SCF Domain
stringclasses
34 values
SCF Control
stringlengths
7
85
SCF #
stringlengths
6
9
Secure Controls Framework (SCF) Control Description
stringlengths
49
657
Methods To Comply With SCF Controls
stringlengths
6
863
Evidence Request List (ERL) #
stringclasses
181 values
SCF Control Question
stringlengths
51
659
Relative Control Weighting
int64
1
10
Function Grouping
stringclasses
5 values
SCRM Tier 1 Strategic
stringclasses
2 values
SCRM Tier 2 Operational
stringclasses
2 values
SCRM Tier 3 Tactical
stringclasses
2 values
SP-CMM 0 Not Performed
stringlengths
69
677
SP-CMM 1 Performed Informally
stringlengths
43
2.02k
SP-CMM 2 Planned & Tracked
stringlengths
43
3.33k
SP-CMM 3 Well Defined
stringlengths
43
5.16k
SP-CMM 4 Quantitatively Controlled
stringlengths
43
1.35k
SP-CMM 5 Continuously Improving
stringlengths
43
725
AICPA TSC 2017 (Controls)
stringclasses
116 values
AICPA TSC 2017 (Points of Focus)
stringclasses
171 values
BSI Standard 200-1
stringclasses
18 values
CIS CSC v8.0
stringclasses
158 values
CIS CSC v8.0 IG1
stringclasses
57 values
CIS CSC v8.0 IG2
stringclasses
136 values
CIS CSC v8.0 IG3
stringclasses
154 values
COBIT 2019
stringclasses
101 values
COSO v2017
stringclasses
45 values
CSA CCM v4
stringclasses
229 values
CSA IoT SCF v2
stringclasses
168 values
ENISA v2.0
stringclasses
33 values
GAPP
stringclasses
36 values
IEC 62443-4-2
stringclasses
104 values
ISO/SAE 21434 v2021
stringclasses
69 values
ISO 22301 v2019
stringclasses
25 values
ISO 27001 v2013
stringclasses
30 values
ISO 27001 v2022
stringclasses
35 values
ISO 27002 v2013
stringclasses
142 values
ISO 27002 v2022
stringclasses
166 values
ISO 27017 v2015
stringclasses
158 values
ISO 27018 v2014
stringclasses
16 values
ISO 27701 v2019
stringclasses
161 values
ISO 29100 v2011
stringclasses
15 values
ISO 31000 v2009
stringclasses
7 values
ISO 31010 v2009
stringclasses
16 values
MITRE ATT&CK 10
stringclasses
100 values
MPA Content Security Program v5.1
stringclasses
98 values
NIAC Insurance Data Security Model Law (MDL-668)
stringclasses
41 values
NIST AI RMF AI 100-1 v1.0
stringclasses
114 values
NIST Privacy Framework v1.0
stringclasses
114 values
NIST SSDF
stringclasses
29 values
NIST 800-37 rev 2
stringclasses
32 values
NIST 800-39
stringclasses
9 values
NIST 800-53 rev4
stringlengths
4
47
NIST 800-53 rev4 (low)
stringclasses
121 values
NIST 800-53 rev4 (moderate)
stringlengths
4
22
NIST 800-53 rev4 (high)
stringlengths
4
23
NIST 800-53 rev5
stringlengths
4
99
NIST 800-53B rev5 (privacy)
stringclasses
85 values
NIST 800-53B rev5 (low)
stringclasses
151 values
NIST 800-53B rev5 (moderate)
stringlengths
4
40
NIST 800-53B rev5 (high)
stringlengths
4
40
NIST 800-53 rev5 (NOC)
stringlengths
4
41
NIST 800-63B (partial mapping)
stringclasses
5 values
NIST 800-82 rev3 LOW OT Overlay
stringclasses
162 values
NIST 800-82 rev3 MODERATE OT Overlay
stringlengths
4
40
NIST 800-82 rev3 HIGH OT Overlay
stringlengths
4
40
NIST 800-160
stringclasses
23 values
NIST 800-161 rev 1
stringlengths
4
34
NIST 800-161 rev 1 C-SCRM Baseline
stringclasses
95 values
NIST 800-161 rev 1 Flow Down
stringclasses
71 values
NIST 800-161 rev 1 Level 1
stringclasses
69 values
NIST 800-161 rev 1 Level 2
stringclasses
218 values
NIST 800-161 rev 1 Level 3
stringclasses
234 values
NIST 800-171 rev 2
stringclasses
172 values
NIST 800-171 rev 3 FPD
stringlengths
5
141
NIST 800-171A
stringclasses
114 values
NIST 800-171A rev 3 IPD
stringclasses
167 values
NIST 800-172
stringclasses
46 values
NIST 800-218 v1.1
stringclasses
29 values
NIST CSF v1.1
stringclasses
97 values
NIST CSF v2.0 IPD
stringclasses
127 values
OWASP Top 10 v2021
stringclasses
20 values
PCIDSS v3.2
stringclasses
135 values
PCIDSS v4.0
stringlengths
3
156
PCIDSS v4.0 SAQ A
stringclasses
30 values
PCIDSS v4.0 SAQ A-EP
stringclasses
141 values
PCIDSS v4.0 SAQ B
stringclasses
26 values
PCIDSS v4.0 SAQ B-IP
stringclasses
55 values
PCIDSS v4.0 SAQ C
stringclasses
132 values
PCIDSS v4.0 SAQ C-VT
stringclasses
53 values
PCIDSS v4.0 SAQ D Merchant
stringclasses
213 values
PCIDSS v4.0 SAQ D Service Provider
stringclasses
231 values
PCIDSS v4.0 SAQ P2PE
stringclasses
24 values
Shared Assessments SIG 2023
stringlengths
3
43
SWIFT CSF v2023
stringclasses
55 values
TISAX ISA v5.1.0
stringclasses
88 values
UL 2900-1
stringclasses
36 values
UN R155
stringclasses
19 values
UN ECE WP.29
stringclasses
19 values
US C2M2 v2.1
stringclasses
152 values
US CERT RMM v1.2
stringclasses
212 values
US CISA CPG v2022
stringclasses
44 values
US CJIS Security Policy 5.9
stringclasses
99 values
US CMMC 2.0 Level 1
stringclasses
17 values
US CMMC 2.0 Level 2
stringclasses
110 values
US CMMC 2.0 Level 3
stringclasses
139 values
US CMMC 2.1 (draft) Level 1
stringclasses
18 values
US CMMC 2.1 (draft) Level 2
stringclasses
110 values
US CMMC 2.1 (draft) Level 3
stringclasses
141 values
US CMS MARS-E v2.0
stringlengths
4
28
US COPPA
float64
6.5k
6.5k
US DFARS Cybersecurity 252.204-70xx
stringclasses
19 values
US FACTA
stringclasses
2 values
US FAR 52.204-21
stringclasses
22 values
US FAR 52.204-27
stringclasses
2 values
US FAR Section 889
stringclasses
1 value
US FDA 21 CFR Part 11
stringclasses
27 values
US FedRAMP R4
stringlengths
4
24
US FedRAMP R4 (low)
stringclasses
130 values
US FedRAMP R4 (moderate)
stringlengths
4
23
US FedRAMP R4 (high)
stringlengths
4
24
US FedRAMP R4 (LI-SaaS)
stringclasses
131 values
US FedRAMP R5
stringlengths
4
24
US FedRAMP R5 (low)
stringclasses
151 values
US FedRAMP R5 (moderate)
stringlengths
4
23
US FedRAMP R5 (high)
stringlengths
4
24
US FedRAMP R5 (LI-SaaS)
stringclasses
151 values
US FERPA
stringclasses
3 values
US FFIEC
stringclasses
68 values
US FINRA
stringclasses
3 values
US FTC Act
stringclasses
1 value
US GLBA CFR 314
stringclasses
41 values
US HIPAA
stringclasses
54 values
HIPAA - HICP Small Practice
stringclasses
31 values
HIPAA - HICP Medium Practice
stringclasses
59 values
HIPAA - HICP Large Practice
stringclasses
112 values
US IRS 1075
stringlengths
3
165
US ITAR Part 120 (limited)
stringclasses
9 values
US NERC CIP
stringclasses
35 values
US NISPOM
stringclasses
72 values
US NNPI (unclass)
stringclasses
61 values
US NSTC NSPM-33
stringclasses
15 values
US Privacy Shield
stringclasses
7 values
US SEC Cybersecurity Rule
stringclasses
12 values
US SOX
stringclasses
1 value
US SSA EIESR v8.0
stringclasses
22 values
US StateRAMP Low Category 1
stringclasses
107 values
US StateRAMP Low+ Category 2
stringclasses
167 values
US StateRAMP Moderate Category 3
stringlengths
4
24
US TSA / DHS 1580/82-2022-01
stringclasses
43 values
US - AK PIPA
stringclasses
8 values
US - CA SB327
stringclasses
4 values
US-CA CPRA (Nov 2022)
stringclasses
36 values
US - CA SB1386
stringclasses
1 value
US - CO Colorado Privacy Act
stringclasses
36 values
US - IL BIPA
stringclasses
9 values
US - IL IPA
stringclasses
4 values
US - IL PIPA
stringclasses
6 values
US-MA 201 CMR 17.00
stringclasses
27 values
US - NV SB220
stringclasses
3 values
US - NY DFS 23 NYCRR500
float64
500
500
US - NY SHIELD Act S5575B
stringclasses
15 values
US - OR 646A
stringclasses
21 values
US - SC Insurance Data Security Act
stringclasses
41 values
US - TX BC521
stringclasses
3 values
US-TX Cybersecurity Act
stringclasses
13 values
US-TX DIR Control Standards 2.0
