel with authorized access to organizational facilities and implements physical access management controls.
• A facilities maintenance team, or similar function, manages the operation of environmental protection controls.
• Administrative processes exist to authorize physical access to facilities based on the position or role of the individual.
• Administrative processes and physical controls restrict unescorted access to facilities to personnel with required security clearances, formal access authorizations and validated the need for access.
• Administrative processes, physical controls and technologies are employed at alternate work sites to provide “equal protection” of physical and digital assets. | Physical & Environmental Security (PES) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to utilize appropriate management, operational and technical controls at alternate work sites. | A1.2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | PE-17 | null | PE-17 | PE-17 | PE-17 | null | null | PE-17 | PE-17 | null | null | null | PE-17 | PE-17 | null | PE-17 | null | null | null | null | PE-17 | 3.10.6 | 3.10.6.a
3.10.6.b | 3.10.6[a]
3.10.6[b] | A.03.10.06.a
A.03.10.06.b
A.03.10.06.ODP[01] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | C.4.3 | null | null | null | null | null | null | EC:SG2.SP1 | null | null | null | PE.L2-3.10.6 | PE.L2-3.10.6 | null | PE.L2-3.10.6 | PE.L2-3.10.6 | PE-17 | null | null | null | null | null | null | null | PE-17 | null | PE-17 | PE-17 | null | PE-17 | null | PE-17 | PE-17 | null | null | null | null | null | null | null | null | null | null | PE-17 | null | null | null | null | null | null | null | null | null | null | PE-17 | PE-17 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | PE-17 | null | PE-17 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | PS-02 | null | null | null | 18.21 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1 | R-AC-1 | R-AC-2 | R-AC-3 | R-AC-4 | R-AM-1 | R-AM-2 | null | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | R-EX-6 | R-EX-7 | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | R-GV-8 | R-IR-1 | R-IR-2 | R-IR-3 | R-IR-4 | R-SA-1 | null | NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | NT-9 | NT-10 | NT-11 | NT-12 | NT-13 | NT-14 | MT-1 | MT-2 | MT-3 | MT-4 | MT-5 | MT-6 | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Physical & Environmental Security | Equipment Siting & Protection | PES-12 | Physical security mechanisms exist to locate system components within the facility to minimize potential damage from physical and environmental hazards and to minimize the opportunity for unauthorized access. | null | null | Does the organization locate system components within the facility to minimize potential damage from physical and environmental hazards and to minimize the opportunity for unauthorized access? | 9 | Protect | X | X | X | There is no evidence of a capability to locate system components within the facility to minimize potential damage from physical and environmental hazards and to minimize the opportunity for unauthorized access. | Physical & Environmental Security (PES) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Physical access control is decentralized.
• Physical security controls are primarily administrative in nature (e.g., policies & standards), focusing on protecting High Value Assets (HVAs).
• Human Resources, or a similar function, maintains a current list of personnel and facilitates the implementation of physical access management controls.
• Facility security mechanisms exist to protect the system from information leakage due to electromagnetic signals emanations. | Physical & Environmental Security (PES) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Physical access control is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for physical access control.
• Human Resources, or a similar function, maintains a current list of personnel with authorized access to organizational facilities and facilitates the implementation of physical access management controls.
• Physical security controls are primarily administrative in nature (e.g., policies & standards).
• Physical controls, administrative processes and technologies are primarily designed and implemented for offices, rooms and facilities that focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• A facilities maintenance team, or similar function, manages the operation of automated physical and environmental protection controls.
• Administrative processes and physical controls address system component location within the facility to minimize potential damage from physical and environmental hazards and to minimize the opportunity for unauthorized access. | Physical & Environmental Security (PES) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A physical security team, or similar function:
o Performs the centralized-management of physical security controls across the enterprise.
o Maintains a current list of personnel with authorized access to organizational facilities and implements physical access management controls.
• A facilities maintenance team, or similar function, manages the operation of environmental protection controls.
• Administrative processes exist to authorize physical access to facilities based on the position or role of the individual.
• Administrative processes and physical controls restrict unescorted access to facilities to personnel with required security clearances, formal access authorizations and validated the need for access.
• Administrative processes and physical controls address system component location within the facility to minimize potential damage from physical and environmental hazards and to minimize the opportunity for unauthorized access. | Physical & Environmental Security (PES) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to locate system components within the facility to minimize potential damage from physical and environmental hazards and to minimize the opportunity for unauthorized access. | A1.2 | null | null | null | null | null | null | null | null | DCS-15 | PHY-01 | null | null | null | null | null | null | null | 11.1.4
11.2.1
11.2.3 | 7.3
7.5
7.8
7.12 | 11.1.4
11.2.1
11.2.3 | null | 6.8.1.4
6.8.2
6.8.2.1
6.8.2.3 | null | null | null | null | PS-1.0 | null | null | null | null | null | null | PE-18
PE-18(1)
SC-7(14) | null | null | PE-18 | PE-18
PE-23
SC-7(14) | null | null | null | PE-18 | PE-23
SC-7(14) | null | null | null | PE-18 | null | PE-18
PE-23
SC-7(14) | null | PE-23 | PE-18 | PE-18
PE-23
SC-7(14) | PE-18
PE-23
SC-7(14) | 3.10.1 | 3.10.8.a
3.10.8.b | null | null | null | null | null | null | null | null | 9.2.2
9.2.3
9.2.4 | null | null | null | 9.2.2 | 9.2.2 | null | 9.2.2
9.2.3
9.2.4 | 9.2.2
9.2.3
9.2.4 | null | D.1.1.11 | null | 8.1.4 | null | null | null | null | EC:SG2.SP1 | null | null | PE.L1-3.10.1 | PE.L1-3.10.1 | null | PE.L1-b.1.viii | PE.L2-3.10.1 | PE.L2-3.10.1 | PE-18 | null | null | null | 52.204-21(b)(1)(viii) | null | null | null | PE-18 | null | null | PE-18 | null | PE-18 | null | null | PE-18 | null | null | null | null | null | null | null | null | 6.M.E | 6.M.E | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 18.7
18.13
18.22 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 8.1.3 [MP.IF.3] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 1644 | null | null | null | null | null | null | null | null | null | null | 11.1.4
11.2.1
11.2.3 | null | null | 8.3.3.C.01
8.3.4.C.01
8.3.4.C.02
8.3.5.C.01 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | FAR 52.204-21 | null | x | R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1 | R-AC-1 | R-AC-2 | R-AC-3 | R-AC-4 | R-AM-1 | R-AM-2 | null | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | R-EX-6 | R-EX-7 | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | R-GV-8 | R-IR-1 | R-IR-2 | R-IR-3 | R-IR-4 | R-SA-1 | null | NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | NT-9 | NT-10 | NT-11 | NT-12 | NT-13 | NT-14 | MT-1 | MT-2 | MT-3 | MT-4 | MT-5 | MT-6 | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Physical & Environmental Security | Transmission Medium Security | PES-12.1 | Physical security mechanisms exist to protect power and telecommunications cabling carrying data or supporting information services from interception, interference or damage. | null | null | Does the organization protect power and telecommunications cabling carrying data or supporting information services from interception, interference or damage? | 9 | Protect | null | X | X | There is no evidence of a capability to protect power and telecommunications cabling carrying data or supporting information services from interception, interference or damage. | Physical & Environmental Security (PES) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Physical access control is decentralized.
• Physical security controls are primarily administrative in nature (e.g., policies & standards), focusing on protecting High Value Assets (HVAs).
• Human Resources, or a similar function, maintains a current list of personnel and facilitates the implementation of physical access management controls. | Physical & Environmental Security (PES) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Physical access control is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for physical access control.
• Human Resources, or a similar function, maintains a current list of personnel with authorized access to organizational facilities and facilitates the implementation of physical access management controls.
• Physical security controls are primarily administrative in nature (e.g., policies & standards).
• Physical controls, administrative processes and technologies are primarily designed and implemented for offices, rooms and facilities that focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• A facilities maintenance team, or similar function, manages the operation of automated physical and environmental protection controls. | Physical & Environmental Security (PES) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A physical security team, or similar function:
o Performs the centralized-management of physical security controls across the enterprise.
o Maintains a current list of personnel with authorized access to organizational facilities and implements physical access management controls.
• A facilities maintenance team, or similar function, manages the operation of environmental protection controls.
• Administrative processes exist to authorize physical access to facilities based on the position or role of the individual.
• Administrative processes and physical controls restrict unescorted access to facilities to personnel with required security clearances, formal access authorizations and validated the need for access. | Physical & Environmental Security (PES) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to protect power and telecommunications cabling carrying data or supporting information services from interception, interference or damage. | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 11.2.3 | 7.12 | 11.2.3 | null | 6.8.2.3 | null | null | null | null | null | null | null | null | null | null | null | PE-4
SC-7(14) | null | PE-4 | PE-4 | PE-4
SC-7(14) | null | null | PE-4 | PE-4 | SC-7(14) | null | null | PE-4 | PE-4 | null | SC-7(14) | null | null | null | SC-7(14) | SC-7(14) | 3.10.1 | 3.10.8.a | null | A.03.10.08.a | null | null | null | null | null | 9.1.2
9.1.3 | 9.2.2
9.2.3 | null | null | null | 9.2.2 | 9.2.2 | null | 9.2.2
9.2.3 | 9.2.2
9.2.3 | null | F.3.11 | null | null | null | null | null | null | EC:SG2.SP1 | null | 5.9.1.4 | PE.L1-3.10.1 | PE.L1-3.10.1 | null | PE.L1-b.1.viii | PE.L2-3.10.1 | PE.L2-3.10.1 | PE-4 | null | null | null | 52.204-21(b)(1)(viii) | null | null | null | PE-4 | null | PE-4 | PE-4 | null | PE-4 | null | PE-4 | PE-4 | null | null | null | null | null | null | null | null | 6.M.E | 6.M.E | PE-4 | null | CIP-014-2
R5 | 8-605 | null | null | null | null | null | null | null | PE-4 | PE-4 | null | null | null | null | null | null | null | null | null | null | null | null | null | 622(2)(d)(C)(ii) | null | null | null | null | null | PE-4 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 9.15
18.13 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0181
0187
0189
0194
0195
0198
0201
0206
0208
0211
0213
0216
0217
0926
1095
1096
1098
1100
1101
1102
1103
1104
1105
1107
1109
1111
1112
1114
1115
1116
1119
1122
1130
1133
1164
1216
1639
1640
1718
1719
1720
1721
0218 | null | null | null | null | null | null | null | null | null | null | 11.2.3 | null | null | 8.3.3.C.01
8.3.3.C.02
8.3.4.C.01
8.3.4.C.02
8.3.5.C.01
10.1.42.C.01
10.1.42.C.02
10.1.43.C.01
10.1.43.C.02
10.1.43.C.03
10.1.43.C.04
10.1.44.C.01
10.1.45.C.01
10.1.45.C.02
10.1.46.C.01
10.1.46.C.02
10.1.46.C.03
10.1.46.C.04
10.1.47.C.01
10.1.47.C.02
10.1.48.C.01
10.1.48.C.02
10.1.48.C.03
10.1.49.C.01
10.1.50.C.01
10.1.50.C.02
10.1.50.C.03
10.1.50.C.04
10.1.51.C.01
10.2.6.C.01
10.2.6.C.02
10.2.7.C.01
10.2.8.C.01
10.2.9.C.01
10.2.10.C.01
10.3.5.C.01
10.3.6.C.01
10.3.6.C.02
10.3.7.C.01
10.3.8.C.01
10.3.9.C.01
10.3.10.C.01
10.3.11.C.01
10.3.12.C.01
10.3.13.C.01
10.4.4.C.01
10.4.4.C.02
10.4.5.C.01
10.4.5.C.02
10.4.6.C.01
10.4.6.C.02
10.4.6.C.03
10.4.7.C.01
10.4.7.C.02
10.4.8.C.01
10.4.9.C.01
10.4.9.C.02
10.4.9.C.03
10.4.9.C.04
10.4.10.C.01
10.4.11.C.01
10.4.12.C.01
10.4.13.C.01
10.4.13.C.02
10.5.4.C.01
10.5.5.C.01
10.5.6.C.01
10.5.6.C.02
10.5.7.C.01
10.5.8.C.01
10.5.8.C.02
10.5.9.C.01
10.5.9.C.02
10.5.10.C.01
10.5.10.C.02
10.5.11.C.01
10.6.22.C.01
10.6.22.C.02
10.6.23.C.01
10.6.23.C.02
10.6.23.C.03
10.6.23.C.04
10.6.24.C.01
10.6.24.C.02
10.6.25.C.01
10.6.26.C.01
10.6.27.C.01
10.6.28.C.01
10.6.28.C.02
10.6.29.C.01
10.6.30.C.01
10.6.31.C.01 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | FAR 52.204-21
OR 6464A | null | x | R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1 | R-AC-1 | R-AC-2 | R-AC-3 | R-AC-4 | R-AM-1 | R-AM-2 | null | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | R-EX-6 | R-EX-7 | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | R-GV-8 | R-IR-1 | R-IR-2 | R-IR-3 | R-IR-4 | R-SA-1 | null | NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | NT-9 | NT-10 | NT-11 | NT-12 | NT-13 | NT-14 | MT-1 | MT-2 | MT-3 | MT-4 | MT-5 | MT-6 | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Physical & Environmental Security | Access Control for Output Devices | PES-12.2 | Physical security mechanisms exist to restrict access to printers and other system output devices to prevent unauthorized individuals from obtaining the output. | - Printer management (print only when at the printer with proximity card or code) | null | Does the organization restrict access to printers and other system output devices to prevent unauthorized individuals from obtaining the output? | 8 | Protect | null | X | X | There is no evidence of a capability to restrict access to printers and other system output devices to prevent unauthorized individuals from obtaining the output. | SP-CMM1 is N/A, since a structured process is required to restrict access to printers and other system output devices to prevent unauthorized individuals from obtaining the output. | Physical & Environmental Security (PES) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Physical access control is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for physical access control.
• Human Resources, or a similar function, maintains a current list of personnel with authorized access to organizational facilities and facilitates the implementation of physical access management controls.
• Physical security controls are primarily administrative in nature (e.g., policies & standards).
• Physical controls, administrative processes and technologies are primarily designed and implemented for offices, rooms and facilities that focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• A facilities maintenance team, or similar function, manages the operation of automated physical and environmental protection controls.
• Administrative processes, physical controls and technologies restrict access to printers and other system output devices to prevent unauthorized individuals from obtaining the output. | Physical & Environmental Security (PES) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A physical security team, or similar function:
o Performs the centralized-management of physical security controls across the enterprise.
o Maintains a current list of personnel with authorized access to organizational facilities and implements physical access management controls.
• A facilities maintenance team, or similar function, manages the operation of environmental protection controls.
• Administrative processes exist to authorize physical access to facilities based on the position or role of the individual.
• Administrative processes and physical controls restrict unescorted access to facilities to personnel with required security clearances, formal access authorizations and validated the need for access.