stringclasses
155 values
US-TX TX-RAMP Level 1
stringclasses
120 values
US-TX TX-RAMP Level 2
stringlengths
4
23
US-TX SB820
stringclasses
5 values
US-VA CDPA 2023
stringclasses
24 values
US-VT Act 171 of 2018
stringclasses
32 values
EMEA EU EBA GL/2019/04
stringclasses
93 values
EMEA EU DORA
stringclasses
60 values
EMEA EU ePrivacy (draft)
stringclasses
15 values
EMEA EU GDPR
stringclasses
57 values
EMEA EU NIS2
stringclasses
21 values
EMEA EU PSD2
stringclasses
10 values
EMEA EU EU-US Data Privacy Framework
stringclasses
23 values
EMEA Austria
stringclasses
10 values
EMEA Belgium
stringclasses
9 values
EMEA Czech Republic
stringclasses
14 values
EMEA Denmark
stringclasses
11 values
EMEA Finland
stringclasses
7 values
EMEA France
stringclasses
9 values
EMEA Germany
stringclasses
11 values
EMEA Germany Banking Supervisory Requirements for IT (BAIT)
stringclasses
57 values
EMEA Germany C5-2020
stringclasses
152 values
EMEA Greece
stringclasses
9 values
EMEA Hungary
stringclasses
12 values
EMEA Ireland
stringclasses
3 values
EMEA Israel CDMO v1.0
stringlengths
3
89
EMEA Israel
stringclasses
6 values
EMEA Italy
stringclasses
15 values
EMEA Kenya DPA 2019
stringclasses
38 values
EMEA Luxembourg
stringclasses
4 values
EMEA Netherlands
stringclasses
12 values
EMEA Nigeria DPR 2019
stringclasses
24 values
EMEA Norway
stringclasses
12 values
EMEA Poland
stringclasses
11 values
EMEA Portugal
stringclasses
11 values
EMEA Qatar PDPPL
stringclasses
37 values
EMEA Russia
stringclasses
13 values
EMEA Saudi Arabia Critical Security Controls
stringclasses
105 values
EMEA Saudi Arabia SACS-002
stringclasses
96 values
EMEA Saudi Arabia SAMA CSFv1.0
stringclasses
36 values
EMEA Saudi Arabia ECC-12018
stringclasses
148 values
EMEA Saudi Arabia OTCC-1 2022
stringclasses
133 values
EMEA Serbia 87/2018
stringclasses
46 values
EMEA Slovak Republic
stringclasses
2 values
EMEA South Africa
stringclasses
45 values
EMEA Spain
stringclasses
10 values
EMEA Spain CCN-STIC 825
stringclasses
71 values
EMEA Sweden
stringclasses
11 values
EMEA Switzerland
stringclasses
8 values
EMEA Turkey
stringclasses
8 values
EMEA UAE
stringclasses
9 values
EMEA UK CAF v3.1
stringclasses
75 values
EMEA UK CAP 1850
stringclasses
16 values
EMEA UK Cyber Essentials
float64
1
5
EMEA UK DPA
stringclasses
7 values
EMEA UK GDPR
stringclasses
38 values
APAC Australia Essential 8 ML 1
stringclasses
21 values
APAC Australia Essential 8 ML 2
stringclasses
30 values
APAC Australia Essential 8 ML 3
stringclasses
40 values
APAC Australia Privacy Act
stringclasses
11 values
APAC Australian Privacy Principles
stringclasses
18 values
APAC Australia ISM 2022
stringlengths
4
214
APAC Australia IoT Code of Practice
stringclasses
11 values
APAC Australia Prudential Standard CPS230
stringclasses
32 values
APAC Australia Prudential Standard CPS234
stringclasses
34 values
APAC China Data Security Law (DSL)
stringclasses
6 values
APAC China DNSIP
stringclasses
3 values
APAC China Privacy Law
stringclasses
57 values
APAC Hong Kong
stringclasses
8 values
APAC India ITR
stringclasses
4 values
APAC Indonesia
stringclasses
7 values
APAC Japan APPI
stringclasses
31 values
APAC Japan ISMAP
stringclasses
188 values
APAC Malaysia
stringclasses
8 values
APAC New Zealand Health ISF
stringclasses
22 values
APAC New Zealand NZISM 3.6
stringlengths
10
1.15k
APAC New Zealand Privacy Act of 2020
stringclasses
12 values
APAC Philippines
stringclasses
12 values
APAC Singapore
stringclasses
15 values
APAC Singapore Cyber Hygiene Practice
stringclasses
12 values
APAC Singapore MAS TRM 2021
stringclasses
166 values
APAC South Korea
stringclasses
22 values
APAC Taiwan
stringclasses
7 values
Americas Argentina
stringclasses
14 values
Americas Argentina Reg 132-2018
stringclasses
24 values
Americas Bahamas
stringclasses
6 values
Americas Bermuda BMACCC
stringclasses
36 values
Americas Brazil LGPD
stringclasses
27 values
Americas Canada CSAG
stringclasses
75 values
Americas Canada OSFI B-13
stringclasses
60 values
Americas Canada PIPEDA
stringclasses
14 values
Americas Chile
stringclasses
9 values
Americas Colombia
stringclasses
10 values
Americas Costa Rica
stringclasses
8 values
Americas Mexico
stringclasses
14 values
Americas Peru
stringclasses
14 values
Americas Uruguay
stringclasses
17 values
Minimum Security Requirements MCR + DSR
float64
Identify Minimum Compliance Requirements (MCR)
float64
Identify Discretionary Security Requirements (DSR)
float64
SCF-B Business Mergers & Acquisitions
stringclasses
1 value
SCF-I Cyber Insurance Duty of Care
stringclasses
23 values
SCF-E Embedded Technology
stringclasses
1 value
SCF-R Ransomware Protection
stringclasses
1 value
Risk Threat Summary
stringlengths
13
230
Risk R-AC-1
stringclasses
1 value
Risk R-AC-2
stringclasses
1 value
Risk R-AC-3
stringclasses
1 value
Risk R-AC-4
stringclasses
1 value
Risk R-AM-1
stringclasses
1 value
Risk R-AM-2
stringclasses
2 values
Risk R-AM-3
stringclasses
1 value
Risk R-BC-1
stringclasses
2 values
Risk R-BC-2
stringclasses
2 values
Risk R-BC-3
stringclasses
2 values
Risk R-BC-4
stringclasses
2 values
Risk R-BC-5
stringclasses
2 values
Risk R-EX-1
stringclasses
2 values
Risk R-EX-2
stringclasses
2 values
Risk R-EX-3
stringclasses
2 values
Risk R-EX-4
stringclasses
2 values
Risk R-EX-5
stringclasses
2 values
Risk R-EX-6
stringclasses
2 values
Risk R-EX-7
stringclasses
2 values
Risk R-GV-1
stringclasses
2 values
Risk R-GV-2
stringclasses
2 values
Risk R-GV-3
stringclasses
2 values
Risk R-GV-4
stringclasses
2 values
Risk R-GV-5
stringclasses
2 values
Risk R-GV-6
stringclasses
2 values
Risk R-GV-7
stringclasses
2 values
Risk R-GV-8
stringclasses
2 values
Risk R-IR-1
stringclasses
2 values
Risk R-IR-2
stringclasses
2 values
Risk R-IR-3
stringclasses
2 values
Risk R-IR-4
stringclasses
1 value
Risk R-SA-1
stringclasses
2 values
Risk R-SA-2
stringclasses
2 values
Control Threat Summary
stringclasses
69 values
Threat NT-1
stringclasses
1 value
Threat NT-2
stringclasses
1 value
Threat NT-3
stringclasses
1 value
Threat NT-4
stringclasses
1 value
Threat NT-5
stringclasses
1 value
Threat NT-6
stringclasses
1 value
Threat NT-7
stringclasses
1 value
Threat NT-8
stringclasses
1 value
Threat NT-9
stringclasses
1 value
Threat NT-10
stringclasses
1 value
Threat NT-11
stringclasses
1 value
Threat NT-12
stringclasses
1 value
Threat NT-13
stringclasses
1 value
Threat NT-14
stringclasses
1 value
Threat MT-1
stringclasses
1 value
Threat MT-2
stringclasses
1 value
Threat MT-3
stringclasses
1 value
Threat MT-4
stringclasses
1 value
Threat MT-5
stringclasses
1 value
Threat MT-6
stringclasses
1 value
Threat MT-7
stringclasses
1 value
Threat MT-8
stringclasses
1 value
Threat MT-9
stringclasses
1 value
Threat MT-10
stringclasses
1 value
Threat MT-11
stringclasses
1 value
Threat MT-12
stringclasses
1 value
Threat MT-13
stringclasses
1 value
Threat MT-14
stringclasses
1 value
Threat MT-15
stringclasses
1 value
Threat MT-16
stringclasses
1 value
Errata 2023.4
stringclasses
30 values
Data Privacy
Tailored Consent
PRI-03.1
Mechanisms exist to allow data subjects to modify the use permissions to selected attributes of their Personal Data (PD).
null
null
Does the organization allow data subjects to modify the use permissions to selected attributes of their Personal Data (PD)?