• Administrative processes, physical controls and technologies restrict access to printers and other system output devices to prevent unauthorized individuals from obtaining the output. | Physical & Environmental Security (PES) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to restrict access to printers and other system output devices to prevent unauthorized individuals from obtaining the output. | PI1.4 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | PE-5 | null | PE-5 | PE-5 | PE-5 | null | null | PE-5 | PE-5 | null | null | null | PE-5 | PE-5 | null | null | null | null | null | null | null | 3.10.1 | 3.10.8.b | null | A.03.10.08.b | null | null | null | null | null | null | 9.2.2
9.2.3 | null | null | null | 9.2.2 | 9.2.2 | null | 9.2.2
9.2.3 | 9.2.2
9.2.3 | null | D.10.16 | null | null | null | null | null | null | KIM:SG2.SP2
TM:SG2.SP2 | null | 5.9.1.5 | PE.L1-3.10.1 | PE.L1-3.10.1 | null | PE.L1-b.1.viii | PE.L2-3.10.1 | PE.L2-3.10.1 | PE-5 | null | null | null | 52.204-21(b)(1)(viii) | null | null | null | PE-5 | null | PE-5 | PE-5 | null | PE-5 | null | PE-5 | PE-5 | null | null | null | null | null | null | null | null | 6.M.E | 6.M.E | PE-5 | null | null | 8-310 | null | null | null | null | null | null | null | PE-5 | PE-5 | null | null | null | null | null | null | null | null | null | null | null | null | null | 622(2)(d)(C)(ii) | null | null | null | null | null | PE-5 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 18.7 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 1036 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | FAR 52.204-21
OR 6464A | null | null | R-AC-1
R-AC-4
R-AM-1
R-AM-2
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-IR-1
R-IR-4
R-SA-1 | R-AC-1 | null | null | R-AC-4 | R-AM-1 | R-AM-2 | null | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | R-EX-7 | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | null | R-IR-1 | null | null | R-IR-4 | R-SA-1 | null | NT-7
MT-1
MT-2
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | null | null | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Physical & Environmental Security | Information Leakage Due To Electromagnetic Signals Emanations | PES-13 | Facility security mechanisms exist to protect the system from information leakage due to electromagnetic signals emanations. | null | null | Does the organization protect the system from information leakage due to electromagnetic signals emanations? | 5 | Protect | null | null | X | There is no evidence of a capability to protect the system from information leakage due to electromagnetic signals emanations. | Physical & Environmental Security (PES) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Physical access control is decentralized.
• Physical security controls are primarily administrative in nature (e.g., policies & standards), focusing on protecting High Value Assets (HVAs).
• Human Resources, or a similar function, maintains a current list of personnel and facilitates the implementation of physical access management controls.
• Facility security mechanisms exist to protect the system from information leakage due to electromagnetic signals emanations. | Physical & Environmental Security (PES) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Physical access control is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for physical access control.
• Human Resources, or a similar function, maintains a current list of personnel with authorized access to organizational facilities and facilitates the implementation of physical access management controls.
• Physical security controls are primarily administrative in nature (e.g., policies & standards).
• Physical controls, administrative processes and technologies are primarily designed and implemented for offices, rooms and facilities that focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• A facilities maintenance team, or similar function, manages the operation of automated physical and environmental protection controls.
• Physical controls and technologies protect the system from information leakage due to electromagnetic signals emanations. | Physical & Environmental Security (PES) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A physical security team, or similar function:
o Performs the centralized-management of physical security controls across the enterprise.
o Maintains a current list of personnel with authorized access to organizational facilities and implements physical access management controls.
• A facilities maintenance team, or similar function, manages the operation of environmental protection controls.
• Administrative processes exist to authorize physical access to facilities based on the position or role of the individual.
• Administrative processes and physical controls restrict unescorted access to facilities to personnel with required security clearances, formal access authorizations and validated the need for access.
• Physical controls and technologies protect the system from information leakage due to electromagnetic signals emanations. | See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to protect the system from information leakage due to electromagnetic signals emanations. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to protect the system from information leakage due to electromagnetic signals emanations. | A1.2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 8.12 | null | null | null | null | null | null | null | null | null | null | PR.DS-P5 | null | null | null | PE-19 | null | null | null | PE-19 | null | null | null | null | PE-19 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | PR.DS-5 | null | null | null | null | null | null | null | null | null | null | null | null | null | D.8.2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | D3.PC.Am.B.15
D3.PC.Am.Int.1
D3.PC.De.Int.1
D3.DC.Ev.Int.1 | null | null | null | null | null | 4.M.C
4.M.E | 4.M.C
4.M.E
2.L.A
2.L.C
2.L.D
4.L.A | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 0249
0246
0250 | null | null | null | null | null | null | null | null | null | null | null | null | null | 10.7.6.C.01
10.7.6.C.02
10.7.7.C.01
10.7.7.C.02
10.7.8.C.01
10.7.9.C.01 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | null | null | null | R-AC-1
R-AC-4
R-AM-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-IR-1
R-IR-4
R-SA-1 | R-AC-1 | null | null | R-AC-4 | R-AM-1 | null | null | null | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | R-EX-7 | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | null | null | null | R-IR-1 | null | null | R-IR-4 | R-SA-1 | null | NT-7
MT-1
MT-2
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | null | null | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Physical & Environmental Security | Asset Monitoring and Tracking | PES-14 | Physical security mechanisms exist to employ asset location technologies that track and monitor the location and movement of organization-defined assets within organization-defined controlled areas. | - RFID tagging | null | Does the organization employ asset location technologies that track and monitor the location and movement of organization-defined assets within organization-defined controlled areas? | 6 | Detect | null | X | X | There is no evidence of a capability to employ asset location technologies that track and monitor the location and movement of organization-defined assets within organization-defined controlled areas. | SP-CMM1 is N/A, since a structured process is required to employ asset location technologies that track and monitor the location and movement of organization-defined assets within organization-defined controlled areas. | Physical & Environmental Security (PES) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Physical access control is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for physical access control.
• Human Resources, or a similar function, maintains a current list of personnel with authorized access to organizational facilities and facilitates the implementation of physical access management controls.
• Physical security controls are primarily administrative in nature (e.g., policies & standards).
• Physical controls, administrative processes and technologies are primarily designed and implemented for offices, rooms and facilities that focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• A facilities maintenance team, or similar function, manages the operation of automated physical and environmental protection controls. | Physical & Environmental Security (PES) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A physical security team, or similar function:
o Performs the centralized-management of physical security controls across the enterprise.
o Maintains a current list of personnel with authorized access to organizational facilities and implements physical access management controls.
• A facilities maintenance team, or similar function, manages the operation of environmental protection controls.
• Administrative processes exist to authorize physical access to facilities based on the position or role of the individual.
• Administrative processes and physical controls restrict unescorted access to facilities to personnel with required security clearances, formal access authorizations and validated the need for access.
• Administrative processes, physical controls and technologies administrative processes, physical controls and technologies utilize asset location technologies to track and monitor the location and movement of organization-defined assets within organization-defined controlled areas. | Physical & Environmental Security (PES) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | Physical & Environmental Security (PES) efforts are “world-class” capabilities that leverage predictive analysis (e.g., machine learning, AI, etc.). In addition to CMM Level 4 criteria, CMM Level 5 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Stakeholders make time-sensitive decisions to support operational efficiency, which may include automated remediation actions.
▪ Based on predictive analysis, process improvements are implemented according to “continuous improvement” practices that affect process changes. | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | PE-20 | null | null | null | PE-20 | null | null | null | null | PE-20 | null | null | null | null | null | PE-20 | null | null | null | PE-20 | PE-20 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | D.1.1.7 | null | null | null | null | null | null | ADM:SG1.SP1
ADM:SG3.SP1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | R-AC-1
R-AC-4
R-AM-1
R-AM-2
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-IR-1
R-IR-4
R-SA-1 | R-AC-1 | null | null | R-AC-4 | R-AM-1 | R-AM-2 | null | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | R-EX-7 | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | null | R-IR-1 | null | null | R-IR-4 | R-SA-1 | null | NT-7
MT-1
MT-2
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | null | null | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Physical & Environmental Security | Electromagnetic Pulse (EMP) Protection | PES-15 | Physical security mechanisms exist to employ safeguards against Electromagnetic Pulse (EMP) damage for systems and system components. | - EMP shielding (Faraday cages) | null | Does the organization employ safeguards against Electromagnetic Pulse (EMP) damage for systems and system components? | 1 | Protect | null | null | X | There is no evidence of a capability to employ safeguards against Electromagnetic Pulse (EMP) damage for systems and system components. | SP-CMM1 is N/A, since a structured process is required to employ safeguards against Electromagnetic Pulse (EMP) damage for systems and system components. | Physical & Environmental Security (PES) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Physical access control is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for physical access control.
• Human Resources, or a similar function, maintains a current list of personnel with authorized access to organizational facilities and facilitates the implementation of physical access management controls.
• Physical security controls are primarily administrative in nature (e.g., policies & standards).
• Physical controls, administrative processes and technologies are primarily designed and implemented for offices, rooms and facilities that focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• A facilities maintenance team, or similar function, manages the operation of automated physical and environmental protection controls. | Physical & Environmental Security (PES) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A physical security team, or similar function:
o Performs the centralized-management of physical security controls across the enterprise.
o Maintains a current list of personnel with authorized access to organizational facilities and implements physical access management controls.
• A facilities maintenance team, or similar function, manages the operation of environmental protection controls.
• Administrative processes exist to authorize physical access to facilities based on the position or role of the individual.
• Administrative processes and physical controls restrict unescorted access to facilities to personnel with required security clearances, formal access authorizations and validated the need for access. | Physical & Environmental Security (PES) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to employ safeguards against Electromagnetic Pulse (EMP) damage for systems and system components. | A1.2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | PE-21 | null | null | null | null | PE-21 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | D.8.2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-EX-1
R-GV-1 | null | null | null | null | null | null | null | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | null | R-EX-1 | null | null | null | null | null | null | R-GV-1 | null | null | null | null | null | null | null | null | null | null | null | null | null | NT-9
MT-4
MT-6
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | null | null | NT-9 | null | null | null | null | null | null | null | null | MT-4 | null | MT-6 | null | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Physical & Environmental Security | Component Marking | PES-16 | Physical security mechanisms exist to mark system hardware components indicating the impact or classification level of the information permitted to be processed, stored or transmitted by the hardware component. | null | null | Does the organization mark system hardware components indicating the impact or classification level of the information permitted to be processed, stored or transmitted by the hardware component? | 3 | Protect | null | X | null | There is no evidence of a capability to mark system hardware components indicating the impact or classification level of the information permitted to be processed, stored or transmitted by the hardware component. | Physical & Environmental Security (PES) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Physical access control is decentralized.
• Physical security controls are primarily administrative in nature (e.g., policies & standards), focusing on protecting High Value Assets (HVAs).
• Human Resources, or a similar function, maintains a current list of personnel and facilitates the implementation of physical access management controls. | Physical & Environmental Security (PES) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Physical access control is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for physical access control.
• Human Resources, or a similar function, maintains a current list of personnel with authorized access to organizational facilities and facilitates the implementation of physical access management controls.
• Physical security controls are primarily administrative in nature (e.g., policies & standards).
• Physical controls, administrative processes and technologies are primarily designed and implemented for offices, rooms and facilities that focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
• A facilities maintenance team, or similar function, manages the operation of automated physical and environmental protection controls.
• Administrative processes and physical controls mark system hardware components indicating the impact or classification level of the information permitted to be processed, stored or transmitted by the hardware component. | Physical & Environmental Security (PES) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A physical security team, or similar function:
o Performs the centralized-management of physical security controls across the enterprise.
o Maintains a current list of personnel with authorized access to organizational facilities and implements physical access management controls.
• A facilities maintenance team, or similar function, manages the operation of environmental protection controls.
• Administrative processes exist to authorize physical access to facilities based on the position or role of the individual.
• Administrative processes and physical controls restrict unescorted access to facilities to personnel with required security clearances, formal access authorizations and validated the need for access.
• Administrative processes and physical controls mark system hardware components indicating the impact or classification level of the information permitted to be processed, stored or transmitted by the hardware component. | Physical & Environmental Security (PES) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to mark system hardware components indicating the impact or classification level of the information permitted to be processed, stored or transmitted by the hardware component. | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | PE-22 | null | null | null | null | PE-22 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | D.3.6 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | R-AC-1
R-AC-4
R-AM-1
R-AM-2
R-BC-1
R-BC-2
R-BC-3
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-IR-1
R-IR-4
R-SA-1 | R-AC-1 | null | null | R-AC-4 | R-AM-1 | R-AM-2 | null | R-BC-1 | R-BC-2 | R-BC-3 | null | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | null | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | null | R-IR-1 | null | null | R-IR-4 | R-SA-1 | null | NT-7
MT-1
MT-2
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | null | null | MT-7 | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Physical & Environmental Security | Proximity Sensor | PES-17 | Automated mechanisms exist to monitor physical proximity to robotic or autonomous platforms to reduce applied force or stop the operation when sensors indicate a potentially dangerous scenario. | null | null | Does the organization use automated mechanisms to monitor physical proximity to robotic or autonomous platforms to reduce applied force or stop the operation when sensors indicate a potentially dangerous scenario? | 9 | Protect | null | X | X | There is no evidence of a capability to monitor physical proximity to robotic or autonomous platforms to reduce applied force or stop the operation when sensors indicate a potentially dangerous scenario. | SP-CMM1 is N/A, since a structured process is required to monitor physical proximity to robotic or autonomous platforms to reduce applied force or stop the operation when sensors indicate a potentially dangerous scenario. | SP-CMM2 is N/A, since a well-defined process is required to monitor physical proximity to robotic or autonomous platforms to reduce applied force or stop the operation when sensors indicate a potentially dangerous scenario. | Physical & Environmental Security (PES) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A physical security team, or similar function:
o Performs the centralized-management of physical security controls across the enterprise.
o Maintains a current list of personnel with authorized access to organizational facilities and implements physical access management controls.
• A facilities maintenance team, or similar function, manages the operation of environmental protection controls.
• Administrative processes exist to authorize physical access to facilities based on the position or role of the individual.
• Administrative processes and physical controls restrict unescorted access to facilities to personnel with required security clearances, formal access authorizations and validated the need for access.
• Physical proximity to robotic or autonomous platforms is continuously monitored to automatically change the operating state to reduce applied force or stop the operation when physical proximity sensors indicate a dangerous setting. | See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to monitor physical proximity to robotic or autonomous platforms to reduce applied force or stop the operation when sensors indicate a potentially dangerous scenario. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to monitor physical proximity to robotic or autonomous platforms to reduce applied force or stop the operation when sensors indicate a potentially dangerous scenario. | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | D.10 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-EX-6
R-GV-1
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1 | null | null | null | null | null | null | R-AM-3 | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | null | null | null | null | null | null | R-EX-6 | null | R-GV-1 | null | null | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | null | R-IR-1 | R-IR-2 | R-IR-3 | R-IR-4 | R-SA-1 | null | NT-7
MT-1
MT-2
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | null | null | null | MT-8 | MT-9 | MT-10 | MT-11 | MT-12 | MT-13 | MT-14 | null | null | null |
Physical & Environmental Security | On-Site Client Segregation | PES-18 | Mechanisms exist to ensure client-specific Intellectual Property (IP) is isolated from other data when client-specific IP is processed or stored within multi-client workspaces. | null | null | Does the organization ensure client-specific Intellectual Property (IP) is isolated from other data when client-specific IP is processed or stored within multi-client workspaces? | 6 | Protect | X | X | null | There is no evidence of a capability to ensure client-specific Intellectual Property (IP) is isolated from other data when client-specific IP is processed or stored within multi-client workspaces. | SP-CMM1 is N/A, since a structured process is required to ensure client-specific Intellectual Property (IP) is isolated from other data when client-specific IP is processed or stored within multi-client workspaces. | SP-CMM2 is N/A, since a well-defined process is required to ensure client-specific Intellectual Property (IP) is isolated from other data when client-specific IP is processed or stored within multi-client workspaces. | Physical & Environmental Security (PES) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A physical security team, or similar function:
o Performs the centralized-management of physical security controls across the enterprise.
o Maintains a current list of personnel with authorized access to organizational facilities and implements physical access management controls.