1
Identify
null
X
null
There is no evidence of a capability to allow data subjects to modify the use permissions to selected attributes of their Personal Data (PD).
SP-CMM1 is N/A, since a structured process is required to allow data subjects to modify the use permissions to selected attributes of their Personal Data (PD).
SP-CMM2 is N/A, since a well-defined process is required to allow data subjects to modify the use permissions to selected attributes of their Personal Data (PD).
Privacy (PRI) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • A Privacy program, run by a Chief Privacy Officer (CPO), or similar role, ensures that applicable statutory, regulatory and contractual data privacy obligations are properly identified and implemented to limit and secure Personal Data (PD) that the organization stores, transmits and processes. • A data privacy team oversees the centralized-management of physical security controls across the enterprise. • Data Protection Officers (DPOs) are assigned to work closely with business units and project teams to ensure data privacy principles are being implemented. • CPO and DPO determine and document the legal authority that permits the collection, use, maintenance and sharing of PD, either generally or in support of a specific program or system need. • As part of the organization’s data privacy program, the CPO publishes a clear set of “data privacy principles”, based on leading data privacy practices, that systems, applications, services, processes and third-parties must adhere to. • A Project Management Office (PMO), or project management function, ensures both cybersecurity & data privacy principles are identified and implemented within ongoing or planned projects.
Privacy (PRI) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to allow data subjects to modify the use permissions to selected attributes of their Personal Data (PD).
null
P2.1-POF5 P3.2-POF1
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
7.3.4
null
null
null
null
null
null
null
CT.PO-P3
null
null
null
IP-(1)
null
null
null
PT-4(1)
null
null
null
null
PT-4(1)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
P.5.4.3
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
IP-(1)
6,502
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
7014(a) 7014(b) 7014(c) 7014(d) 7014(e) 7014(e)(1) 7014(e)(2) 7014(f)(1) 7014(f)(2) 7014(g)(1) 7014(g)(2) 7014(h)
null
6-1-1306(1) 6-1-1306(1)(a)(I)(A) 6-1-1306(1)(a)(I)(B) 6-1-1306(1)(a)(I)(C) 6-1-1306(1)(a)(II) 6-1-1306(1)(a)(III) 6-1-1306(1)(a)(IV)(A) 6-1-1306(1)(a)(IV)(B) 6-1-1306(1)(a)(IV)(C)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Art 8 Art 10
Art 7.1 Art 7.2 Art 7.3 Art 7.4 Art 12.2 Art 12.3 Art 12.4 Art 22.1 Art 22.2 Art 22.3 Art 22.4
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Article 31 Article 31.1 Article 31.2 Article 31.3 Article 31.4
null
Sec 11
null
null
null
null
null
null
null
null
null
null
Article 7(3) Article 18(1)(a) Article 18(1)(b) Article 18(1)(c) Article 18(1)(d)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Art 5
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
x
null
null
null
R-AM-3 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-GV-1 R-GV-2 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-IR-4 R-SA-2
null
null
null
null
null
null
R-AM-3
null
null
null
null
null
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
null
null
R-GV-1
R-GV-2
null
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
null
null
null
R-IR-4
null
R-SA-2
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Data Privacy
Just-In-Time Notice & Updated Consent
PRI-03.2
Mechanisms exist to present authorizations to process Personal Data (PD) in conjunction with the data action, when: ▪ The original circumstances under which an individual gave consent have changed; or ▪ A significant amount of time has passed since an individual gave consent.
null
null
Does the organization present authorizations to process Personal Data (PD) in conjunction with the data action, when: ▪ The original circumstances under which an individual gave consent have changed; or ▪ A significant amount of time has passed since an individual gave consent?
1
Identify
null
X
null
There is no evidence of a capability to present authorizations to process Personal Data (PD) in conjunction with the data action, when: ▪ The original circumstances under which an individual gave consent have changed; or ▪ A significant amount of time has passed since an individual gave consent.
SP-CMM1 is N/A, since a structured process is required to present authorizations to process Personal Data (PD) in conjunction with the data action, when: ▪ The original circumstances under which an individual gave consent have changed; or ▪ A significant amount of time has passed since an individual gave consent.
SP-CMM2 is N/A, since a well-defined process is required to present authorizations to process Personal Data (PD) in conjunction with the data action, when: ▪ The original circumstances under which an individual gave consent have changed; or ▪ A significant amount of time has passed since an individual gave consent.
Privacy (PRI) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • A Privacy program, run by a Chief Privacy Officer (CPO), or similar role, ensures that applicable statutory, regulatory and contractual data privacy obligations are properly identified and implemented to limit and secure Personal Data (PD) that the organization stores, transmits and processes. • A data privacy team oversees the centralized-management of physical security controls across the enterprise. • Data Protection Officers (DPOs) are assigned to work closely with business units and project teams to ensure data privacy principles are being implemented. • CPO and DPO determine and document the legal authority that permits the collection, use, maintenance and sharing of PD, either generally or in support of a specific program or system need. • As part of the organization’s data privacy program, the CPO publishes a clear set of “data privacy principles”, based on leading data privacy practices, that systems, applications, services, processes and third-parties must adhere to. • A Project Management Office (PMO), or project management function, ensures both cybersecurity & data privacy principles are identified and implemented within ongoing or planned projects.
Privacy (PRI) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to present authorizations to process Personal Data (PD) in conjunction with the data action, when: ▪ The original circumstances under which an individual gave consent have changed; or ▪ A significant amount of time has passed since an individual gave consent.
P2.1 P3.2
P2.1-POF4
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
7.3.4
null
null
null
null
null
null
null
CT.PO-P1 CT.PO-P3
null
null
null
null
null
null
null
PT-4(2) PT-5(1)
null
null
null
null
PT-4(2) PT-5(1)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
P.5.4.3
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Principle 2
null
null
null
null
null
null
null
null
null
7002(f) 7028(a) 7028(b)
null
6-1-1306(1) 6-1-1306(1)(a)(I)(A) 6-1-1306(1)(a)(I)(B) 6-1-1306(1)(a)(I)(C) 6-1-1306(1)(a)(II) 6-1-1306(1)(a)(III) 6-1-1306(1)(a)(IV)(A) 6-1-1306(1)(a)(IV)(B) 6-1-1306(1)(a)(IV)(C)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Art 7.1 Art 7.2 Art 7.3 Art 7.4 Art 8.1 Art 8.2 Art 12.2 Art 12.3 Art 12.4 Art 13.3 Art 14.3 Art 21.4
null
null
null
Sec 8
null
Art 16
null
null
null
null
null
null
null
null
null
null
null
null
32(2) 32(3)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Sec 15
null
null
null
null
null
null
null
null
null
null
Article 7(1) Article 13(3) Article 21(1) Article 21(2) Article 21(3) Article 21(4) Article 21(5) Article 21(6)
null
null
null
null
APP 5
null
null
null
null
null
null
Article 14 Article 22 Article 23 Article 27
null
null
null
Article 16(2) Article 16(3)(i) Article 16(3)(ii) Article 16(3)(iii) Article 16(3)(iv)
null
null
null
null
null
null
null
null
null
Art 22
Art 5
Art 5
Art 27.3
null
null
null
null
null
Sec 6 Sec 7 Principle 3
null
null
null
Art 7
null
Art 5 Art 9
null
null
null
x
null
null
null
R-AM-3 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-GV-1 R-GV-2 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-IR-4 R-SA-2
null
null
null
null
null
null
R-AM-3
null
null
null
null
null
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
null
null
R-GV-1
R-GV-2
null
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
null
null
null
R-IR-4
null
R-SA-2
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Data Privacy
Prohibition Of Selling or Sharing Personal Data
PRI-03.3
Mechanisms exist to prevent the sale or sharing of Personal Data (PD) when instructed by the data subject.
null
null
Does the organization prevent the sale or sharing of Personal Data (PD) when instructed by the data subject?
5
Identify
null
X
null
There is no evidence of a capability to prevent the sale or sharing of Personal Data (PD) when instructed by the data subject.
SP-CMM1 is N/A, since a structured process is required to prevent the sale or sharing of Personal Data (PD) when instructed by the data subject.
Privacy (PRI) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Privacy management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • The data privacy program is developed to work with IT and cybersecurity staff to ensure that applicable statutory, regulatory and contractual data privacy obligations for Personal Data (PD) are properly identified and implemented across the enterprise. • IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for data privacy management. • A qualified individual is formally assigned as the Chief Privacy Officer (CPO), or similar role, to lead the organization’s data privacy program. This individual may be assigned to multiple duties, including that as a Data Protection Officer (DPO). • The CPO, or similar role, identifies “data privacy principles” that systems, applications, services, processes and third-parties must adhere to, based on leading data privacy practices. • Administrative processes and technologies collect, store, processes, transmit share or use PD only for the purposes identified in the data privacy notice. • The DPO reviews the management of PD to ensure that controls exist to prohibit the sale of PD when instructed by the data principle.