• A facilities maintenance team, or similar function, manages the operation of environmental protection controls.
• Administrative processes exist to authorize physical access to facilities based on the position or role of the individual.
• Administrative processes and physical controls restrict unescorted access to facilities to personnel with required security clearances, formal access authorizations and validated the need for access.
• Physical controls are designed and implemented for offices, rooms and facilities. | See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to ensure client-specific Intellectual Property (IP) is isolated from other data when client-specific IP is processed or stored within multi-client workspaces. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to ensure client-specific Intellectual Property (IP) is isolated from other data when client-specific IP is processed or stored within multi-client workspaces. | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | L.26 | null | 8.1.8 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | TPC-38 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1 | R-AC-1 | R-AC-2 | R-AC-3 | R-AC-4 | R-AM-1 | R-AM-2 | null | R-BC-1 | R-BC-2 | R-BC-3 | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | R-EX-6 | R-EX-7 | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | null | R-IR-1 | R-IR-2 | R-IR-3 | R-IR-4 | R-SA-1 | null | NT-1
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-8
MT-9
MT-10
MT-12
MT-13
MT-14
MT-15 | NT-1 | NT-2 | NT-3 | NT-4 | NT-5 | NT-6 | NT-7 | NT-8 | NT-9 | NT-10 | NT-11 | NT-12 | NT-13 | NT-14 | null | null | null | null | null | null | null | MT-8 | MT-9 | MT-10 | null | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Data Privacy | Data Privacy Program | PRI-01 | Mechanisms exist to facilitate the implementation and operation of data privacy controls. | null | E-GOV-02
E-GOV-08 | Does the organization facilitate the implementation and operation of data privacy controls? | 10 | Identify | X | X | X | There is no evidence of a capability to facilitate the implementation and operation of data privacy controls. | Privacy (PRI) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• No formal data privacy team exists. Privacy roles are assigned to existing IT / cybersecurity.
• Formal roles and responsibilities for data privacy may exist.
• No formal data privacy principles are identified for the organization.
• An ad hoc approach to Data Protection Impact Assessment (DPIA) exists.
• Compliance efforts are not tied into an enterprise-wide cybersecurity and/ or data privacy program. | Privacy (PRI) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Privacy management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• The data privacy program is developed to work with IT and cybersecurity staff to ensure that applicable statutory, regulatory and contractual data privacy obligations for Personal Data (PD) are properly identified and implemented across the enterprise.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for data privacy management.
• A qualified individual is formally assigned as the Chief Privacy Officer (CPO), or similar role, to lead the organization’s data privacy program. This individual may be assigned to multiple duties, including that as a Data Protection Officer (DPO).
• The CPO, or similar role, identifies “data privacy principles” that systems, applications, services, processes and third-parties must adhere to, based on leading data privacy practices. | Privacy (PRI) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• The Chief Information Security Officer (CISO), or similar function, analyzes the organization’s business strategy to determine prioritized and authoritative guidance for cybersecurity-related data privacy practices.
• A Chief Privacy Officer (CPO), or similar function, analyzes the organization’s business strategy to develop and publish authoritative guidance on the organization’s data privacy program.
• The CISO, or similar function, develops a security-focused Concept of Operations (CONOPS) that documents management, operational and technical measures to apply defense-in-depth techniques across the enterprise for cybersecurity-related data privacy practices.
• A Governance, Risk & Compliance (GRC) function, or similar function, provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data with regards to data privacy.
• A steering committee is formally established to provide executive oversight of the cybersecurity & data privacy program.
• A Privacy program, run by a CPO, or similar role, ensures that applicable statutory, regulatory and contractual data privacy obligations are properly identified and implemented to limit and secure Personal Data (PD) that the organization stores, transmits and processes.
• A data privacy team oversees the centralized-management of physical security controls across the enterprise.
• Data Protection Officers (DPOs) are assigned to work closely with business units and project teams to ensure data privacy principles are being implemented.
• CPO and DPO determine and document the legal authority that permits the collection, use, maintenance and sharing of PD, either generally or in support of a specific program or system need.
• As part of the organization’s data privacy program, the CPO publishes a clear set of “data privacy principles”, based on leading data privacy practices, that systems, applications, services, processes and third-parties must adhere to.
• A Project Management Office (PMO), or project management function, ensures both cybersecurity & data privacy principles are identified and implemented within ongoing or planned projects. | Privacy (PRI) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to facilitate the implementation and operation of data privacy controls. | P1.0 | CC2.3-POF7 | null | null | null | null | null | APO04.01
APO13.02 | null | DSP-02
DSP-14 | LGL-04 | null | null | null | null | null | null | null | 18.1.4 | 5.1
5.34 | 18.1.4 | null | 7.1
7.4
8.3
8.3.1
8.4
8.5.1 | 5.1
5.10 | null | null | null | null | null | MAP 1.6 | GV.PO-P1
GV.PO-P5
GV.PO-P6
CT.PO-P2
CM.PO-P1
CM.AW-P2
PR.PO-P9 | null | null | null | null | null | null | null | PM-18
PT-1 | PM-18
PT-1 | null | null | null | null | null | null | null | null | null | PM-18
PT-1 | null | PM-18
PT-1 | PM-18
PT-1 | PM-18
PT-1 | PT-1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | P.2 | null | 9.2
9.4 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | § 1232h | null | null | null | null | 164.500
164.502
164.530(j)
164.530(j)(1) | null | null | null | PM-18
PT-1 | null | null | null | null | null | null | null | null | 5.5 | null | null | null | null | null | null | 7004(a)
7010(a) | null | 6-1-1305(2)
6-1-1305(7)
6-1-1308(1)(c)(I)
6-1-1308(1)(c)(II)
6-1-1308(6)
6-1-105(1)(nnn) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 59.1-578.B
59.1-579.A
59.1-579.A.1
59.1-579.A.2
59.1-579.A.3 | null | null | null | Inferred
Expectation | Art 32.1
Art 32.2
Art 32.3
Art 32.4 | null | null | Principle 2.7.a | Sec 14
Sec 15 | Art 4 | Inferred
Expectation | Inferred
Expectation | Sec 8
Sec 9 | Inferred
Expectation | Inferred
Expectation | null | null | Inferred
Expectation | Inferred
Expectation | Inferred
Expectation | null | Inferred
Expectation | Inferred
Expectation | 30(1)(a)
30(1)(b)(i)
30(1)(b)(ii)
30(1)(b)(iii)
30(1)(b)(iv)
30(1)(b)(v)
30(1)(b)(vi)
30(1)(b)(vii)
30(1)(b)(viii)
30(2)
30(3) | Inferred
Expectation | Inferred
Expectation | 4.1(3) | Inferred
Expectation | Inferred
Expectation | Inferred
Expectation | Article 2
Article 3
Article 8.1 | Inferred
Expectation | null | null | null | null | null | Article 5.1
Article 59
Article 59.1
Article 59.2
Article 59.3
Article 59.4
Article 59.5
Article 59.6
Article 59.7
Article 59.8
Article 59.9
Article 59.10
Article 59.11 | Inferred
Expectation | Sec 19
Sec 20
Sec 60 | Inferred
Expectation | 8.7.1 [MP.INFO.1] | Inferred
Expectation | Inferred
Expectation | Inferred
Expectation | Inferred
Expectation | null | null | null | Inferred
Expectation | Article 24(1)
Article 24(2)
Article 24(3) | null | null | null | Inferred
Expectation | APP 1 | null | null | null | null | null | Inferred
Expectation | Article 7
Article 16
Article 51
Article 51(1)
Article 51(2)
Article 51(3)
Article 51(4)
Article 51(5)
Article 51(6)
Article 58
Article 58(1)
Article 58(2)
Article 58(3)
Article 58(4)
Article 59 | Inferred
Expectation | Inferred
Expectation | Inferred
Expectation | Article 24(3)
Article 26(1)
Article 26(1)(i)
Article 26(1)(ii)
Article 26(2)
Article 26(3)
Article 26(4)
Article 26-2(1)
Article 26-2(1)(i)
Article 26-2(1)(ii)
Article 26-2(2)
Article 26-2(3)
Article 36
Article 37
Article 38
Article 39
Article 51(1)
Article 51(2)
Article 52(1)
Article 53(2)
Article 53(3)
Article 53(1)
Article 53(2)
Article 53(3)
Article 53(4)
Article 54
Article 55 | 18.1.4 | Sec 23 | null | null | null | Inferred
Expectation | Sec 12 | null | null | Art 3
Art 30 | Inferred
Expectation | Art 2 | null | Sec 6 | null | Art 6.8
Art 6.10
Art 50 | null | null | Principle 1
Principle 8 | Inferred
Expectation | Art 4 | Art 10 | Art 6
Art 14
Art 30 | Art 12
Art 31 | Art 5 | null | null | null | x | null | null | x | R-AC-1
R-AC-2
R-AC-4
R-AM-2
R-AM-3
R-BC-2
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-IR-1
R-IR-3
R-IR-4
R-SA-1
R-SA-2 | R-AC-1 | R-AC-2 | null | R-AC-4 | null | R-AM-2 | R-AM-3 | null | R-BC-2 | null | R-BC-4 | R-BC-5 | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | null | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | null | R-IR-1 | null | R-IR-3 | R-IR-4 | R-SA-1 | R-SA-2 | NT-7
MT-1
MT-2
MT-7
MT-8
MT-9
MT-11
MT-12
MT-13
MT-14
MT-15
MT-16 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | null | null | MT-7 | MT-8 | MT-9 | null | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | MT-16 | null |
Data Privacy | Chief Privacy Officer (CPO) | PRI-01.1 | Mechanisms exist to appoints a Chief Privacy Officer (CPO) or similar role, with the authority, mission, accountability and resources to coordinate, develop and implement, applicable data privacy requirements and manage data privacy risks through the organization-wide data privacy program. | null | E-HRS-08 | Does the organization appoints a Chief Privacy Officer (CPO) or similar role, with the authority, mission, accountability and resources to coordinate, develop and implement, applicable data privacy requirements and manage data privacy risks through the organization-wide data privacy program? | 3 | Identify | X | X | null | There is no evidence of a capability to appoint a Chief Privacy Officer (CPO) or similar role, with the authority, mission, accountability and resources to coordinate, develop and implement, applicable data privacy requirements and manage data privacy risks through the organization-wide data privacy program. | SP-CMM1 is N/A, since a structured process is required to appoint a Chief Privacy Officer (CPO) or similar role, with the authority, mission, accountability and resources to coordinate, develop and implement, applicable data privacy requirements and manage data privacy risks through the organization-wide data privacy program. | Privacy (PRI) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Privacy management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• The data privacy program is developed to work with IT and cybersecurity staff to ensure that applicable statutory, regulatory and contractual data privacy obligations for Personal Data (PD) are properly identified and implemented across the enterprise.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for data privacy management.
• A qualified individual is formally assigned as the Chief Privacy Officer (CPO), or similar role, to lead the organization’s data privacy program. This individual may be assigned to multiple duties, including that as a Data Protection Officer (DPO).
• The CPO, or similar role, identifies “data privacy principles” that systems, applications, services, processes and third-parties must adhere to, based on leading data privacy practices. | Privacy (PRI) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A Privacy program, run by a Chief Privacy Officer (CPO), or similar role, ensures that applicable statutory, regulatory and contractual data privacy obligations are properly identified and implemented to limit and secure Personal Data (PD) that the organization stores, transmits and processes.
• A data privacy team oversees the centralized-management of physical security controls across the enterprise.
• Data Protection Officers (DPOs) are assigned to work closely with business units and project teams to ensure data privacy principles are being implemented.
• CPO and DPO determine and document the legal authority that permits the collection, use, maintenance and sharing of PD, either generally or in support of a specific program or system need.
• As part of the organization’s data privacy program, the CPO publishes a clear set of “data privacy principles”, based on leading data privacy practices, that systems, applications, services, processes and third-parties must adhere to.
• A Project Management Office (PMO), or project management function, ensures both cybersecurity & data privacy principles are identified and implemented within ongoing or planned projects. | Privacy (PRI) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to appoint a Chief Privacy Officer (CPO) or similar role, with the authority, mission, accountability and resources to coordinate, develop and implement, applicable data privacy requirements and manage data privacy risks through the organization-wide data privacy program. | null | null | null | null | null | null | null | null | null | null | null | null | 1.1.0
1.1.2
1.2.1
1.2.2
1.2.8
1.2.9
2.1.0
4.2.3
8.2.1 | null | null | null | null | null | null | null | null | A.10.11
A.10.12 | 6.15.1.4 | 5.10 | null | null | null | null | null | null | GV.PO-P5 | null | null | null | AR-1 | null | null | null | PM-19 | PM-19 | null | null | null | null | null | null | null | null | null | PM-19 | null | null | PM-19 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | P.2.2 | null | null | null | null | null | null | COMP:SG2.SP1
EF:SG2.SP1
EF:SG2.SP2 | null | null | null | null | null | null | null | null | AR-1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 164.530
164.530(a)
164.530(a)(1)
164.530(a)(2) | null | null | null | PM-19 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 6-1-1308(1)(c)(I)
6-1-1308(1)(c)(II)
6-1-1308(6) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Art 37.1
Art 38.1
Art 39.1
Art 39.2 | null | null | Principle 2.7.a | null | null | null | Art 6 | null | Art 32 | Sec 4d
Sec 4f
Sec 4g | null | null | null | Sec 24 | Sec 2 | null | Sec 16
Sec 17 | Sec 30 | null | null | null | null | null | Art 46 | null | Article 8.1 | Art 23 | null | null | null | null | null | null | null | Sec 55
Sec 56 | null | null | Sec 30
Sec 38 | null | null | Sec 21 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Article 9
Article 52 | null | null | null | Article 21 | null | null | null | null | null | null | Sec 11 | null | null | Art 31 | null | Art 10 | null | null | null | Art 6.8
Art 6.10 | null | null | null | Art 7
Art 11 | Art 17
Art 18 | Art 11 | null | null | Art 12 | null | null | null | x | null | null | null | R-AC-1
R-AC-4
R-AM-2
R-AM-3
R-BC-2
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-IR-4 | R-AC-1 | null | null | R-AC-4 | null | R-AM-2 | R-AM-3 | null | R-BC-2 | null | null | null | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | null | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | null | null | null | null | null | null | R-IR-4 | null | null | NT-7
MT-1
MT-2
MT-7
MT-8
MT-9
MT-11
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | null | null | MT-7 | MT-8 | MT-9 | null | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Data Privacy | Privacy Act Statements | PRI-01.2 | Mechanisms exist to provide additional formal notice to individuals from whom the information is being collected that includes:
▪ Notice of the authority of organizations to collect Personal Data (PD);
▪ Whether providing Personal Data (PD) is mandatory or optional;
▪ The principal purpose or purposes for which the Personal Data (PD) is to be used;
▪ The intended disclosures or routine uses of the information; and
▪ The consequences of not providing all or some portion of the information requested. | null | null | Does the organization provide additional formal notice to individuals from whom the information is being collected that includes:
▪ Notice of the authority of organizations to collect Personal Data (PD);
▪ Whether providing Personal Data (PD) is mandatory or optional;
▪ The principal purpose or purposes for which the Personal Data (PD) is to be used;
▪ The intended disclosures or routine uses of the information; and
▪ The consequences of not providing all or some portion of the information requested? | 2 | Identify | null | X | null | There is no evidence of a capability to provide additional formal notice to individuals from whom the information is being collected that includes:
▪ Notice of the authority of organizations to collect Personal Data (PD);
▪ Whether providing Personal Data (PD) is mandatory or optional;
▪ The principal purpose or purposes for which the Personal Data (PD) is to be used;
▪ The intended disclosures or routine uses of the information; and
▪ The consequences of not providing all or some portion of the information requested. | SP-CMM1 is N/A, since a structured process is required to provide additional formal notice to individuals from whom the information is being collected that includes:
▪ Notice of the authority of organizations to collect Personal Data (PD);
▪ Whether providing Personal Data (PD) is mandatory or optional;
▪ The principal purpose or purposes for which the Personal Data (PD) is to be used;
▪ The intended disclosures or routine uses of the information; and
▪ The consequences of not providing all or some portion of the information requested. | Privacy (PRI) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Privacy management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• The data privacy program is developed to work with IT and cybersecurity staff to ensure that applicable statutory, regulatory and contractual data privacy obligations for Personal Data (PD) are properly identified and implemented across the enterprise.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for data privacy management.
• A qualified individual is formally assigned as the Chief Privacy Officer (CPO), or similar role, to lead the organization’s data privacy program. This individual may be assigned to multiple duties, including that as a Data Protection Officer (DPO).
• The CPO, or similar role, identifies “data privacy principles” that systems, applications, services, processes and third-parties must adhere to, based on leading data privacy practices. | Privacy (PRI) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A Privacy program, run by a Chief Privacy Officer (CPO), or similar role, ensures that applicable statutory, regulatory and contractual data privacy obligations are properly identified and implemented to limit and secure Personal Data (PD) that the organization stores, transmits and processes.
• A data privacy team oversees the centralized-management of physical security controls across the enterprise.
• Data Protection Officers (DPOs) are assigned to work closely with business units and project teams to ensure data privacy principles are being implemented.
• CPO and DPO determine and document the legal authority that permits the collection, use, maintenance and sharing of PD, either generally or in support of a specific program or system need.
• As part of the organization’s data privacy program, the CPO publishes a clear set of “data privacy principles”, based on leading data privacy practices, that systems, applications, services, processes and third-parties must adhere to.
• A Project Management Office (PMO), or project management function, ensures both cybersecurity & data privacy principles are identified and implemented within ongoing or planned projects. | Privacy (PRI) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to provide additional formal notice to individuals from whom the information is being collected that includes:
▪ Notice of the authority of organizations to collect Personal Data (PD);
▪ Whether providing Personal Data (PD) is mandatory or optional;
▪ The principal purpose or purposes for which the Personal Data (PD) is to be used;
▪ The intended disclosures or routine uses of the information; and
▪ The consequences of not providing all or some portion of the information requested. | P1.1 | null | null | null | null | null | null | null | null | null | null | null | 10.2.3 | null | null | null | null | null | null | null | null | null | 8.5.1
8.5.2 | null | null | null | null | null | null | null | CM.PO-P1
CM.AW-P1 | null | null | null | TR-2 | null | null | null | PT-5(2) | PT-5(2) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | P.5.2.1 | null | null | null | null | null | null | COMM:SG1.SP1 | null | null | null | null | null | null | null | null | TR-2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Chapter29-Schedule1-Part1-Principles 8 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | null | null | null | R-AM-3
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-GV-1
R-GV-4
R-GV-6
R-GV-7 | null | null | null | null | null | null | R-AM-3 | null | null | null | null | null | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | null | R-GV-1 | null | null | R-GV-4 | null | R-GV-6 | R-GV-7 | null | null | null | null | null | null | null | NT-7
MT-1
MT-2
MT-7
MT-8
MT-9
MT-11
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | null | null | MT-7 | MT-8 | MT-9 | null | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Data Privacy | Dissemination of Data Privacy Program Information | PRI-01.3 | Mechanisms exist to:
▪ Ensure that the public has access to information about organizational data privacy activities and can communicate with its Chief Privacy Officer (CPO) or similar role;
▪ Ensure that organizational data privacy practices are publicly available through organizational websites or otherwise; and
▪ Utilize publicly facing email addresses and/or phone lines to enable the public to provide feedback and/or direct questions to data privacy office(s) regarding data privacy practices. | null | null | Does the organization:
▪ Ensure that the public has access to information about organizational data privacy activities and can communicate with its Chief Privacy Officer (CPO) or similar role;
▪ Ensure that organizational data privacy practices are publicly available through organizational websites or otherwise; and
▪ Utilize publicly facing email addresses and/or phone lines to enable the public to provide feedback and/or direct questions to data privacy office(s) regarding data privacy practices? | 5 | Identify | X | X | null | There is no evidence of a capability to:
▪ Ensure that the public has access to information about organizational data privacy activities and can communicate with its Chief Privacy Officer (CPO) or similar role;
▪ Ensure that organizational data privacy practices are publicly available through organizational websites or otherwise; and
▪ Utilize publicly facing email addresses and/ or phone lines to enable the public to provide feedback and/ or direct questions to data privacy offices regarding data privacy practices. | Privacy (PRI) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• No formal data privacy team exists. Privacy roles are assigned to existing IT / cybersecurity.
• Formal roles and responsibilities for data privacy may exist.
• No formal data privacy principles are identified for the organization.
• An ad hoc approach to Data Protection Impact Assessment (DPIA) exists.
• Compliance efforts are not tied into an enterprise-wide cybersecurity and/ or data privacy program. | Privacy (PRI) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Privacy management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• The data privacy program is developed to work with IT and cybersecurity staff to ensure that applicable statutory, regulatory and contractual data privacy obligations for Personal Data (PD) are properly identified and implemented across the enterprise.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for data privacy management.
• A qualified individual is formally assigned as the Chief Privacy Officer (CPO), or similar role, to lead the organization’s data privacy program. This individual may be assigned to multiple duties, including that as a Data Protection Officer (DPO).
• The CPO, or similar role, identifies “data privacy principles” that systems, applications, services, processes and third-parties must adhere to, based on leading data privacy practices. | Privacy (PRI) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A Privacy program, run by a Chief Privacy Officer (CPO), or similar role, ensures that applicable statutory, regulatory and contractual data privacy obligations are properly identified and implemented to limit and secure Personal Data (PD) that the organization stores, transmits and processes.
• A data privacy team oversees the centralized-management of physical security controls across the enterprise.
• Data Protection Officers (DPOs) are assigned to work closely with business units and project teams to ensure data privacy principles are being implemented.
• CPO and DPO determine and document the legal authority that permits the collection, use, maintenance and sharing of PD, either generally or in support of a specific program or system need.
• As part of the organization’s data privacy program, the CPO publishes a clear set of “data privacy principles”, based on leading data privacy practices, that systems, applications, services, processes and third-parties must adhere to.
• A Project Management Office (PMO), or project management function, ensures both cybersecurity & data privacy principles are identified and implemented within ongoing or planned projects. | Privacy (PRI) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | Privacy (PRI) efforts are “world-class” capabilities that leverage predictive analysis (e.g., machine learning, AI, etc.). In addition to CMM Level 4 criteria, CMM Level 5 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Stakeholders make time-sensitive decisions to support operational efficiency, which may include automated remediation actions.
▪ Based on predictive analysis, process improvements are implemented according to “continuous improvement” practices that affect process changes. | P1.1 | null | null | null | null | null | null | null | null | null | null | null | 2.1.1
2.2.1
2.2.2
2.2.3
3.1.0
3.1.1
3.1.2
4.1.0
4.1.1
4.2.4
5.1.0
5.1.1
6.1.0
7.1.0
7.1.1
8.1.0
8.1.1
9.1.0
9.1.1
10.1.0
10.1.1 | null | null | null | null | null | null | 5.1 | null | null | 7.3.3
8.5.1
8.5.6 | null | null | null | null | null | null | null | GV.PO-P1
CM.PO-P1
CM.AW-P1 | null | null | null | TR-3 | null | null | null | PM-20 | PM-20 | null | null | null | null | null | null | null | null | null | PM-20 | null | null | PM-20 | PM-20 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | P.7.3 | null | null | null | null | null | null | COMM:SG1.SP1 | null | null | null | null | null | null | null | null | TR-3 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 7001(w)
7002(a)(1)
7002(a)(2)
7002(b)
7002(b)(1)
7002(b)(2)
7002(b)(3)
7002(b)(4)
7002(b)(5)
7002(c)(1)
7002(c)(2)
7002(c)(3)
7010(a)
7010(b)
7010(e)
7011(a)
7011(b)
7011(c)
7011(d)
7011(e)(1)
7011(e)(1)(A)
7011(e)(1)(B)
7011(e)(1)(C)
7011(e)(1)(D)
7011(e)(1)(E)
7011(e)(1)(F)
7011(e)(1)(G)
7011(e)(1)(H)
7011(e)(1)(I)
7011(e)(1)(J)
7011(e)(1)(K)
7011(e)(2)
7011(e)(2)(A)
7011(e)(2)(B)
7011(e)(2)(C)
7011(e)(2)(D)
7011(e)(2)(E)
7011(e)(2)(F)
7011(e)(3)
7011(e)(3)(A)
7011(e)(3)(B)
7011(e)(3)(C)
7011(e)(3)(D)
7011(e)(3)(E)
7011(e)(3)(F)
7011(e)(3)(G)
7011(e)(3)(H)
7011(e)(3)(I)
7011(e)(3)(J)
7011(e)(4)
7011(e)(5)
7012(a)
7012(b)
7012(c)
7012(c)(1)
7012(c)(2)
7012(c)(3)
7012(c)(4)
7012(c)(5)
7012(d)
7012(e)(1)
7012(e)(2)
7012(e)(3)
7012(e)(4)
7012(e)(5)
7012(e)(6)
7012(f)
7012(g)
7012(g)(1)
7012(g)(2)
7012(g)(3)(A)
7012(g)(3)(B)
7012(g)(3)(C)
7012(h)
7012(i)
7102(a)(1)(A)
7102(a)(1)(B)
7102(a)(1)(C)
7102(a)(1)(D)
7102(a)(1)(E)
7102(a)(1)(F)
7102(a)(2)
7102(b) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Principle 2.7.a | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Article 14(1)(a)
Article 14(1)(b)
Article 14(1)(c)
Article 14(1)(d)
Article 14(1)(e)
Article 14(1)(f)
Article 14(2)(a)
Article 14(2)(b)
Article 14(2)(c)
Article 14(2)(d)
Article 14(2)(e)
Article 14(2)(f)
Article 14(2)(g)
Article 14(3)(a)
Article 14(3)(b)
Article 14(3)(c)
Article 18(3) | null | null | null | null | APP 1 | null | null | null | null | null | null | Article 9
Article 48 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | x | null | null | null | R-AC-4
R-AM-2
R-AM-3
R-BC-2
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-GV-1
R-GV-2
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-IR-4
R-SA-1
R-SA-2 | null | null | null | R-AC-4 | null | R-AM-2 | R-AM-3 | null | R-BC-2 | null | null | null | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | null | R-GV-1 | R-GV-2 | null | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | null | null | null | null | R-IR-4 | R-SA-1 | R-SA-2 | NT-7
MT-1
MT-2
MT-7
MT-8
MT-9
MT-11
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | null | null | MT-7 | MT-8 | MT-9 | null | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Data Privacy | Data Protection Officer (DPO) | PRI-01.4 | Mechanisms exist to appoint a Data Protection Officer (DPO):
▪ Based on the basis of professional qualities; and
▪ To be involved in all issues related to the protection of personal data. | null | E-HRS-10 | Does the organization appoint a Data Protection Officer (DPO):
▪ Based on the basis of professional qualities; and
▪ To be involved in all issues related to the protection of personal data? | 7 | Identify | X | X | null | There is no evidence of a capability to appoint a Data Protection Officer (DPO):
▪ Based on the basis of professional qualities; and
▪ To be involved in all issues related to the protection of personal data. | SP-CMM1 is N/A, since a structured process is required to appoint a Data Protection Officer (DPO):
▪ Based on the basis of professional qualities; and
▪ To be involved in all issues related to the protection of personal data. | Privacy (PRI) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Privacy management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• The data privacy program is developed to work with IT and cybersecurity staff to ensure that applicable statutory, regulatory and contractual data privacy obligations for Personal Data (PD) are properly identified and implemented across the enterprise.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for data privacy management.
• A qualified individual is formally assigned as the Chief Privacy Officer (CPO), or similar role, to lead the organization’s data privacy program. This individual may be assigned to multiple duties, including that as a Data Protection Officer (DPO).
• Administrative processes exist ensure the DPO is assigned based on the basis of professional qualities and is involved in all issues related to the protection of PD.
• The CPO, or similar role, identifies “data privacy principles” that systems, applications, services, processes and third-parties must adhere to, based on leading data privacy practices. | Privacy (PRI) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A Privacy program, run by a Chief Privacy Officer (CPO), or similar role, ensures that applicable statutory, regulatory and contractual data privacy obligations are properly identified and implemented to limit and secure Personal Data (PD) that the organization stores, transmits and processes.
• A data privacy team oversees the centralized-management of physical security controls across the enterprise.
• Data Protection Officers (DPOs) are assigned to work closely with business units and project teams to ensure data privacy principles are being implemented.
• Administrative processes exist ensure the DPO is assigned based on the basis of professional qualities and is involved in all issues related to the protection of PD.
• CPO and DPO determine and document the legal authority that permits the collection, use, maintenance and sharing of PD, either generally or in support of a specific program or system need.
• As part of the organization’s data privacy program, the CPO publishes a clear set of “data privacy principles”, based on leading data privacy practices, that systems, applications, services, processes and third-parties must adhere to.