Privacy (PRI) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • A Privacy program, run by a Chief Privacy Officer (CPO), or similar role, ensures that applicable statutory, regulatory and contractual data privacy obligations are properly identified and implemented to limit and secure Personal Data (PD) that the organization stores, transmits and processes. • A data privacy team oversees the centralized-management of physical security controls across the enterprise. • Data Protection Officers (DPOs) are assigned to work closely with business units and project teams to ensure data privacy principles are being implemented. • CPO and DPO determine and document the legal authority that permits the collection, use, maintenance and sharing of PD, either generally or in support of a specific program or system need. • As part of the organization’s data privacy program, the CPO publishes a clear set of “data privacy principles”, based on leading data privacy practices, that systems, applications, services, processes and third-parties must adhere to. • A Project Management Office (PMO), or project management function, ensures both cybersecurity & data privacy principles are identified and implemented within ongoing or planned projects. • Administrative processes and technologies collect, store, processes, transmit share or use PD only for the purposes identified in the data privacy notice. • The DPO reviews the management of PD to ensure that controls exist to prohibit the sale of PD when instructed by the data principle.
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to prevent the sale or sharing of Personal Data (PD) when instructed by the data subject.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to prevent the sale or sharing of Personal Data (PD) when instructed by the data subject.
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
CT.PO-P1 CT.PO-P3
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
P.6.1.7
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
7010(d) 7013(a) 7013(b) 7013(c) 7013(d) 7013(e) 7013(e)(1) 7013(e)(2) 7013(e)(3) 7013(e)(3)(A) 7013(e)(3)(B) 7013(f)(1) 7013(f)(2) 7013(g)(1) 7013(g)(1) 7013(h) 7026(a) 7026(a)(1) 7026(a)(2) 7026(a)(3) 7026(a)(4) 7026(b) 7026(c) 7026(d) 7026(e) 7026(f)(1) 7026(f)(2) 7026(g) 7026(h) 7026(i) 7026(j) 7026(k)
null
6-1-1306(1) 6-1-1306(1)(a)(I)(A) 6-1-1306(1)(a)(I)(B) 6-1-1306(1)(a)(I)(C) 6-1-1306(1)(a)(II) 6-1-1306(1)(a)(III) 6-1-1306(1)(a)(IV)(A) 6-1-1306(1)(a)(IV)(B) 6-1-1306(1)(a)(IV)(C)
Sec 15(c)
null
null
null
Sec 2.3
null
null
null
null
null
null
null
null
null
null
59.1-577.A.5(ii) 59.1-578.D
null
null
null
null
null
null
null
Principle 2.2.c Principle 2.2.c(i) Principle 2.2.c(ii)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Article 37
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
APP 7
null
null
null
null
null
null
Article 10
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
R-AM-3 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-GV-1 R-GV-2 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-IR-4 R-SA-2
null
null
null
null
null
null
R-AM-3
null
null
null
null
null
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
null
null
R-GV-1
R-GV-2
null
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
null
null
null
R-IR-4
null
R-SA-2
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Data Privacy
Revoke Consent
PRI-03.4
Mechanisms exist to allow data subjects to revoke consent to the processing of their Personal Data (PD).
null
null
Does the organization allow data subjects to revoke consent to the processing of their Personal Data (PD)?
3
Respond
null
X
null
There is no evidence of a capability to allow data subjects to revoke consent to the processing of their Personal Data (PD).
SP-CMM1 is N/A, since a structured process is required to allow data subjects to revoke consent to the processing of their Personal Data (PD).
Privacy (PRI) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Privacy management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • The data privacy program is developed to work with IT and cybersecurity staff to ensure that applicable statutory, regulatory and contractual data privacy obligations for Personal Data (PD) are properly identified and implemented across the enterprise. • IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for data privacy management. • A qualified individual is formally assigned as the Chief Privacy Officer (CPO), or similar role, to lead the organization’s data privacy program. This individual may be assigned to multiple duties, including that as a Data Protection Officer (DPO). • The CPO, or similar role, identifies “data privacy principles” that systems, applications, services, processes and third-parties must adhere to, based on leading data privacy practices.
Privacy (PRI) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • A Privacy program, run by a Chief Privacy Officer (CPO), or similar role, ensures that applicable statutory, regulatory and contractual data privacy obligations are properly identified and implemented to limit and secure Personal Data (PD) that the organization stores, transmits and processes. • A data privacy team oversees the centralized-management of physical security controls across the enterprise. • Data Protection Officers (DPOs) are assigned to work closely with business units and project teams to ensure data privacy principles are being implemented. • CPO and DPO determine and document the legal authority that permits the collection, use, maintenance and sharing of PD, either generally or in support of a specific program or system need. • As part of the organization’s data privacy program, the CPO publishes a clear set of “data privacy principles”, based on leading data privacy practices, that systems, applications, services, processes and third-parties must adhere to. • A Project Management Office (PMO), or project management function, ensures both cybersecurity & data privacy principles are identified and implemented within ongoing or planned projects.
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to allow data subjects to revoke consent to the processing of their Personal Data (PD).
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to allow data subjects to revoke consent to the processing of their Personal Data (PD).
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
PT-4(3)
null
null
null
null
PT-4(3)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
P.5.4.3
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
7015(a) 7015(b) 7015(c)(1) 7015(c)(2)
null
6-1-1306(1) 6-1-1306(1)(a)(I)(A) 6-1-1306(1)(a)(I)(B) 6-1-1306(1)(a)(I)(C) 6-1-1306(1)(a)(II) 6-1-1306(1)(a)(III)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
26(c) 32(2) 32(3)
null
null
2.8 2.8(a) 2.8(b)
null
null
null
Article 5.1
null
null
null
null
null
null
Article 15 Article 37
null
null
null
null
null
null
null
null
null
null
null
null
Article 7(3) Article 21(1) Article 21(2) Article 21(3) Article 21(4) Article 21(5) Article 21(6)
null
null
null
null
null
null
null
null
null
null
null
Article 15
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
R-AM-3 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-GV-1 R-GV-2 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-IR-4 R-SA-2
null
null
null
null
null
null
R-AM-3
null
null
null
null
null
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
null
null
R-GV-1
R-GV-2
null
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
null
null
null
R-IR-4
null
R-SA-2
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Data Privacy
Product or Service Delivery Restrictions
PRI-03.5
Mechanisms exist to prohibit the refusal of products and/or services on the grounds that a data subject does not agree to the processing of Personal Data (PD) or withdraws consent.
- Privacy Program
null
Does the organization prohibit the refusal of products and/or services on the grounds that a data subject does not agree to the processing of Personal Data (PD) or withdraws consent?
7
Identify
null
X
X
There is no evidence of a capability to prohibit the refusal of products and/ or services on the grounds that a data subject does not agree to the processing of Personal Data (PD) or withdraws consent.
SP-CMM1 is N/A, since a structured process is required to prohibit the refusal of products and/ or services on the grounds that a data subject does not agree to the processing of Personal Data (PD) or withdraws consent.
SP-CMM2 is N/A, since a well-defined process is required to prohibit the refusal of products and/ or services on the grounds that a data subject does not agree to the processing of Personal Data (PD) or withdraws consent.
Privacy (PRI) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • A Privacy program, run by a Chief Privacy Officer (CPO), or similar role, ensures that applicable statutory, regulatory and contractual data privacy obligations are properly identified and implemented to limit and secure Personal Data (PD) that the organization stores, transmits and processes. • A data privacy team oversees the centralized-management of physical security controls across the enterprise. • Data Protection Officers (DPOs) are assigned to work closely with business units and project teams to ensure data privacy principles are being implemented. • CPO and DPO determine and document the legal authority that permits the collection, use, maintenance and sharing of PD, either generally or in support of a specific program or system need. • As part of the organization’s data privacy program, the CPO publishes a clear set of “data privacy principles”, based on leading data privacy practices, that systems, applications, services, processes and third-parties must adhere to. • A Project Management Office (PMO), or project management function, ensures both cybersecurity & data privacy principles are identified and implemented within ongoing or planned projects. • The PMO and DPO work with data/process owners to prohibit the refusal of products and/ or services on the grounds that a data subject does not agree to the processing of PD or withdraws consent.
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to prohibit the refusal of products and/ or services on the grounds that a data subject does not agree to the processing of Personal Data (PD) or withdraws consent.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to prohibit the refusal of products and/ or services on the grounds that a data subject does not agree to the processing of Personal Data (PD) or withdraws consent.
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
P.5.4.3
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
7016(a) 7016(b) 7016(c) 7016(d) 7016(d)(1) 7016(d)(2) 7016(d)(3) 7016(d)(4) 7016(d)(5) 7016(d)(5)(A) 7016(d)(5)(B) 7080(a) 7080(b) 7080(c) 7080(d)(1) 7080(d)(2) 7080(d)(3) 7080(d)(4) 7080(e) 7080(f) 7080(g)
null
6-1-1308(1)(d)
null
Sec 10(b)(2)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
32(4)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Article 16
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
R-AM-3 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-GV-1 R-GV-2 R-GV-4 R-GV-5 R-GV-6 R-GV-7
null
null
null
null
null
null
R-AM-3
null
null
null
null
null
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
null
null
R-GV-1
R-GV-2
null
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
null
null
null
null
null
null
MT-1 MT-2 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
null
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Data Privacy
Authorized Agent
PRI-03.6
Mechanisms exist to allow data subjects to authorize another person or entity, acting on the data subject's behalf, to make Personal Data (PD) processing decisions.
null
null
Does the organization allow data subjects to authorize another person or entity, acting on the data subject's behalf, to make Personal Data (PD) processing decisions?