• A Project Management Office (PMO), or project management function, ensures both cybersecurity & data privacy principles are identified and implemented within ongoing or planned projects. | Privacy (PRI) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to appoint a Data Protection Officer (DPO):
▪ Based on the basis of professional qualities; and
▪ To be involved in all issues related to the protection of personal data. | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 8.5 | 5.10 | null | null | null | null | null | null | GV.PO-P5
CT.PO-P2
CM.PO-P2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | D.18 | null | 9.1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 6-1-1308(1)(c)(I)
6-1-1308(1)(c)(II)
6-1-1308(6) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Art 35.2
Art 37.1
Art 37.2
Art 37.3
Art 37.4
Art 37.5
Art 37.6
Art 37.7
Art 38.1
Art 38.2
Art 38.3
Art 38.4
Art 38.5
Art 38.6
Art 39.1
Art 39.2 | null | null | Principle 2.7.a | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 24(1)
24(1)(a)
24(1)(b)
24(1)(c)
24(2)
24(3)
24(4)
24(5)
24(6)
24(7)(a)
24(7)(b)
24(7)(c)
24(7)(d)
24(7)(e) | null | null | 4.1(2)
4.1(3) | null | null | null | Article 8.2
Article 10 | null | null | null | null | null | null | Article 44
Article 44.1
Article 44.2
Article 56
Article 56.1
Article 56.2
Article 56.3
Article 57
Article 58
Article 58.1
Article 58.2
Article 58.3
Article 58.4 | null | Sec 17
Sec 55
Sec 56 | null | null | null | null | null | null | null | null | null | null | Article 24(1)
Article 24(2)
Article 24(3)
Article 37(1)(a)
Article 37(1)(b)
Article 37(1)(c)
Article 37(2)
Article 37(3)
Article 37(4)
Article 37(5)
Article 37(6)
Article 37(7)
Article 38(1)
Article 38(2)
Article 38(3)
Article 38(4)
Article 38(5)
Article 38(6)
Article 39(1)(a)
Article 39(1)(b)
Article 39(1)(c)
Article 39(1)(d)
Article 39(1)(e)
Article 39(2) | null | null | null | null | null | null | null | null | null | null | null | Article 9
Article 52
Article 53 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Art 6.8
Art 6.10
Art 41 | null | null | Sec 6 | null | null | null | null | null | Art 12 | null | null | null | x | null | null | null | R-AC-1
R-AC-4
R-AM-2
R-AM-3
R-BC-2
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-IR-4
R-SA-1
R-SA-2 | R-AC-1 | null | null | R-AC-4 | null | R-AM-2 | R-AM-3 | null | R-BC-2 | null | null | null | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | null | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | null | null | null | null | R-IR-4 | R-SA-1 | R-SA-2 | NT-7
MT-1
MT-2
MT-7
MT-8
MT-9
MT-11
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | null | null | MT-7 | MT-8 | MT-9 | null | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Data Privacy | Binding Corporate Rules (BCR) | PRI-01.5 | Mechanisms exist to implement and manage Binding Corporate Rules (BCR) (e.g., data sharing agreement) to legally-bind all parties engaged in a joint economic activity that contractually states enforceable rights on data subjects with regard to the processing of their personal data. | null | E-PRI-05 | Does the organization implement and manage Binding Corporate Rules (BCR) (e?g?, data sharing agreement) to legally-bind all parties engaged in a joint economic activity that contractually states enforceable rights on data subjects with regard to the processing of their personal data? | 5 | Identify | X | X | null | There is no evidence of a capability to implement and manage Binding Corporate Rules (BCR) (e.g., data sharing agreement) to legally-bind all parties engaged in a joint economic activity that contractually states enforceable rights on data subjects with regard to the processing of their personal data. | SP-CMM1 is N/A, since a structured process is required to implement and manage Binding Corporate Rules (BCR) (e.g., data sharing agreement) to legally-bind all parties engaged in a joint economic activity that contractually states enforceable rights on data subjects with regard to the processing of their personal data. | SP-CMM2 is N/A, since a well-defined process is required to implement and manage Binding Corporate Rules (BCR) (e.g., data sharing agreement) to legally-bind all parties engaged in a joint economic activity that contractually states enforceable rights on data subjects with regard to the processing of their personal data. | Privacy (PRI) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A Privacy program, run by a Chief Privacy Officer (CPO), or similar role, ensures that applicable statutory, regulatory and contractual data privacy obligations are properly identified and implemented to limit and secure Personal Data (PD) that the organization stores, transmits and processes.
• A data privacy team oversees the centralized-management of physical security controls across the enterprise.
• Data Protection Officers (DPOs) are assigned to work closely with business units and project teams to ensure data privacy principles are being implemented.
• CPO and DPO determine and document the legal authority that permits the collection, use, maintenance and sharing of PD, either generally or in support of a specific program or system need.
• As part of the organization’s data privacy program, the CPO publishes a clear set of “data privacy principles”, based on leading data privacy practices, that systems, applications, services, processes and third-parties must adhere to.
• A Project Management Office (PMO), or project management function, ensures both cybersecurity & data privacy principles are identified and implemented within ongoing or planned projects.
• The organization implements and governs Binding Corporate Rules (BCR) to legally bind all parties engaged in a joint economic activity that expressly confers enforceable rights on data subjects with regard to the processing of PD. | See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to implement and manage Binding Corporate Rules (BCR) (e.g., data sharing agreement) to legally-bind all parties engaged in a joint economic activity that contractually states enforceable rights on data subjects with regard to the processing of their personal data. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to implement and manage Binding Corporate Rules (BCR) (e.g., data sharing agreement) to legally-bind all parties engaged in a joint economic activity that contractually states enforceable rights on data subjects with regard to the processing of their personal data. | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | P.1.6.2.4 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Principle 3.10.a.i
Principle 3.10.a.ii
Principle 3.10.a.ii.1
Principle 3.10.a.ii.2
Principle 3.10.a.ii.3
Principle 3.10.a.iii
Principle 3.10.b.i
Principle 3.10.c.i | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Article 15 | null | null | null | null | null | null | Article 65
Article 65.x
Article 66
Article 67
Article 67.x | null | null | null | null | null | null | null | null | null | null | null | null | Article 22(1)(a)
Article 22(1)(b)
Article 22(1)(c)
Article 22(2)(a)
Article 22(2)(b)
Article 22(2)(c)
Article 22(2)(d)
Article 22(2)(e)
Article 22(2)(f)
Article 22(2)(g)
Article 22(2)(h)
Article 22(2)(i)
Article 22(2)(j)
Article 22(2)(k)
Article 22(2)(l)
Article 22(2)(m)
Article 22(2)(n)
Article 22(3) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Principle 12
P12-(1)
P12-(1)(a)
P12-(1)(b)
P12-(1)(c)
P12-(1)(d)
P12-(1)(e)
P12-(1)(f)
P12-(2)
P12-(3) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | R-AM-3
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7 | null | null | null | null | null | null | R-AM-3 | null | null | null | null | null | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | null | R-GV-1 | R-GV-2 | R-GV-3 | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | null | null | null | null | null | null | null | NT-7
MT-1
MT-2
MT-8
MT-9
MT-11
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | null | null | null | MT-8 | MT-9 | null | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Data Privacy | Security of Personal Data | PRI-01.6 | Mechanisms exist to ensure Personal Data (PD) is protected by security safeguards that are sufficient and appropriately scoped to protect the confidentiality and integrity of the PD. | null | null | Does the organization ensure Personal Data (PD) is protected by security safeguards that are sufficient and appropriately scoped to protect the confidentiality and integrity of the PD? | 7 | Protect | X | X | null | There is no evidence of a capability to ensure Personal Data (PD) is protected by security safeguards that are sufficient and appropriately scoped to protect the confidentiality and integrity of the PD. | SP-CMM1 is N/A, since a structured process is required to ensure Personal Data (PD) is protected by security safeguards that are sufficient and appropriately scoped to protect the confidentiality and integrity of the PD. | SP-CMM2 is N/A, since a well-defined process is required to ensure Personal Data (PD) is protected by security safeguards that are sufficient and appropriately scoped to protect the confidentiality and integrity of the PD. | Privacy (PRI) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A Privacy program, run by a Chief Privacy Officer (CPO), or similar role, ensures that applicable statutory, regulatory and contractual data privacy obligations are properly identified and implemented to limit and secure Personal Data (PD) that the organization stores, transmits and processes.
• A data privacy team oversees the centralized-management of physical security controls across the enterprise.
• Data Protection Officers (DPOs) are assigned to work closely with business units and project teams to ensure data privacy principles are being implemented.
• CPO and DPO determine and document the legal authority that permits the collection, use, maintenance and sharing of PD, either generally or in support of a specific program or system need.
• As part of the organization’s data privacy program, the CPO publishes a clear set of “data privacy principles”, based on leading data privacy practices, that systems, applications, services, processes and third-parties must adhere to.
• A Project Management Office (PMO), or project management function, ensures both cybersecurity & data privacy principles are identified and implemented within ongoing or planned projects. | See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to ensure Personal Data (PD) is protected by security safeguards that are sufficient and appropriately scoped to protect the confidentiality and integrity of the PD. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to ensure Personal Data (PD) is protected by security safeguards that are sufficient and appropriately scoped to protect the confidentiality and integrity of the PD. | null | P4.2-POF2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 5.34 | null | null | null | null | null | null | null | null | null | MAP 1.6 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 12.9.1 | null | null | null | null | null | null | null | 12.9.1 | null | P.5.3 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 6-1-1305(2)(a)
6-1-1305(4)
6-1-1308(5) | Sec 15(e)(1)
Sec 15(e)(2) | null | Sec 45(a)
Sec 45(b)
Sec 45(c)
Sec 45(d) | null | null | null | Sec 4(2)(a)
Sec 4(2)(b)(i)
Sec 4(2)(b)(ii)
Sec 4(2)(b)(ii)(A)
Sec 4(2)(b)(ii)(A)(1)
Sec 4(2)(b)(ii)(A)(2)
Sec 4(2)(b)(ii)(A)(3)
Sec 4(2)(b)(ii)(A)(4)
Sec 4(2)(b)(ii)(A)(5)
Sec 4(2)(b)(ii)(A)(6)
Sec 4(2)(b)(ii)(B)(1)
Sec 4(2)(b)(ii)(B)(2)
Sec 4(2)(b)(ii)(B)(3)
Sec 4(2)(b)(ii)(B)(4)
Sec 4(2)(b)(ii)(C)(1)
Sec 4(2)(b)(ii)(C)(2)
Sec 4(2)(b)(ii)(C)(3)
Sec 4(2)(b)(ii)(C)(4)
Sec 4(2)(c) | null | null | null | null | null | null | null | null | 59.1-578.A.3 | null | null | null | null | null | null | null | Principle 2.4.a | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 29(f)
41(1)
41(1)(a)
41(1)(b)
41(2)
41(3)(a)
41(3)(b)
41(3)(c)
41(3)(d)
41(3)(e)
41(4)(a)
41(4)(b)
41(4)(c)
41(4)(d)
41(4)(e)
41(4)(f)
42(1)(a)
42(1)(b)
42(1)(c)
42(1)(d)
42(2)(a)
42(2)(b)
42(3)
42(4) | null | null | 2.1(1)(d)
2.6 | null | null | null | Article 8.3
Article 13 | null | null | null | null | null | null | Article 5.6
Article 41
Article 42
Article 42.1
Article 42.2
Article 50
Article 50.1
Article 50.2
Article 50.3
Article 50.4
Article 51
Article 51.1
Article 51.2
Article 51.3
Article 51.4
Article 51.5
Article 51.6
Article 51.7
Article 51.8
Article 51.9
Article 51.10 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Article 9
Article 25
Article 28
Article 59 | null | null | null | Article 20
Article 21 | null | null | null | null | Principle 5
P5-(a)
P5-(a)(i)
P5-(a)(ii)
P5-(a)(iii)
P5-(b) | null | null | null | 14.1.1
14.1.2
14.1.3
14.1.4
14.1.5
14.1.6
14.1.7 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | R-AM-3
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-GV-1
R-GV-4
R-GV-6
R-GV-7 | null | null | null | null | null | null | R-AM-3 | null | null | null | null | null | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | null | R-GV-1 | null | null | R-GV-4 | null | R-GV-6 | R-GV-7 | null | null | null | null | null | null | null | NT-7
MT-1
MT-2
MT-8
MT-9
MT-11
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | null | null | null | MT-8 | MT-9 | null | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Data Privacy | Limiting Personal Data Disclosures | PRI-01.7 | Mechanisms exist to limit the disclosure of Personal Data (PD) to authorized parties for the sole purpose for which the PD was obtained. | null | null | Does the organization limit the disclosure of Personal Data (PD) to authorized parties for the sole purpose for which the PD was obtained? | 7 | Protect | null | X | null | There is no evidence of a capability to limit the disclosure of Personal Data (PD) to authorized parties for the sole purpose for which the PD was obtained. | SP-CMM1 is N/A, since a structured process is required to limit the disclosure of Personal Data (PD) to authorized parties for the sole purpose for which the PD was obtained. | SP-CMM2 is N/A, since a well-defined process is required to limit the disclosure of Personal Data (PD) to authorized parties for the sole purpose for which the PD was obtained. | Privacy (PRI) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A Privacy program, run by a Chief Privacy Officer (CPO), or similar role, ensures that applicable statutory, regulatory and contractual data privacy obligations are properly identified and implemented to limit and secure Personal Data (PD) that the organization stores, transmits and processes.
• A data privacy team oversees the centralized-management of physical security controls across the enterprise.
• Data Protection Officers (DPOs) are assigned to work closely with business units and project teams to ensure data privacy principles are being implemented.
• CPO and DPO determine and document the legal authority that permits the collection, use, maintenance and sharing of PD, either generally or in support of a specific program or system need.
• As part of the organization’s data privacy program, the CPO publishes a clear set of “data privacy principles”, based on leading data privacy practices, that systems, applications, services, processes and third-parties must adhere to.
• A Project Management Office (PMO), or project management function, ensures both cybersecurity & data privacy principles are identified and implemented within ongoing or planned projects.
• Administrative processes and technologies limit the disclosure of PD to authorized parties for purpose(s) in connection with obtaining the PD or directly related to the purpose(s) for which the PD was obtained. | See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to limit the disclosure of Personal Data (PD) to authorized parties for the sole purpose for which the PD was obtained. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to limit the disclosure of Personal Data (PD) to authorized parties for the sole purpose for which the PD was obtained. | null | P6.1-POF2
P6.1-POF3
P6.1-POF4
P6.4-POF1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | P.5 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 2.A.4 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Sec 15(d)
Sec 15(d)(1)
Sec 15(d)(2)
Sec 15(d)(3)
Sec 15(d)(4) | Sec 10(a)(1)
Sec 10(a)(2)
Sec 10(a)(3)
Sec 10(a)(4)
Sec 10(b)(1)
Sec 10(c)(1)
Sec 10(c)(2)
Sec 10(c)(3)
Sec 10(c)(4)
Sec 10(c)(5)
Sec 10(c)(6) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Article 33 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Article 20
Article 21
Article 22
Article 25
Article 41 | null | null | null | null | null | null | null | null | Principle 11
P11-(1)
P11-(1)(a)
P11-(1)(b)
P11-(1)(c)
P11-(1)(d)
P11-(1)(e)(i)
P11-(1)(e)(ii)
P11-(1)(e)(iii)
P11-(1)(e)(iv)
P11-(1)(f)(i)
P11-(1)(f)(ii)
P11-(1)(g)
P11-(1)(h)(i)
P11-(1)(h)(ii)
P11-(1)(i)
P11-(2)
Principle 12
P12-(1)
P12-(1)(a)
P12-(1)(b)
P12-(1)(c)
P12-(1)(d)
P12-(1)(e)
P12-(1)(f)
P12-(2)
P12-(3) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | R-AM-3
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-GV-1
R-GV-4
R-GV-6
R-GV-7 | null | null | null | null | null | null | R-AM-3 | null | null | null | null | null | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | null | R-GV-1 | null | null | R-GV-4 | null | R-GV-6 | R-GV-7 | null | null | null | null | null | null | null | NT-7
MT-1
MT-2
MT-8
MT-9
MT-11
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | null | null | null | MT-8 | MT-9 | null | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Data Privacy | Data Privacy Notice | PRI-02 | Mechanisms exist to:
▪ Make data privacy notice(s) available to individuals upon first interacting with an organization and subsequently as necessary;
▪ Ensure that data privacy notices are clear and easy-to-understand, expressing information about Personal Data (PD) processing in plain language that meet all legal obligations; and
▪ Define the scope of PD processing activities, including the geographic locations and third-party recipients that process the PD within the scope of the data privacy notice. | null | E-PRI-08 | Does the organization:
▪ Make data privacy notice(s) available to individuals upon first interacting with an organization and subsequently as necessary;
▪ Ensure that data privacy notices are clear and easy-to-understand, expressing information about Personal Data (PD) processing in plain language that meet all legal obligations; and
▪ Define the scope of PD processing activities, including the geographic locations and third-party recipients that process the PD within the scope of the data privacy notice? | 7 | Identify | null | X | null | There is no evidence of a capability:
▪ Make data privacy notice(s) available to individuals up on first interacting with an organization and subsequently as necessary;
▪ Ensure that data privacy notices are clear and easy-to-understand, expressing information about Personal Data (PD) processing in plain language that meet all legal obligations; and
▪ Define the scope of PD processing activities, including the geographic locations and third-party recipients that process the PD within the scope of the data privacy notice. | Privacy (PRI) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• No formal data privacy team exists. Privacy roles are assigned to existing IT / cybersecurity.
• Formal roles and responsibilities for data privacy may exist.
• No formal data privacy principles are identified for the organization.
• An ad hoc approach to Data Protection Impact Assessment (DPIA) exists. | Privacy (PRI) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Privacy management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• The data privacy program is developed to work with IT and cybersecurity staff to ensure that applicable statutory, regulatory and contractual data privacy obligations for Personal Data (PD) are properly identified and implemented across the enterprise.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for data privacy management.
• A qualified individual is formally assigned as the Chief Privacy Officer (CPO), or similar role, to lead the organization’s data privacy program. This individual may be assigned to multiple duties, including that as a Data Protection Officer (DPO).
• The CPO, or similar role, identifies “data privacy principles” that systems, applications, services, processes and third-parties must adhere to, based on leading data privacy practices.
• The CPO, or similar role, develops and ensures data privacy notices are published that include relevant purpose, notice and data privacy program information.
• Administrative processes and technologies present data subjects with a data privacy notice in plain language that describes how PD is collected, stored, processed, transmitted, shared and used by the organization. | Privacy (PRI) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A Privacy program, run by a Chief Privacy Officer (CPO), or similar role, ensures that applicable statutory, regulatory and contractual data privacy obligations are properly identified and implemented to limit and secure Personal Data (PD) that the organization stores, transmits and processes.
• A data privacy team oversees the centralized-management of physical security controls across the enterprise.
• Data Protection Officers (DPOs) are assigned to work closely with business units and project teams to ensure data privacy principles are being implemented.
• CPO and DPO determine and document the legal authority that permits the collection, use, maintenance and sharing of PD, either generally or in support of a specific program or system need.
• As part of the organization’s data privacy program, the CPO publishes a clear set of “data privacy principles”, based on leading data privacy practices, that systems, applications, services, processes and third-parties must adhere to.
• A Project Management Office (PMO), or project management function, ensures both cybersecurity & data privacy principles are identified and implemented within ongoing or planned projects.
• The CPO, or similar role, develops and ensures data privacy notices are published that include relevant purpose, notice and data privacy program information.
• Administrative processes and technologies present data subjects with a data privacy notice in plain language that describes how PD is collected, stored, processed, transmitted, shared and used by the organization. | Privacy (PRI) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | Privacy (PRI) efforts are “world-class” capabilities that leverage predictive analysis (e.g., machine learning, AI, etc.). In addition to CMM Level 4 criteria, CMM Level 5 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Stakeholders make time-sensitive decisions to support operational efficiency, which may include automated remediation actions.
▪ Based on predictive analysis, process improvements are implemented according to “continuous improvement” practices that affect process changes. | P1.1 | CC2.3-POF7
P1.1-POF1
P1.1-POF2
P1.1-POF3
P1.1-POF4 | null | null | null | null | null | null | null | DSP-14 | null | null | 2.1.1
2.2.1
2.2.2
2.2.3
3.1.0
3.1.1
3.1.2
4.1.0
4.1.1
4.2.4
5.1.0
5.1.1
6.1.0
7.1.0
7.1.1
8.1.0
8.1.1
9.1.0
9.1.1
10.1.0
10.1.1
10.2.3 | null | null | null | null | null | null | 5.34 | null | A.2.1
A.2.2 | 7.3
7.3.1
7.3.2
8.2.2
8.2.3
8.5.1
8.5.2
8.5.6 | 5.2
5.8 | null | null | null | null | null | null | CM.PO-P1
CM.AW-P1 | null | null | null | TR-1
TR-2 | null | null | null | PM-20(1)
PT-5 | PM-20(1)
PT-5 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | P.6.1.1 | null | 9.2 | null | null | null | null | COMM:SG1.SP1 | null | null | null | null | null | null | null | null | TR-1
TR-2 | 6,502 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | § 1232g | null | null | null | null | 164.520
164.520(a)
164.520(a)(1)
164.520(a)(2)
164.520(a)(3)
164.520(b)
164.520(c)
164.520(d)
164.520(e)
164.530(i)(3) | null | null | null | null | null | null | null | null | null | Principle 1
Principle 3 | null | null | null | null | null | null | null | null | null | 7001(w)
7002(a)(1)
7002(a)(2)
7002(b)
7002(b)(1)
7002(b)(2)
7002(b)(3)
7002(b)(4)
7002(b)(5)
7002(c)(1)
7002(c)(2)
7002(c)(3)
7010(a)
7010(b)
7010(e)
7011(a)
7011(b)
7011(c)
7011(d)
7011(e)(1)
7011(e)(1)(A)
7011(e)(1)(B)
7011(e)(1)(C)
7011(e)(1)(D)
7011(e)(1)(E)
7011(e)(1)(F)
7011(e)(1)(G)
7011(e)(1)(H)
7011(e)(1)(I)
7011(e)(1)(J)
7011(e)(1)(K)
7011(e)(2)
7011(e)(2)(A)
7011(e)(2)(B)
7011(e)(2)(C)
7011(e)(2)(D)
7011(e)(2)(E)
7011(e)(2)(F)
7011(e)(3)
7011(e)(3)(A)
7011(e)(3)(B)
7011(e)(3)(C)
7011(e)(3)(D)
7011(e)(3)(E)
7011(e)(3)(F)
7011(e)(3)(G)
7011(e)(3)(H)
7011(e)(3)(I)
7011(e)(3)(J)
7011(e)(4)
7011(e)(5)
7012(a)
7012(b)
7012(c)
7012(c)(1)
7012(c)(2)
7012(c)(3)
7012(c)(4)
7012(c)(5)
7012(d)
7012(e)(1)
7012(e)(2)
7012(e)(3)
7012(e)(4)
7012(e)(5)
7012(e)(6)
7012(f)
7012(g)
7012(g)(1)
7012(g)(2)
7012(g)(3)(A)
7012(g)(3)(B)
7012(g)(3)(C)
7012(h)
7012(i) | null | 6-1-1305(2)
6-1-1308(1)(a)
6-1-1308(1)(a)(I)
6-1-1308(1)(a)(II)
6-1-1308(1)(a)(II)
6-1-1308(1)(a)(IV)
6-1-1308(1)(a)(V)
6-1-1308(1)(b)
6-1-105(1)(nnn) | Sec 15(a) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 59.1-578.C
59.1-578.C.1
59.1-578.C.2
59.1-578.C.3
59.1-578.C.4
59.1-578.C.5
59.1-578.D
59.1-578.E | null | null | null | null | Art 11.2
Art 12.1
Art 13.1
Art 13.2
Art 13.3
Art 14.1
Art 14.2
Art 14.3
Art 26.1
Art 26.2 | null | null | Principle 2.1.a.i
Principle 2.1.a.ii
Principle 2.1.a.iii
Principle 2.1.a.iv
Principle 2.1.a.v
Principle 2.1.a.vi
Principle 2.1.a.vii
Principle 2.1.a.viii
Principle 2.1.a.ix
Principle 2.1.a.x
Principle 2.1.a.xi
Principle 2.1.a.xii
Principle 2.1.a.xii
Principle 2.1.b | null | Art 9 | Art 5
Art 11
Art 16 | Art 6
Art 31 | null | null | Sec 4
Sec 19 | null | null | null | null | null | null | null | Sec 11
Sec 13
Sec 37 | 25(e)
26(a)
29(a)
29(b)
29(c)
29(d)
29(e)
29(f)
29(g)
29(h) | null | Sec 8
Sec 27 | 2.5
2.5(a)
2.5(b)
2.5(c)
2.5(d)
2.5(e)
2.5(f)
2.5(g)
2.5(h)
2.5(i)
3.1(1)
3.1(7)(a)
3.1(7)(b)
3.1(7)(c)
3.1(7)(d)
3.1(7)(e)
3.1(7)(f)
3.1(7)(g)
3.1(7)(h)
3.1(7)(i)
3.1(7)(j)
3.1(7)(k)
3.1(7)(l)
3.1(7)(m)
3.1(7)(n)
3.1(9)
3.1(9)(a)
3.1(9)(b)
3.1(9)(c)
3.1(9)(d)
3.1(9)(e) | Sec 31 | Art 23 | Art 5 | Article 6.1
Article 8.1
Article 9.1
Article 9.3
Article 9.4
Article 10
Article 17.1
Article 17.2
Article 17.3
Article 17.4
Article 17.5 | Art 22 | null | null | null | null | null | Article 5.1
Article 6.1
Article 12.2
Article 12.3
Article 12.4
Article 12.5
Article 12.6 | null | Sec 18 | Art 8 | null | Sec 26 | null | Art 10 | null | null | null | null | Chapter29-Schedule1-Part1-Principles 8 | Article 13(1)(a)
Article 13(1)(b)
Article 13(1)(c)
Article 13(1)(d)
Article 13(1)(e)
Article 13(1)(f)
Article 13(2)(a)
Article 13(2)(b)
Article 13(2)(c)
Article 13(2)(d)
Article 13(2)(e)
Article 13(2)(f) | null | null | null | APP Part 5 | APP 1
APP 5 | null | null | null | null | null | null | Article 7
Article 17
Article 17(1)
Article 17(2)
Article 17(3)
Article 17(4)
Article 27
Article 39
Article 48 | null | null | null | Article 15(1)
Article 15(2) | null | Sec 7 | null | null | Principle 3
P3-(1)
P3-(1)(a)
P3-(1)(b)
P3-(1)(c)
P3-(1)(d)
P3-(1)(d)(i)
P3-(1)(d)(ii)
P3-(1)(e)
P3-(1)(e)(i)
P3-(1)(e)(ii)
P3-(1)(f)
P3-(1)(g)
P3-(2)
P3-(3)
P3-(4)
P3-(4)(a)
P3-(4)(b)
P3-(4)(b)(i)
P3-(4)(b)(ii)
P3-(4)(b)(iii)
P3-(4)(b)(iv)
P3-(4)(c)
P3-(4)(d)
P3-(4)(e)
P3-(4)(e)(i)
P3-(4)(e)(ii) | null | Sec 14 | null | null | Art 3
Art 4 | Art 5 | Art 6 | null | null | null | Art 6.2
Art 6.6
Art 8 | null | null | Principle 2 | Art 5 | Art 12 | Art 5 | Art 7
Art 16
Art 17
Art 18 | Art 7 | Art 5
Art 13 | null | null | null | x | null | null | null | R-AM-3
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-GV-1
R-GV-2
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-IR-4
R-SA-2 | null | null | null | null | null | null | R-AM-3 | null | null | null | null | null | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | null | R-GV-1 | R-GV-2 | null | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | null | null | null | null | R-IR-4 | null | R-SA-2 | NT-7
MT-1
MT-2
MT-7
MT-8
MT-9
MT-11
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | null | null | MT-7 | MT-8 | MT-9 | null | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Data Privacy | Purpose Specification | PRI-02.1 | Mechanisms exist to identify and document the purpose(s) for which Personal Data (PD) is collected, used, maintained and shared in its data privacy notices. | null | null | Does the organization identify and document the purpose(s) for which Personal Data (PD) is collected, used, maintained and shared in its data privacy notices? | 7 | Identify | null | X | null | There is no evidence of a capability to identify and document the purpose(s) for which Personal Data (PD) is collected, used, maintained and shared in its data privacy notices. | SP-CMM1 is N/A, since a structured process is required to identify and document the purpose(s) for which Personal Data (PD) is collected, used, maintained and shared in its data privacy notices. | Privacy (PRI) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Privacy management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• The data privacy program is developed to work with IT and cybersecurity staff to ensure that applicable statutory, regulatory and contractual data privacy obligations for Personal Data (PD) are properly identified and implemented across the enterprise.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for data privacy management.
• A qualified individual is formally assigned as the Chief Privacy Officer (CPO), or similar role, to lead the organization’s data privacy program. This individual may be assigned to multiple duties, including that as a Data Protection Officer (DPO).
• The CPO, or similar role, identifies “data privacy principles” that systems, applications, services, processes and third-parties must adhere to, based on leading data privacy practices.
• Administrative processes exist identify and document the purpose(s) for which PD is collected, used, maintained and shared in its data privacy notices. | Privacy (PRI) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A Privacy program, run by a Chief Privacy Officer (CPO), or similar role, ensures that applicable statutory, regulatory and contractual data privacy obligations are properly identified and implemented to limit and secure Personal Data (PD) that the organization stores, transmits and processes.
• A data privacy team oversees the centralized-management of physical security controls across the enterprise.
• Data Protection Officers (DPOs) are assigned to work closely with business units and project teams to ensure data privacy principles are being implemented.
• CPO and DPO determine and document the legal authority that permits the collection, use, maintenance and sharing of PD, either generally or in support of a specific program or system need.
• As part of the organization’s data privacy program, the CPO publishes a clear set of “data privacy principles”, based on leading data privacy practices, that systems, applications, services, processes and third-parties must adhere to.
• A Project Management Office (PMO), or project management function, ensures both cybersecurity & data privacy principles are identified and implemented within ongoing or planned projects.