6
Protect
null
null
X
There is no evidence of a capability to allow data subjects to authorize another pers on or entity, acting on the data subject's behalf, to make Personal Data (PD) processing decisions.
SP-CMM1 is N/A, since a structured process is required to allow data subjects to authorize another pers on or entity, acting on the data subject's behalf, to make Personal Data (PD) processing decisions.
SP-CMM2 is N/A, since a well-defined process is required to allow data subjects to authorize another pers on or entity, acting on the data subject's behalf, to make Personal Data (PD) processing decisions.
Privacy (PRI) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • A Privacy program, run by a Chief Privacy Officer (CPO), or similar role, ensures that applicable statutory, regulatory and contractual data privacy obligations are properly identified and implemented to limit and secure Personal Data (PD) that the organization stores, transmits and processes. • A data privacy team oversees the centralized-management of physical security controls across the enterprise. • Data Protection Officers (DPOs) are assigned to work closely with business units and project teams to ensure data privacy principles are being implemented. • CPO and DPO determine and document the legal authority that permits the collection, use, maintenance and sharing of PD, either generally or in support of a specific program or system need. • As part of the organization’s data privacy program, the CPO publishes a clear set of “data privacy principles”, based on leading data privacy practices, that systems, applications, services, processes and third-parties must adhere to. • A Project Management Office (PMO), or project management function, ensures both cybersecurity & data privacy principles are identified and implemented within ongoing or planned projects.
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to allow data subjects to authorize another pers on or entity, acting on the data subject's behalf, to make Personal Data (PD) processing decisions.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to allow data subjects to authorize another pers on or entity, acting on the data subject's behalf, to make Personal Data (PD) processing decisions.
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
P.5.5.2
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
7063(a) 7063(a)(1) 7063(a)(2) 7063(b) 7063(c) 7063(d)
null
6-1-1306(1)(a)(II)
Sec 15(b)(3)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
27(a) 27(b) 27(c)
null
null
null
null
null
null
Article 17.1 Article 17.2 Article 17.3 Article 17.4 Article 17.5
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Article 16(3)(i) Article 16(3)(ii) Article 16(3)(iii) Article 16(3)(iv)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
R-AM-3 R-GV-1 R-GV-5
null
null
null
null
null
null
R-AM-3
null
null
null
null
null
null
null
null
null
null
null
null
R-GV-1
null
null
null
R-GV-5
null
null
null
null
null
null
null
null
null
MT-8 MT-9 MT-10 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Data Privacy
Active Participation By Data Subjects
PRI-03.7
Mechanisms exist to compel data subjects to select the level of consent deemed appropriate by the data subject for the relevant business purpose (e.g., opt-in, opt-out, accept all cookies, etc.).
null
null
Does the organization compel data subjects to select the level of consent deemed appropriate by the data subject for the relevant business purpose (e?g?, opt-in, opt-out, accept all cookies, etc?)?
3
Protect
null
null
X
There is no evidence of a capability to compel data subjects to select the level of consent deemed appropriate by the data subject for the relevant business purpose (e.g., opt-in, opt-out, accept all cookies, etc.).
SP-CMM1 is N/A, since a structured process is required to compel data subjects to select the level of consent deemed appropriate by the data subject for the relevant business purpose (e.g., opt-in, opt-out, accept all cookies, etc.).
SP-CMM2 is N/A, since a well-defined process is required to compel data subjects to select the level of consent deemed appropriate by the data subject for the relevant business purpose (e.g., opt-in, opt-out, accept all cookies, etc.).
Privacy (PRI) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • A Privacy program, run by a Chief Privacy Officer (CPO), or similar role, ensures that applicable statutory, regulatory and contractual data privacy obligations are properly identified and implemented to limit and secure Personal Data (PD) that the organization stores, transmits and processes. • A data privacy team oversees the centralized-management of physical security controls across the enterprise. • Data Protection Officers (DPOs) are assigned to work closely with business units and project teams to ensure data privacy principles are being implemented. • CPO and DPO determine and document the legal authority that permits the collection, use, maintenance and sharing of PD, either generally or in support of a specific program or system need. • As part of the organization’s data privacy program, the CPO publishes a clear set of “data privacy principles”, based on leading data privacy practices, that systems, applications, services, processes and third-parties must adhere to. • A Project Management Office (PMO), or project management function, ensures both cybersecurity & data privacy principles are identified and implemented within ongoing or planned projects.
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to compel data subjects to select the level of consent deemed appropriate by the data subject for the relevant business purpose (e.g., opt-in, opt-out, accept all cookies, etc.).
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to compel data subjects to select the level of consent deemed appropriate by the data subject for the relevant business purpose (e.g., opt-in, opt-out, accept all cookies, etc.).
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
7004(a)(2) 7004(a)(2)(a) 7004(a)(2)(b) 7004(a)(2)(c) 7004(a)(4) 7004(a)(4)(a) 7004(a)(4)(b) 7004(a)(5) 7004(a)(5)(a) 7004(a)(5)(b) 7004(a)(5)(c) 7010(d) 7015(a) 7015(b) 7015(c)(1) 7015(c)(2)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
26(a) 26(c)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
R-AM-3 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-GV-1 R-GV-2 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-IR-4 R-SA-2
null
null
null
null
null
null
R-AM-3
null
null
null
null
null
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
null
null
R-GV-1
R-GV-2
null
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
null
null
null
R-IR-4
null
R-SA-2
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Data Privacy
Global Privacy Control (GPC)
PRI-03.8
Automated mechanisms exist to provide data subjects with functionality to exercise pre-selected opt-out preferences (e.g., opt-out signal).
null
null
Does the organization use automated mechanisms to provide data subjects with functionality to exercise pre-selected opt-out preferences (e?g?, opt-out signal)?
5
Protect
null
null
X
There is no evidence of a capability to provide data subjects with functionality to exercise pre-selected opt-out preferences (e.g., opt-out signal).
SP-CMM1 is N/A, since a structured process is required to provide data subjects with functionality to exercise pre-selected opt-out preferences (e.g., opt-out signal).
SP-CMM2 is N/A, since a well-defined process is required to provide data subjects with functionality to exercise pre-selected opt-out preferences (e.g., opt-out signal).
Privacy (PRI) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • A Privacy program, run by a Chief Privacy Officer (CPO), or similar role, ensures that applicable statutory, regulatory and contractual data privacy obligations are properly identified and implemented to limit and secure Personal Data (PD) that the organization stores, transmits and processes. • A data privacy team oversees the centralized-management of physical security controls across the enterprise. • Data Protection Officers (DPOs) are assigned to work closely with business units and project teams to ensure data privacy principles are being implemented. • CPO and DPO determine and document the legal authority that permits the collection, use, maintenance and sharing of PD, either generally or in support of a specific program or system need. • As part of the organization’s data privacy program, the CPO publishes a clear set of “data privacy principles”, based on leading data privacy practices, that systems, applications, services, processes and third-parties must adhere to. • A Project Management Office (PMO), or project management function, ensures both cybersecurity & data privacy principles are identified and implemented within ongoing or planned projects.
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to provide data subjects with functionality to exercise pre-selected opt-out preferences (e.g., opt-out signal).
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to provide data subjects with functionality to exercise pre-selected opt-out preferences (e.g., opt-out signal).
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
7025(a) 7025(b)(1) 7025(b)(2) 7025(c)(1) 7025(c)(2) 7025(c)(3) 7025(c)(4) 7025(c)(5) 7025(c)(6) 7025(c)(7)(A) 7025(c)(7)(B) 7025(c)(7)(C) 7025(c)(7)(D) 7025(c)(7)(E) 7025(d) 7025(e) 7025(f)(1) 7025(f)(2) 7025(f)(3) 7025(g)(1) 7025(g)(2)(A) 7025(g)(2)(B) 7025(g)(2)(C) 7025(g)(2)(D) 7025(g)(3) 7025(g)(3)(A) 7025(g)(3)(B)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
R-AM-3 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-GV-1 R-GV-2 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-IR-4 R-SA-2
null
null
null
null
null
null
R-AM-3
null
null
null
null
null
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
null
null
R-GV-1
R-GV-2
null
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
null
null
null
R-IR-4
null
R-SA-2
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
null
null
null
Data Privacy
Restrict Collection To Identified Purpose
PRI-04
Mechanisms exist to collect Personal Data (PD) only for the purposes identified in the data privacy notice and includes protections against collecting PD from minors without appropriate parental, or legal guardian, consent.
null
E-PRI-02
Does the organization collect Personal Data (PD) only for the purposes identified in the data privacy notice and includes protections against collecting PD from minors without appropriate parental, or legal guardian, consent?
7
Identify
null
X
null
There is no evidence of a capability to collect Personal Data (PD) only for the purposes identified in the data privacy notice and includes protections against collecting PD from minors without appropriate parental, or legal guardian, consent.
SP-CMM1 is N/A, since a structured process is required to collect Personal Data (PD) only for the purposes identified in the data privacy notice and includes protections against collecting PD from minors without appropriate parental, or legal guardian, consent.
SP-CMM2 is N/A, since a well-defined process is required to collect Personal Data (PD)only for the purposes identified in the data privacy notice and includes protections against collecting PD from minors without appropriate parental, or legal guardian, consent.