• Administrative processes exist identify and document the purpose(s) for which PD is collected, used, maintained and shared in its data privacy notices. | Privacy (PRI) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to identify and document the purpose(s) for which Personal Data (PD) is collected, used, maintained and shared in its data privacy notices. | null | P1.1-POF1
P1.1-POF2
P1.1-POF3
P1.1-POF4
P6.7-POF1 | null | null | null | null | null | null | null | DSP-12 | null | null | 4.2.1 | null | null | null | null | null | 18.1.4 | 5.34 | 18.1.4 | null | 7.2
7.2.1
8.2.2
8.5.1 | 5.3 | null | null | null | null | null | null | CM.PO-P1 | null | null | null | AP-2 | null | null | null | PT-3 | PT-3 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | P.6.1.1 | null | null | null | null | null | null | COMP:SG2.SP1 | null | null | null | null | null | null | null | null | AP-2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | § 1232g | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 7002(a)(1)
7002(a)(2)
7002(b)
7002(b)(1)
7002(b)(2)
7002(b)(3)
7002(b)(4)
7002(b)(5)
7002(c)(1)
7002(c)(2)
7002(c)(3) | null | 6-1-1308(1)(a)
6-1-1308(1)(a)(I)
6-1-1308(1)(a)(II)
6-1-1308(1)(a)(II)
6-1-1308(1)(a)(IV)
6-1-1308(1)(a)(V)
6-1-1308(1)(b)
6-1-1308(2)
6-1-105(1)(nnn) | Sec 15(b)(1)
Sec 15(b)(2) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 59.1-578.D
59.1-578.E | null | null | null | null | Art 13.1
Art 14.1
Art 14.2 | null | null | Principle 2.1.a.i
Principle 2.1.a.ii
Principle 2.1.a.iii
Principle 2.1.a.iv
Principle 2.1.a.v
Principle 2.1.a.vi
Principle 2.1.a.vii
Principle 2.1.a.viii
Principle 2.1.a.ix
Principle 2.1.a.x
Principle 2.1.a.xi
Principle 2.1.a.xii
Principle 2.1.a.xii
Principle 2.1.b | Sec 6 | Art 4-7 | Art 5 | null | null | Art 7 | null | null | null | null | null | Sec 2 | null | Sec 8 | Sec 13 | 29(c) | null | null | 2.3(1) | Sec 32 | Art 23 | Art 5 | Article 6.1
Article 8.1
Article 10 | Art 5 | null | null | null | null | null | Article 5.1
Article 6.1
Article 12.2
Article 12.3
Article 12.4
Article 12.5
Article 12.6 | null | Sec 13
Sec 18 | null | null | Sec 26 | null | Art 10 | null | null | null | null | null | Article 5(1)(c)
Article 6(1)(a)
Article 6(1)(b)
Article 6(1)(c)
Article 6(1)(d)
Article 6(1)(e)
Article 6(1)(f)
| null | null | null | APP Part 3 | APP 1 | null | null | null | null | null | null | Article 6
Article 48 | Principle 1 | null | null | Article 15(1)
Article 15(2) | 18.1.4 | null | null | null | Principle 3
P3-(1)
P3-(1)(a)
P3-(1)(b)
P3-(1)(c)
P3-(1)(d)
P3-(1)(d)(i)
P3-(1)(d)(ii)
P3-(1)(e)
P3-(1)(e)(i)
P3-(1)(e)(ii)
P3-(1)(f)
P3-(1)(g)
P3-(2)
P3-(3)
P3-(4)
P3-(4)(a)
P3-(4)(b)
P3-(4)(b)(i)
P3-(4)(b)(ii)
P3-(4)(b)(iii)
P3-(4)(b)(iv)
P3-(4)(c)
P3-(4)(d)
P3-(4)(e)
P3-(4)(e)(i)
P3-(4)(e)(ii) | Sec 19 | Sec 14
Sec 19
Sec 20 | null | null | Art 3
Art 4 | Art 5
Art 19 | Art 6 | Art 6
Art 27.1
Art 27.2
Art 28.1 | Sec 6 | null | Art 6.1
Art 6.3 | null | null | Sec 5
Principle 2 | Art 5 | Art 4 | null | Art 7
Art 16
Art 17
Art 18 | Art 6 | Art 5
Art 8 | null | null | null | x | null | null | x | R-AM-3
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-GV-1
R-GV-2
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-IR-4
R-SA-2 | null | null | null | null | null | null | R-AM-3 | null | null | null | null | null | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | null | R-GV-1 | R-GV-2 | null | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | null | null | null | null | R-IR-4 | null | R-SA-2 | NT-7
MT-1
MT-2
MT-7
MT-8
MT-9
MT-11
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | null | null | MT-7 | MT-8 | MT-9 | null | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Data Privacy | Automated Data Management Processes | PRI-02.2 | Automated mechanisms exist to adjust data that is able to be collected, created, used, disseminated, maintained, retained and/or disclosed, based on updated data subject authorization(s). | The organization should identify and address obligations, including legal obligations, to the PD principals resulting from decisions made by the organization which are related to the PD principal based solely on automated processing of PD. | null | Does the organization use automated mechanisms to adjust data that is able to be collected, created, used, disseminated, maintained, retained and/or disclosed, based on updated data subject authorization(s)? | 1 | Identify | null | X | X | There is no evidence of a capability to adjust data that is able to be collected, created, used, disseminated, maintained, retained and/ or disclosed, based on updated data subject authorization(s). | SP-CMM1 is N/A, since a structured process is required to adjust data that is able to be collected, created, used, disseminated, maintained, retained and/ or disclosed, based on updated data subject authorization(s). | SP-CMM2 is N/A, since a well-defined process is required to adjust data that is able to be collected, created, used, disseminated, maintained, retained and/ or disclosed, based on updated data subject authorization(s). | Privacy (PRI) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A Privacy program, run by a Chief Privacy Officer (CPO), or similar role, ensures that applicable statutory, regulatory and contractual data privacy obligations are properly identified and implemented to limit and secure Personal Data (PD) that the organization stores, transmits and processes.
• A data privacy team oversees the centralized-management of physical security controls across the enterprise.
• Data Protection Officers (DPOs) are assigned to work closely with business units and project teams to ensure data privacy principles are being implemented.
• CPO and DPO determine and document the legal authority that permits the collection, use, maintenance and sharing of PD, either generally or in support of a specific program or system need.
• As part of the organization’s data privacy program, the CPO publishes a clear set of “data privacy principles”, based on leading data privacy practices, that systems, applications, services, processes and third-parties must adhere to.
• A Project Management Office (PMO), or project management function, ensures both cybersecurity & data privacy principles are identified and implemented within ongoing or planned projects. | Privacy (PRI) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to adjust data that is able to be collected, created, used, disseminated, maintained, retained and/ or disclosed, based on updated data subject authorization(s). | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 7.3.10 | null | null | null | null | null | null | null | CT.DM-P7 | null | null | null | null | null | null | null | PM-24
PT-2(2)
PT-3(2) | PM-24 | null | null | null | PT-2(2)
PT-3(2) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | P.1.6.4 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Art 14.2
Art 22.1
Art 22.2
Art 22.3
Art 22.4 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 35(1)
35(2)
35(2)(a)
35(2)(b)
35(2)(c)
35(3)
35(3)(a)
35(3)(b)(i)
35(3)(b)(ii)
35(4)(a)
35(4)(b)
35(4)(c)(i)
35(4)(c)(ii) | null | null | null | null | null | null | null | null | null | null | null | null | null | Article 38
Article 38.1
Article 38.2
Article 38.3
Article 39 | null | Sec 5
Sec 71 | null | null | null | null | null | null | null | null | null | null | Article 22(1)
Article 22(2)(a)
Article 22(2)(b)
Article 22(2)(c)
Article 22(3)
Article 22(4) | null | null | null | null | null | null | null | null | null | null | null | Article 24 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Art 5 | null | null | null | null | null | null | null | null | null | null | null | Art 7 | null | null | null | null | null | x | null | null | null | R-AM-3
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-GV-1
R-GV-2
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-IR-4
R-SA-2 | null | null | null | null | null | null | R-AM-3 | null | null | null | null | null | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | null | R-GV-1 | R-GV-2 | null | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | null | null | null | null | R-IR-4 | null | R-SA-2 | NT-7
MT-1
MT-2
MT-7
MT-8
MT-9
MT-11
MT-12
MT-13
MT-14 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | null | null | MT-7 | MT-8 | MT-9 | null | MT-11 | MT-12 | MT-13 | MT-14 | null | null | null |
Data Privacy | Computer Matching Agreements (CMA) | PRI-02.3 | Mechanisms exist to publish Computer Matching Agreements (CMA) on the public website of the organization. | null | null | Does the organization publish Computer Matching Agreements (CMA) on the public website of the organization? | 1 | Identify | null | X | X | There is no evidence of a capability to publish Computer Matching Agreements (CMA) on the public website of the organization. | SP-CMM1 is N/A, since a structured process is required to publish Computer Matching Agreements (CMA) on the public website of the organization. | SP-CMM2 is N/A, since a well-defined process is required to publish Computer Matching Agreements (CMA) on the public website of the organization. | Privacy (PRI) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A Privacy program, run by a Chief Privacy Officer (CPO), or similar role, ensures that applicable statutory, regulatory and contractual data privacy obligations are properly identified and implemented to limit and secure Personal Data (PD) that the organization stores, transmits and processes.
• A data privacy team oversees the centralized-management of physical security controls across the enterprise.
• Data Protection Officers (DPOs) are assigned to work closely with business units and project teams to ensure data privacy principles are being implemented.
• CPO and DPO determine and document the legal authority that permits the collection, use, maintenance and sharing of PD, either generally or in support of a specific program or system need.
• As part of the organization’s data privacy program, the CPO publishes a clear set of “data privacy principles”, based on leading data privacy practices, that systems, applications, services, processes and third-parties must adhere to.
• A Project Management Office (PMO), or project management function, ensures both cybersecurity & data privacy principles are identified and implemented within ongoing or planned projects. | Privacy (PRI) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to publish Computer Matching Agreements (CMA) on the public website of the organization. | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | DI-2(1) | null | null | null | PM-24
PT-8 | PM-24
PT-8 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | P.1.2.2 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | DI-2(1) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | R-AM-3
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-GV-1
R-GV-2
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-IR-4
R-SA-2 | null | null | null | null | null | null | R-AM-3 | null | null | null | null | null | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | null | R-GV-1 | R-GV-2 | null | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | null | null | null | null | R-IR-4 | null | R-SA-2 | NT-7
MT-1
MT-2
MT-7
MT-8
MT-9
MT-11
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | null | null | MT-7 | MT-8 | MT-9 | null | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Data Privacy | System of Records Notice (SORN) | PRI-02.4 | Mechanisms exist to draft, publish and keep System of Records Notices (SORN) updated in accordance with regulatory guidance. | null | null | Does the organization draft, publish and keep System of Records Notices (SORN) updated in accordance with regulatory guidance? | 1 | Identify | null | X | X | There is no evidence of a capability to draft, publish and keep System of Records Notices (SORN) updated in accordance with regulatory guidance. | SP-CMM1 is N/A, since a structured process is required to draft, publish and keep System of Records Notices (SORN) updated in accordance with regulatory guidance. | Privacy (PRI) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Privacy management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• The data privacy program is developed to work with IT and cybersecurity staff to ensure that applicable statutory, regulatory and contractual data privacy obligations for Personal Data (PD) are properly identified and implemented across the enterprise.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for data privacy management.
• A qualified individual is formally assigned as the Chief Privacy Officer (CPO), or similar role, to lead the organization’s data privacy program. This individual may be assigned to multiple duties, including that as a Data Protection Officer (DPO).
• The CPO, or similar role, identifies “data privacy principles” that systems, applications, services, processes and third-parties must adhere to, based on leading data privacy practices.
• Administrative processes and technologies use a System of Records Notices (SORN), or similar record of processing activities, to maintain a record of processing PD under the organization's responsibility. | Privacy (PRI) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A Privacy program, run by a Chief Privacy Officer (CPO), or similar role, ensures that applicable statutory, regulatory and contractual data privacy obligations are properly identified and implemented to limit and secure Personal Data (PD) that the organization stores, transmits and processes.
• A data privacy team oversees the centralized-management of physical security controls across the enterprise.
• Data Protection Officers (DPOs) are assigned to work closely with business units and project teams to ensure data privacy principles are being implemented.
• CPO and DPO determine and document the legal authority that permits the collection, use, maintenance and sharing of PD, either generally or in support of a specific program or system need.
• As part of the organization’s data privacy program, the CPO publishes a clear set of “data privacy principles”, based on leading data privacy practices, that systems, applications, services, processes and third-parties must adhere to.
• A Project Management Office (PMO), or project management function, ensures both cybersecurity & data privacy principles are identified and implemented within ongoing or planned projects.
• Administrative processes and technologies use a System of Records Notices (SORN), or similar record of processing activities, to maintain a record of processing PD under the organization's responsibility. | See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to draft, publish and keep System of Records Notices (SORN) updated in accordance with regulatory guidance. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to draft, publish and keep System of Records Notices (SORN) updated in accordance with regulatory guidance. | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | TR-2(1) | null | null | null | PT-6 | PT-6 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | L.7.6 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | TR-2(1) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | R-AM-3
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-GV-1
R-GV-2
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-IR-4
R-SA-2 | null | null | null | null | null | null | R-AM-3 | null | null | null | null | null | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | null | R-GV-1 | R-GV-2 | null | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | null | null | null | null | R-IR-4 | null | R-SA-2 | NT-7
MT-1
MT-2
MT-7
MT-8
MT-9
MT-11
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | null | null | MT-7 | MT-8 | MT-9 | null | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Data Privacy | System of Records Notice (SORN) Review Process | PRI-02.5 | Mechanisms exist to review all routine uses of data published in the System of Records Notices (SORN) to ensure continued accuracy and to ensure that routine uses continue to be compatible with the purpose for which the information was collected. | null | null | Does the organization review all routine uses of data published in the System of Records Notices (SORN) to ensure continued accuracy and to ensure that routine uses continue to be compatible with the purpose for which the information was collected? | 1 | Identify | null | X | null | There is no evidence of a capability to review all routine uses of data published in the System of Records Notices (SORN) to ensure continued accuracy and to ensure that routine uses continue to be compatible with the purpose for which the information was collected. | SP-CMM1 is N/A, since a structured process is required to review all routine uses of data published in the System of Records Notices (SORN) to ensure continued accuracy and to ensure that routine uses continue to be compatible with the purpose for which the information was collected. | Privacy (PRI) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Privacy management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• The data privacy program is developed to work with IT and cybersecurity staff to ensure that applicable statutory, regulatory and contractual data privacy obligations for Personal Data (PD) are properly identified and implemented across the enterprise.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for data privacy management.
• A qualified individual is formally assigned as the Chief Privacy Officer (CPO), or similar role, to lead the organization’s data privacy program. This individual may be assigned to multiple duties, including that as a Data Protection Officer (DPO).