Privacy (PRI) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • A Privacy program, run by a Chief Privacy Officer (CPO), or similar role, ensures that applicable statutory, regulatory and contractual data privacy obligations are properly identified and implemented to limit and secure Personal Data (PD) that the organization stores, transmits and processes. • A data privacy team oversees the centralized-management of physical security controls across the enterprise. • Data Protection Officers (DPOs) are assigned to work closely with business units and project teams to ensure data privacy principles are being implemented. • CPO and DPO determine and document the legal authority that permits the collection, use, maintenance and sharing of PD, either generally or in support of a specific program or system need. • As part of the organization’s data privacy program, the CPO publishes a clear set of “data privacy principles”, based on leading data privacy practices, that systems, applications, services, processes and third-parties must adhere to. • A Project Management Office (PMO), or project management function, ensures both cybersecurity & data privacy principles are identified and implemented within ongoing or planned projects.
Privacy (PRI) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to collect Personal Data (PD) only for the purposes identified in the data privacy notice and includes protections against collecting PD from minors without appropriate parental, or legal guardian, consent.
P3.0 P3.1
P3.1-POF1 P3.1-POF2 P3.1-POF3 P3.1-POF4
null
null
null
null
null
null
null
null
null
null
4.1.2 9.2.2
null
null
null
null
null
18.1.4
5.33
18.1.4
A.3
7.2.2 7.3.1 7.3.2 7.4.1 8.2.1
5.4
null
null
null
null
null
null
null
null
null
null
AP-1
null
null
null
PT-2
PT-2
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
P.5.1
null
null
null
null
null
null
COMP:SG2.SP1
null
null
null
null
null
null
null
null
AP-1
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
PT-2
null
null
null
null
null
null
null
null
null
null
null
null
null
45.48.410
null
7010(d) 7070(a) 7070(a)(1) 7070(a)(2)(A) 7070(a)(2)(B) 7070(a)(2)(C) 7070(a)(2)(D) 7070(a)(2)(E) 7070(a)(2)(F) 7070(b) 7070(c) 7071(a) 7071(b) 7072(a) 7072(b)
null
6-1-1305(2)
Sec 15(b)
Sec 10(b)(1) Sec 10(b)(3)
null
null
null
null
null
null
null
null
null
null
null
null
null
59.1-578.A.1
§ 2433(a)(1) § 2433(a)(2)
null
null
Art 5 Art 8
Art 5.1
null
null
Principle 2.5.a
Sec 6
Art 4-7
Art 9
Art 6
Sec 6 Sec 7
Art 7
Sec 4
null
null
Art 4
Sec 4 Sec 5
Sec 2
null
null
Sec 11
25(c) 25(d) 27(a) 28(2)(a) 28(2)(b) 28(2)(c) 28(2)(d) 28(2)(e) 28(2)(f) 28(2)(f)(i) 28(2)(f)(ii) 28(2)(f)(iii) 28(3)
null
Sec 8
null
null
Art 23
Art 5
Article 9.1 Article 10 Article 17.1 Article 17.2 Article 17.3 Article 17.4 Article 17.5
Art 5
null
null
null
null
null
Article 5.1 Article 5.2 Article 6.1 Article 6.2 Article 6.3 Article 6.4 Article 6.5 Article 16
null
Sec 5 Sec 11 Sec 69
Art 8
null
Sec 10
Art 4
Art 10
Sec 9
null
null
null
null
Article 5(1)(b) Article 12(1)
null
null
null
APP Part 3
APP 3
null
null
null
null
null
null
Article 26 Article 31
null
Sec 5
null
Article 17(1)
18.1.4
null
null
null
Principle 1 P1-(1)(a) P1-(1)(b) Principle 3 P3-(1) P3-(1)(a) P3-(1)(b) P3-(1)(c) P3-(1)(d) P3-(1)(d)(i) P3-(1)(d)(ii) P3-(1)(e) P3-(1)(e)(i) P3-(1)(e)(ii) P3-(1)(f) P3-(1)(g) P3-(2) P3-(3) P3-(4) P3-(4)(a) P3-(4)(b) P3-(4)(b)(i) P3-(4)(b)(ii) P3-(4)(b)(iii) P3-(4)(b)(iv) P3-(4)(c) P3-(4)(d) P3-(4)(e) P3-(4)(e)(i) P3-(4)(e)(ii) Principle 4 P4-(a) P4-(b) P4-(b)(i) P4-(b)(ii)
Sec 19
Sec 17
null
null
Art 3 Art 15 Art 22
Art 5 Art 19
Art 5
Art 4.1 Art 4.2 Art 6
Sec 6
null
Art 6.2
null
null
Sec 5 Principle 4
null
Art 4
Art 6
Art 7
Art 4 Art 14
null
null
null
null
x
null
null
x
R-AM-3 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-GV-1 R-GV-2 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-IR-4 R-SA-2
null
null
null
null
null
null
R-AM-3
null
null
null
null
null
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
null
null
R-GV-1
R-GV-2
null
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
null
null
null
R-IR-4
null
R-SA-2
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Data Privacy
Authority To Collect, Use, Maintain & Share Personal Data
PRI-04.1
Mechanisms exist to determine and document the legal authority that permits the collection, use, maintenance and sharing of Personal Data (PD), either generally or in support of a specific program or system need.
null
E-PRI-02
Does the organization determine and document the legal authority that permits the collection, use, maintenance and sharing of Personal Data (PD), either generally or in support of a specific program or system need?
7
Identify
null
X
null
There is no evidence of a capability to determine and document the legal authority that permits the collection, use, maintenance and sharing of Personal Data (PD), either generally or in support of a specific program or system need.
SP-CMM1 is N/A, since a structured process is required to determine and document the legal authority that permits the collection, use, maintenance and sharing of Personal Data (PD), either generally or in support of a specific program or system need.
SP-CMM2 is N/A, since a well-defined process is required to determine and document the legal authority that permits the collection, use, maintenance and sharing of Personal Data (PD), either generally or in support of a specific program or system need.
Privacy (PRI) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • A Privacy program, run by a Chief Privacy Officer (CPO), or similar role, ensures that applicable statutory, regulatory and contractual data privacy obligations are properly identified and implemented to limit and secure Personal Data (PD) that the organization stores, transmits and processes. • A data privacy team oversees the centralized-management of physical security controls across the enterprise. • Data Protection Officers (DPOs) are assigned to work closely with business units and project teams to ensure data privacy principles are being implemented. • CPO and DPO determine and document the legal authority that permits the collection, use, maintenance and sharing of PD, either generally or in support of a specific program or system need. • As part of the organization’s data privacy program, the CPO publishes a clear set of “data privacy principles”, based on leading data privacy practices, that systems, applications, services, processes and third-parties must adhere to. • A Project Management Office (PMO), or project management function, ensures both cybersecurity & data privacy principles are identified and implemented within ongoing or planned projects. • Administrative processes and technologies collect, store, processes, transmit share or use PD only for the purposes identified in the data privacy notice.
Privacy (PRI) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to determine and document the legal authority that permits the collection, use, maintenance and sharing of Personal Data (PD), either generally or in support of a specific program or system need.
P3.1
P6.7-POF1
null
null
null
null
null
null
null
DSP-12
null
null
1.2.5 1.2.11 4.2.2
null
null
null
null
null
null
null
null
null
7.2.2 7.3.1 7.3.2 7.5 7.5.1 7.5.2 8.1 8.2 8.2.1 8.5.1 8.5.7
5.4
null
null
null
null
null
MAP 1.6
CT.DP-P4
null
null
null
AP-1
null
null
null
PT-2
PT-2
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
P.5
null
null
null
null
null
null
COMP:SG2.SP1
null
null
null
null
null
null
null
null
AP-1
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
1.2 1.4 PT-2
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
7002(a) 7002(e) 7002(f)
null
6-1-1308(4)
Sec 15(b)
Sec 10(b)(1) Sec 10(b)(3)
null
null
null
null
null
null
null
null
null
null
null
null
null
59.1-578.A.1 59.1-578.A.2
§ 2433(a)(2)(A) § 2433(a)(2)(B) § 2433(a)(2)(C)
null
null
Art 6
Art 5.1
null
null
null
Sec 6
Art 4-7
Art 9
Art 6
Sec 6 Sec 7
Art 7
Sec 4
null
null
Art 4
Sec 4 Sec 5
Sec 2
null
null
Sec 11
25(c) 28(2)(a) 28(2)(b) 28(2)(c) 28(2)(d) 28(2)(e) 28(2)(f) 28(2)(f)(i) 28(2)(f)(ii) 28(2)(f)(iii) 28(3) 30(1)(a) 30(1)(b)(i) 30(1)(b)(ii) 30(1)(b)(iii) 30(1)(b)(iv) 30(1)(b)(v) 30(1)(b)(vi) 30(1)(b)(vii) 30(1)(b)(viii) 30(2) 30(3) 33(1)(a) 33(1)(b) 33(2) 33(3)(a) 33(3)(b) 33(3)(c) 33(3)(d) 33(3)(e) 33(4) 36 37(1)(a) 37(1)(b) 37(2)
null
Sec 8
2.1(1)(a) 2.1(1)(a)(i) 2.1(1)(a)(ii) 2.2(a) 2.2(b) 2.2(c) 2.2(d) 2.2(e) 2.4(a)
null
Art 23
Art 5
Article 9.2 Article 18.1 Article 18.2 Article 18.3 Article 18.4
Art 5
null
null
null
null
null
Article 5.1 Article 5.2 Article 6.1 Article 6.2 Article 6.3 Article 6.4 Article 6.5 Article 7 Article 7.1 Article 7.2 Article 14 Article 20
null
Sec 2 Sec 3 Sec 4
Art 8
null
Sec 10
Art 4
Art 10
Sec 9
null
null
null
null
Article 5(1)(a) Article 11(1) Article 11(2) Article 18(2)
null
null
null
APP Part 3
APP 3 APP 7
null
null
null
null
null
null
Article 5 Article 10 Article 13 Article 13(1) Article 13(2) Article 13(3) Article 13(4) Article 13(5) Article 13(6) Article 13(7) Article 18 Article 26 Article 29 Article 30 Article 47
null
Sec 5
null
Article 17(1) Article 17(2) Article 17(2)(i) Article 17(2)(ii) Article 17(2)(iii) Article 17(2)(iv) Article 17(2)(v) Article 17(2)(vi)
null
null
null
null
null
Sec 19
Sec 17
null
null
Art 3 Art 15
Art 5 Art 19
Art 5
Art 5.2 Art 7.1 Art 7.2 Art 7.4 Art 8
Sec 6
null
Art 6.1 Art 10 Art 11
null
null
Sec 5 Principle 4
null
Art 4
null
Art 7
Art 4 Art 14
Art 5
null
null
null
x
null
null
null
R-AM-3 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-GV-1 R-GV-2 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-IR-4 R-SA-2
null
null
null
null
null
null
R-AM-3
null
null
null
null
null
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
null
null
R-GV-1
R-GV-2
null
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
null
null
null
R-IR-4
null
R-SA-2
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Data Privacy
Primary Sources
PRI-04.2
Mechanisms exist to ensure information is directly collected from the data subject, whenever possible.
null
null
Does the organization ensure information is directly collected from the data subject, whenever possible?
7
Identify
null
X
null
There is no evidence of a capability to ensure information is directly collected from the data subject, whenever possible.
SP-CMM1 is N/A, since a structured process is required to ensure information is directly collected from the data subject, whenever possible.
SP-CMM2 is N/A, since a well-defined process is required to ensure information is directly collected from the data subject, whenever possible.
Privacy (PRI) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • A Privacy program, run by a Chief Privacy Officer (CPO), or similar role, ensures that applicable statutory, regulatory and contractual data privacy obligations are properly identified and implemented to limit and secure Personal Data (PD) that the organization stores, transmits and processes. • A data privacy team oversees the centralized-management of physical security controls across the enterprise. • Data Protection Officers (DPOs) are assigned to work closely with business units and project teams to ensure data privacy principles are being implemented. • CPO and DPO determine and document the legal authority that permits the collection, use, maintenance and sharing of PD, either generally or in support of a specific program or system need. • As part of the organization’s data privacy program, the CPO publishes a clear set of “data privacy principles”, based on leading data privacy practices, that systems, applications, services, processes and third-parties must adhere to. • A Project Management Office (PMO), or project management function, ensures both cybersecurity & data privacy principles are identified and implemented within ongoing or planned projects.
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to ensure information is directly collected from the data subject, whenever possible.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to ensure information is directly collected from the data subject, whenever possible.
null
P3.1-POF3
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
P.5.4
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
28(1) 28(2)(a) 28(2)(b) 28(2)(c) 28(2)(d) 28(2)(e) 28(2)(f) 28(2)(f)(i) 28(2)(f)(ii) 28(2)(f)(iii)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Article 10
null
null
null
null
null
null
null
null
Principle 2 P2-(1) P2-(2) P2-(2)(a) P2-(2)(b) P2-(2)(c) P2-(2)(d) P2-(2)(e)(i) P2-(2)(e)(ii) P2-(2)(e)(iii) P2-(2)(e)(iv) P2-(2)(e)(v) P2-(2)(f) P2-(2)(g)(i) P2-(2)(g)(ii)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
R-AM-3 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-GV-1 R-GV-4 R-GV-6 R-GV-7
null
null
null
null
null
null
R-AM-3
null
null
null
null
null
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
null
null
R-GV-1
null
null
R-GV-4
null
R-GV-6
R-GV-7
null
null
null
null
null
null
null
NT-7 MT-1 MT-2 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
null
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Data Privacy
Identifiable Image Collection
PRI-04.3
Mechanisms exist to restrict the collection, processing, storage and sharing of photographic and/or video surveillance image collection that can identify individuals to legitimate business needs.
- Privacy Program
null
Does the organization restrict the collection, processing, storage and sharing of photographic and/or video surveillance image collection that can identify individuals to legitimate business needs?
7
Identify
null
X
X
There is no evidence of a capability to restrict the collection, processing, storage and sharing of photographic and/ or video surveillance image collection that can identify individuals to legitimate business needs.
SP-CMM1 is N/A, since a structured process is required to restrict the collection, processing, storage and sharing of photographic and/ or video surveillance image collection that can identify individuals to legitimate business needs.
SP-CMM2 is N/A, since a well-defined process is required to restrict the collection, processing, storage and sharing of photographic and/ or video surveillance image collection that can identify individuals to legitimate business needs.
Privacy (PRI) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • A Privacy program, run by a Chief Privacy Officer (CPO), or similar role, ensures that applicable statutory, regulatory and contractual data privacy obligations are properly identified and implemented to limit and secure Personal Data (PD) that the organization stores, transmits and processes. • A data privacy team oversees the centralized-management of physical security controls across the enterprise. • Data Protection Officers (DPOs) are assigned to work closely with business units and project teams to ensure data privacy principles are being implemented. • CPO and DPO determine and document the legal authority that permits the collection, use, maintenance and sharing of PD, either generally or in support of a specific program or system need. • As part of the organization’s data privacy program, the CPO publishes a clear set of “data privacy principles”, based on leading data privacy practices, that systems, applications, services, processes and third-parties must adhere to. • A Project Management Office (PMO), or project management function, ensures both cybersecurity & data privacy principles are identified and implemented within ongoing or planned projects.
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to restrict the collection, processing, storage and sharing of photographic and/ or video surveillance image collection that can identify individuals to legitimate business needs.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to restrict the collection, processing, storage and sharing of photographic and/ or video surveillance image collection that can identify individuals to legitimate business needs.
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
P.1.2.2
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Article 26
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
R-AM-3 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-GV-1 R-GV-2 R-GV-4 R-GV-5 R-GV-6 R-GV-7
null
null
null
null
null
null
R-AM-3
null
null
null
null
null
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
null
null
R-GV-1
R-GV-2
null
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
null
null
null
null
null
null
MT-1 MT-2 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
null
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Data Privacy
Acquired Personal Data
PRI-04.4
Mechanisms exist to promptly inform data subjects of the utilization purpose when their Personal Data (PD) is acquired and not received directly from the data subject, except where that utilization purpose was disclosed in advance to the data subject.
null
null
Does the organization promptly inform data subjects of the utilization purpose when their Personal Data (PD) is acquired and not received directly from the data subject, except where that utilization purpose was disclosed in advance to the data subject?
6
Identify
null
null
X
There is no evidence of a capability to promptly inform data subjects of the utilization purpose when their Personal Data (PD) is acquired and not received directly from the data subject, except where that utilization purpose was disclosed in advance to the data subject.
SP-CMM1 is N/A, since a structured process is required to promptly inform data subjects of the utilization purpose when their Personal Data (PD) is acquired and not received directly from the data subject, except where that utilization purpose was disclosed in advance to the data subject.
SP-CMM2 is N/A, since a well-defined process is required to promptly inform data subjects of the utilization purpose when their Personal Data (PD) is acquired and not received directly from the data subject, except where that utilization purpose was disclosed in advance to the data subject.
Privacy (PRI) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • A Privacy program, run by a Chief Privacy Officer (CPO), or similar role, ensures that applicable statutory, regulatory and contractual data privacy obligations are properly identified and implemented to limit and secure Personal Data (PD) that the organization stores, transmits and processes. • A data privacy team oversees the centralized-management of physical security controls across the enterprise. • Data Protection Officers (DPOs) are assigned to work closely with business units and project teams to ensure data privacy principles are being implemented. • CPO and DPO determine and document the legal authority that permits the collection, use, maintenance and sharing of PD, either generally or in support of a specific program or system need. • As part of the organization’s data privacy program, the CPO publishes a clear set of “data privacy principles”, based on leading data privacy practices, that systems, applications, services, processes and third-parties must adhere to. • A Project Management Office (PMO), or project management function, ensures both cybersecurity & data privacy principles are identified and implemented within ongoing or planned projects.
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to promptly inform data subjects of the utilization purpose when their Personal Data (PD) is acquired and not received directly from the data subject, except where that utilization purpose was disclosed in advance to the data subject.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to promptly inform data subjects of the utilization purpose when their Personal Data (PD) is acquired and not received directly from the data subject, except where that utilization purpose was disclosed in advance to the data subject.