• The CPO, or similar role, identifies “data privacy principles” that systems, applications, services, processes and third-parties must adhere to, based on leading data privacy practices. | Privacy (PRI) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A Privacy program, run by a Chief Privacy Officer (CPO), or similar role, ensures that applicable statutory, regulatory and contractual data privacy obligations are properly identified and implemented to limit and secure Personal Data (PD) that the organization stores, transmits and processes.
• A data privacy team oversees the centralized-management of physical security controls across the enterprise.
• Data Protection Officers (DPOs) are assigned to work closely with business units and project teams to ensure data privacy principles are being implemented.
• CPO and DPO determine and document the legal authority that permits the collection, use, maintenance and sharing of PD, either generally or in support of a specific program or system need.
• As part of the organization’s data privacy program, the CPO publishes a clear set of “data privacy principles”, based on leading data privacy practices, that systems, applications, services, processes and third-parties must adhere to.
• A Project Management Office (PMO), or project management function, ensures both cybersecurity & data privacy principles are identified and implemented within ongoing or planned projects. | See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to review all routine uses of data published in the System of Records Notices (SORN) to ensure continued accuracy and to ensure that routine uses continue to be compatible with the purpose for which the information was collected. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to review all routine uses of data published in the System of Records Notices (SORN) to ensure continued accuracy and to ensure that routine uses continue to be compatible with the purpose for which the information was collected. | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | PT-6(1) | PT-6(1) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | L.7.7 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | R-AM-3
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-GV-1
R-GV-2
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-IR-4
R-SA-2 | null | null | null | null | null | null | R-AM-3 | null | null | null | null | null | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | null | R-GV-1 | R-GV-2 | null | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | null | null | null | null | R-IR-4 | null | R-SA-2 | NT-7
MT-1
MT-2
MT-7
MT-8
MT-9
MT-11
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | null | null | MT-7 | MT-8 | MT-9 | null | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Data Privacy | Privacy Act Exemptions | PRI-02.6 | Mechanisms exist to review all Privacy Act exemptions claimed for the System of Records Notices (SORN) to ensure they remain appropriate and accurate. | null | null | Does the organization review all Privacy Act exemptions claimed for the System of Records Notices (SORN) to ensure they remain appropriate and accurate? | 1 | Identify | null | X | null | There is no evidence of a capability to review all Privacy Act exemptions claimed for the System of Records Notices (SORN) to ensure they remain appropriate and accurate. | SP-CMM1 is N/A, since a structured process is required to review all Privacy Act exemptions claimed for the System of Records Notices (SORN) to ensure they remain appropriate and accurate. | Privacy (PRI) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Privacy management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• The data privacy program is developed to work with IT and cybersecurity staff to ensure that applicable statutory, regulatory and contractual data privacy obligations for Personal Data (PD) are properly identified and implemented across the enterprise.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for data privacy management.
• A qualified individual is formally assigned as the Chief Privacy Officer (CPO), or similar role, to lead the organization’s data privacy program. This individual may be assigned to multiple duties, including that as a Data Protection Officer (DPO).
• The CPO, or similar role, identifies “data privacy principles” that systems, applications, services, processes and third-parties must adhere to, based on leading data privacy practices. | Privacy (PRI) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A Privacy program, run by a Chief Privacy Officer (CPO), or similar role, ensures that applicable statutory, regulatory and contractual data privacy obligations are properly identified and implemented to limit and secure Personal Data (PD) that the organization stores, transmits and processes.
• A data privacy team oversees the centralized-management of physical security controls across the enterprise.
• Data Protection Officers (DPOs) are assigned to work closely with business units and project teams to ensure data privacy principles are being implemented.
• CPO and DPO determine and document the legal authority that permits the collection, use, maintenance and sharing of PD, either generally or in support of a specific program or system need.
• As part of the organization’s data privacy program, the CPO publishes a clear set of “data privacy principles”, based on leading data privacy practices, that systems, applications, services, processes and third-parties must adhere to.
• A Project Management Office (PMO), or project management function, ensures both cybersecurity & data privacy principles are identified and implemented within ongoing or planned projects. | See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to review all Privacy Act exemptions claimed for the System of Records Notices (SORN) to ensure they remain appropriate and accurate. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to review all Privacy Act exemptions claimed for the System of Records Notices (SORN) to ensure they remain appropriate and accurate. | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | PT-6(2) | PT-6(2) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | P.2.1.1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | R-AM-3
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-GV-1
R-GV-2
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-IR-4
R-SA-2 | null | null | null | null | null | null | R-AM-3 | null | null | null | null | null | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | null | R-GV-1 | R-GV-2 | null | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | null | null | null | null | R-IR-4 | null | R-SA-2 | NT-7
MT-1
MT-2
MT-7
MT-8
MT-9
MT-11
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | null | null | MT-7 | MT-8 | MT-9 | null | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Data Privacy | Real-Time or Layered Notice | PRI-02.7 | Mechanisms exist to provide real-time and/or layered notice when Personal Data (PD) is collected that provides data subjects with a summary of key points or more detailed information that is specific to the organization's data privacy notice. | null | null | Does the organization provide real-time and/or layered notice when Personal Data (PD) is collected that provides data subjects with a summary of key points or more detailed information that is specific to the organization's data privacy notice? | 2 | Identify | null | null | X | There is no evidence of a capability to provide real-time and/ or layered notice when Personal Data (PD) is collected that provides data subjects with a summary of key points or more detailed information that is specific to the organization's data privacy notice. | SP-CMM1 is N/A, since a structured process is required to provide real-time and/ or layered notice when Personal Data (PD) is collected that provides data subjects with a summary of key points or more detailed information that is specific to the organization's data privacy notice. | SP-CMM2 is N/A, since a well-defined process is required to provide real-time and/ or layered notice when Personal Data (PD) is collected that provides data subjects with a summary of key points or more detailed information that is specific to the organization's data privacy notice. | Privacy (PRI) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A Privacy program, run by a Chief Privacy Officer (CPO), or similar role, ensures that applicable statutory, regulatory and contractual data privacy obligations are properly identified and implemented to limit and secure Personal Data (PD) that the organization stores, transmits and processes.
• A data privacy team oversees the centralized-management of physical security controls across the enterprise.
• Data Protection Officers (DPOs) are assigned to work closely with business units and project teams to ensure data privacy principles are being implemented.
• CPO and DPO determine and document the legal authority that permits the collection, use, maintenance and sharing of PD, either generally or in support of a specific program or system need.
• As part of the organization’s data privacy program, the CPO publishes a clear set of “data privacy principles”, based on leading data privacy practices, that systems, applications, services, processes and third-parties must adhere to.
• A Project Management Office (PMO), or project management function, ensures both cybersecurity & data privacy principles are identified and implemented within ongoing or planned projects. | See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to provide real-time and/ or layered notice when Personal Data (PD) is collected that provides data subjects with a summary of key points or more detailed information that is specific to the organization's data privacy notice. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to provide real-time and/ or layered notice when Personal Data (PD) is collected that provides data subjects with a summary of key points or more detailed information that is specific to the organization's data privacy notice. | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | TR-1(1) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | TR-1(1) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | R-AM-3
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-GV-1
R-GV-2
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-IR-4
R-SA-2 | null | null | null | null | null | null | R-AM-3 | null | null | null | null | null | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | null | R-GV-1 | R-GV-2 | null | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | null | null | null | null | R-IR-4 | null | R-SA-2 | NT-7
MT-1
MT-2
MT-7
MT-8
MT-9
MT-11
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | null | null | MT-7 | MT-8 | MT-9 | null | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |
Data Privacy | Choice & Consent | PRI-03 | Mechanisms exist to authorize the processing of their Personal Data (PD) prior to its collection that:
▪ Uses plain language and provide examples to illustrate the potential data privacy risks of the authorization; and
▪ Provides a means for users to decline the authorization.
| - "opt in" vs "opt out" user selections | null | Does the organization authorize the processing of their Personal Data (PD) prior to its collection that:
▪ Uses plain language and provide examples to illustrate the potential data privacy risks of the authorization; and
▪ Provides a means for users to decline the authorization?
| 7 | Identify | null | X | null | There is no evidence of a capability to authorize the processing of their Personal Data (PD) prior to its collection that:
▪ Uses plain language and provide examples to illustrate the potential data privacy risks of the authorization; and
▪ Provides a means for users to decline the authorization.
| SP-CMM1 is N/A, since a structured process is required to authorize the processing of their Personal Data (PD) prior to its collection that:
▪ Uses plain language and provide examples to illustrate the potential data privacy risks of the authorization; and
▪ Provides a means for users to decline the authorization.
| Privacy (PRI) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• Privacy management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices.
• The data privacy program is developed to work with IT and cybersecurity staff to ensure that applicable statutory, regulatory and contractual data privacy obligations for Personal Data (PD) are properly identified and implemented across the enterprise.
• IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for data privacy management.
• A qualified individual is formally assigned as the Chief Privacy Officer (CPO), or similar role, to lead the organization’s data privacy program. This individual may be assigned to multiple duties, including that as a Data Protection Officer (DPO).
• The CPO, or similar role, identifies “data privacy principles” that systems, applications, services, processes and third-parties must adhere to, based on leading data privacy practices. | Privacy (PRI) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
• A Privacy program, run by a Chief Privacy Officer (CPO), or similar role, ensures that applicable statutory, regulatory and contractual data privacy obligations are properly identified and implemented to limit and secure Personal Data (PD) that the organization stores, transmits and processes.
• A data privacy team oversees the centralized-management of physical security controls across the enterprise.
• Data Protection Officers (DPOs) are assigned to work closely with business units and project teams to ensure data privacy principles are being implemented.
• CPO and DPO determine and document the legal authority that permits the collection, use, maintenance and sharing of PD, either generally or in support of a specific program or system need.
• As part of the organization’s data privacy program, the CPO publishes a clear set of “data privacy principles”, based on leading data privacy practices, that systems, applications, services, processes and third-parties must adhere to.
• A Project Management Office (PMO), or project management function, ensures both cybersecurity & data privacy principles are identified and implemented within ongoing or planned projects. | Privacy (PRI) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties.
▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes. | See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to authorize the processing of their Personal Data (PD) prior to its collection that:
▪ Uses plain language and provide examples to illustrate the potential data privacy risks of the authorization; and
▪ Provides a means for users to decline the authorization.
| P2.0
P2.1
P3.2 | P2.1-POF1
P2.1-POF2
P2.1-POF3
P2.1-POF6
P3.2-POF2 | null | null | null | null | null | null | null | null | null | null | 3.2.1
3.2.2
3.2.3
3.2.4 | null | null | null | null | null | 18.1.4 | 5.33 | 18.1.4 | A.1.1 | 7.2.3
7.2.4
7.3.4
7.3.5
8.5.7 | 5.2 | null | null | null | null | null | null | CT.PO-P1
CT.PO-P3 | null | null | null | IP-1 | null | null | null | PT-4 | PT-4 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | P.6.1.1 | null | null | null | null | null | null | EF:SG1.SP2
KIM:SG2.SP1
OTA:SG1.SP2 | null | null | null | null | null | null | null | null | IP-1 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | § 1232g | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Principle 2 | null | null | null | null | null | null | null | null | null | 7002(e)
7002(f)
7004(a)
7004(a)(1)
7004(a)(2)
7004(a)(2)(a)
7004(a)(2)(b)
7004(a)(2)(c)
7004(a)(3)
7004(a)(3)(a)
7004(a)(3)(b)
7004(a)(3)(c)
7004(a)(4)
7004(a)(4)(a)
7004(a)(4)(b)
7004(a)(5)
7004(a)(5)(a)
7004(a)(5)(b)
7004(a)(5)(c)
7004(b)
7004(c)
7010(c)
7028(a)
7028(b) | null | 6-1-1306(1)
6-1-1306(1)(a)(I)(A)
6-1-1306(1)(a)(I)(B)
6-1-1306(1)(a)(I)(C)
6-1-1306(1)(a)(II)
6-1-1306(1)(a)(III)
6-1-1306(1)(a)(IV)(A)
6-1-1306(1)(a)(IV)(B)
6-1-1306(1)(a)(IV)(C) | Sec 15(b)(3) | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 59.1-577.A.5
59.1-577.A.5(i)
59.1-577.A.5(ii)
59.1-577.A.5(iii) | null | null | null | Art 8
Art 9 | Art 6.1
Art 7.1
Art 7.2
Art 7.3
Art 7.4
Art 8.1
Art 8.2
Art 12.6
Art 14.3 | null | null | Principle 2.2.a(i)
Principle 2.2.a(ii)
Principle 2.2.b
Principle 2.2.c
Principle 2.2.c(i)
Principle 2.2.c(ii) | Sec 8 | Art 4-7 | Art 5 | null | null | Art 7 | Sec 4a
Sec 11 | null | null | Art 5 | Sec 6 | Sec 2 | null | null | Sec 23
Sec 24 | 32(1)
32(4) | null | Sec 8 | 2.2(a)
2.3(2)
2.3(2)(a)
2.3(2)(b)
2.3(2)(c)
2.3(2)(d)
2.3(2)(e) | null | Art 23 | Art 6 | Article 4
Article 5.2
Article 10 | Art 6
Art 9 | null | null | null | null | null | Article 12.1
Article 15
Article 31
Article 31.1
Article 31.2
Article 31.3
Article 31.4 | null | Sec 11 | Art 8
Art 12 | null | Sec 10 | null | Art 10 | Sec 9 | null | null | null | null | Article 6(1)(a)
Article 7(1)
Article 7(2)
Article 7(3)
Article 7(4)
Article 8(1)
Article 8(2)
Article 8(3) | null | null | null | APP Part 3 | APP 3 | null | null | null | null | null | null | Article 13(1)
Article 14
Article 23
Article 27
Article 29
Article 30
Article 44 | null | Sec 5 | null | Article 16(1)
Article 16(3)(i)
Article 16(3)(ii)
Article 16(3)(iii)
Article 16(3)(iv)
Article 24(1)
Article 24(2) | 18.1.4 | Sec 7 | null | null | null | Sec 19 | Sec 13 | null | null | Art 3
Art 4
Art 22 | Art 5 | Art 5 | Art 5.1
Art 5.2 | null | null | Art 7.1
Art 15 | null | null | Sec 6
Sec 7
Principle 3 | Art 4 | Art 4 | Art 5 | Art 8
Art 10 | Art 5
Art 13
Art 14 | Art 5
Art 9
Art 13 | null | null | null | x | null | null | x | R-AM-3
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-GV-1
R-GV-2
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-IR-4
R-SA-2 | null | null | null | null | null | null | R-AM-3 | null | null | null | null | null | R-EX-1 | R-EX-2 | R-EX-3 | R-EX-4 | R-EX-5 | null | null | R-GV-1 | R-GV-2 | null | R-GV-4 | R-GV-5 | R-GV-6 | R-GV-7 | null | null | null | null | R-IR-4 | null | R-SA-2 | NT-7
MT-1
MT-2
MT-7
MT-8
MT-9
MT-11
MT-12
MT-13
MT-14
MT-15 | null | null | null | null | null | null | NT-7 | null | null | null | null | null | null | null | MT-1 | MT-2 | null | null | null | null | MT-7 | MT-8 | MT-9 | null | MT-11 | MT-12 | MT-13 | MT-14 | MT-15 | null | null |