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
P.9.7
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Article 20
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Article 18(1) Article 18(2) Article 18(4)(i) Article 18(4)(ii) Article 18(4)(iii) Article 18(4)(iv)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
R-AM-3 R-GV-1 R-GV-5
null
null
null
null
null
null
R-AM-3
null
null
null
null
null
null
null
null
null
null
null
null
R-GV-1
null
null
null
R-GV-5
null
null
null
null
null
null
null
null
null
MT-8 MT-9 MT-10 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Data Privacy
Validate Collected Personal Data
PRI-04.5
Mechanisms exist to ensure that the data subject, or authorized representative, validate Personal Data (PD) during the collection process.
null
null
Does the organization ensure that the data subject, or authorized representative, validate Personal Data (PD) during the collection process?
1
Identify
null
null
X
There is no evidence of a capability to ensure that the data subject, or authorized representative, validate Personal Data (PD) during the collection process.
SP-CMM1 is N/A, since a structured process is required to ensure that the data subject, or authorized representative, validate Personal Data (PD) during the collection process.
SP-CMM2 is N/A, since a well-defined process is required to ensure that the data subject, or authorized representative, validate Personal Data (PD) during the collection process.
Privacy (PRI) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • A Privacy program, run by a Chief Privacy Officer (CPO), or similar role, ensures that applicable statutory, regulatory and contractual data privacy obligations are properly identified and implemented to limit and secure Personal Data (PD) that the organization stores, transmits and processes. • A data privacy team oversees the centralized-management of physical security controls across the enterprise. • Data Protection Officers (DPOs) are assigned to work closely with business units and project teams to ensure data privacy principles are being implemented. • CPO and DPO determine and document the legal authority that permits the collection, use, maintenance and sharing of PD, either generally or in support of a specific program or system need. • As part of the organization’s data privacy program, the CPO publishes a clear set of “data privacy principles”, based on leading data privacy practices, that systems, applications, services, processes and third-parties must adhere to. • A Project Management Office (PMO), or project management function, ensures both cybersecurity & data privacy principles are identified and implemented within ongoing or planned projects.
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to ensure that the data subject, or authorized representative, validate Personal Data (PD) during the collection process.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to ensure that the data subject, or authorized representative, validate Personal Data (PD) during the collection process.
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
DI-1(1)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
DI-1(1)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
R-AM-3 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-GV-1 R-GV-2 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-IR-4 R-SA-2
null
null
null
null
null
null
R-AM-3
null
null
null
null
null
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
null
null
R-GV-1
R-GV-2
null
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
null
null
null
R-IR-4
null
R-SA-2
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Data Privacy
Re-Validate Collected Personal Data
PRI-04.6
Mechanisms exist to ensure that the data subject, or authorized representative, re-validate that Personal Data (PD) acquired during the collection process is still accurate.
null
null
Does the organization ensure that the data subject, or authorized representative, re-validate that Personal Data (PD) acquired during the collection process is still accurate?
1
Identify
null
null
X
There is no evidence of a capability to ensure that the data subject, or authorized representative, re-validate that Personal Data (PD) acquired during the collection process is still accurate.
SP-CMM1 is N/A, since a structured process is required to ensure that the data subject, or authorized representative, re-validate that Personal Data (PD) acquired during the collection process is still accurate.
SP-CMM2 is N/A, since a well-defined process is required to ensure that the data subject, or authorized representative, re-validate that Personal Data (PD) acquired during the collection process is still accurate.
Privacy (PRI) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • A Privacy program, run by a Chief Privacy Officer (CPO), or similar role, ensures that applicable statutory, regulatory and contractual data privacy obligations are properly identified and implemented to limit and secure Personal Data (PD) that the organization stores, transmits and processes. • A data privacy team oversees the centralized-management of physical security controls across the enterprise. • Data Protection Officers (DPOs) are assigned to work closely with business units and project teams to ensure data privacy principles are being implemented. • CPO and DPO determine and document the legal authority that permits the collection, use, maintenance and sharing of PD, either generally or in support of a specific program or system need. • As part of the organization’s data privacy program, the CPO publishes a clear set of “data privacy principles”, based on leading data privacy practices, that systems, applications, services, processes and third-parties must adhere to. • A Project Management Office (PMO), or project management function, ensures both cybersecurity & data privacy principles are identified and implemented within ongoing or planned projects.
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to ensure that the data subject, or authorized representative, re-validate that Personal Data (PD) acquired during the collection process is still accurate.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to ensure that the data subject, or authorized representative, re-validate that Personal Data (PD) acquired during the collection process is still accurate.
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
DI-1(2)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
DI-1(2)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
R-AM-3 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-GV-1 R-GV-2 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-IR-4 R-SA-2
null
null
null
null
null
null
R-AM-3
null
null
null
null
null
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
null
null
R-GV-1
R-GV-2
null
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
null
null
null
R-IR-4
null
R-SA-2
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Data Privacy
Personal Data Retention & Disposal
PRI-05
Mechanisms exist to: ▪ Retain Personal Data (PD), including metadata, for an organization-defined time period to fulfill the purpose(s) identified in the notice or as required by law; ▪ Dispose of, destroys, erases, and/or anonymizes the PD, regardless of the method of storage; and ▪ Use organization-defined techniques or methods to ensure secure deletion or destruction of PD (including originals, copies and archived records).
null
E-AST-11 E-PRI-02
Does the organization: ▪ Retain Personal Data (PD), including metadata, for an organization-defined time period to fulfill the purpose(s) identified in the notice or as required by law; ▪ Dispose of, destroys, erases, and/or anonymizes the PD, regardless of the method of storage; and ▪ Use organization-defined techniques or methods to ensure secure deletion or destruction of PD (including originals, copies and archived records)?
8
Identify
null
X
X
There is no evidence of a capability to: ▪ Retain Personal Data (PD), including metadata, for an organization-defined time period to fulfill the purpose(s) identified in the notice or as required by law; ▪ Dispose of, destroys, erases, and/ or anonymizes the PD, regardless of the method of storage; and ▪ Use organization-defined techniques or methods to ensure secure deletion or destruction of PD (including originals, copies and archived records).
Privacy (PRI) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist: • No formal data privacy team exists. Privacy roles are assigned to existing IT / cybersecurity. • Formal roles and responsibilities for data privacy may exist. • No formal data privacy principles are identified for the organization. • An ad hoc approach to Data Protection Impact Assessment (DPIA) exists.
Privacy (PRI) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Privacy management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • The data privacy program is developed to work with IT and cybersecurity staff to ensure that applicable statutory, regulatory and contractual data privacy obligations for Personal Data (PD) are properly identified and implemented across the enterprise. • IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for data privacy management. • A qualified individual is formally assigned as the Chief Privacy Officer (CPO), or similar role, to lead the organization’s data privacy program. This individual may be assigned to multiple duties, including that as a Data Protection Officer (DPO). • The CPO, or similar role, identifies “data privacy principles” that systems, applications, services, processes and third-parties must adhere to, based on leading data privacy practices. • Administrative processes and technologies retain PD, including metadata, for an organization-defined time period to fulfill the purpose(s) identified in the data privacy notice, or as required by law. • Administrative processes and technologies dispose of, destroy, erase, and/ or anonymize the PD, regardless of the method of storage.
Privacy (PRI) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • A Privacy program, run by a Chief Privacy Officer (CPO), or similar role, ensures that applicable statutory, regulatory and contractual data privacy obligations are properly identified and implemented to limit and secure Personal Data (PD) that the organization stores, transmits and processes. • A data privacy team oversees the centralized-management of physical security controls across the enterprise. • Data Protection Officers (DPOs) are assigned to work closely with business units and project teams to ensure data privacy principles are being implemented. • CPO and DPO determine and document the legal authority that permits the collection, use, maintenance and sharing of PD, either generally or in support of a specific program or system need. • As part of the organization’s data privacy program, the CPO publishes a clear set of “data privacy principles”, based on leading data privacy practices, that systems, applications, services, processes and third-parties must adhere to. • A Project Management Office (PMO), or project management function, ensures both cybersecurity & data privacy principles are identified and implemented within ongoing or planned projects. • Administrative processes and technologies retain PD, including metadata, for an organization-defined time period to fulfill the purpose(s) identified in the data privacy notice, or as required by law. • Administrative processes and technologies dispose of, destroy, erase, and/ or anonymize the PD, regardless of the method of storage.
Privacy (PRI) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
Privacy (PRI) efforts are “world-class” capabilities that leverage predictive analysis (e.g., machine learning, AI, etc.). In addition to CMM Level 4 criteria, CMM Level 5 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Stakeholders make time-sensitive decisions to support operational efficiency, which may include automated remediation actions. ▪ Based on predictive analysis, process improvements are implemented according to “continuous improvement” practices that affect process changes.
CC6.5 C1.2 P4.0 P4.2 P4.3
CC6.5-POF1 C1.2-POF2 P4.2-POF1 P4.3-POF2 P4.3-POF3
null
3.5
3.5
3.5
3.5
null
null
DSP-16
null
null
5.2.2 5.2.3
null
null
null
null
null
18.1.4
5.33 8.10
18.1.4
A.4.1 A.9.2 A.9.3 A.10.2 A.10.7 A.10.8 A.10.9
7.4.2 7.4.8 8.2.3 8.4.2
5.6
null
null
null
null
null
null
CT.DM-P5
null
null
null
DM-2
null
null
null
AC-4(25) SI-12 SI-12(3)
SI-12 SI-12(3)
SI-12
SI-12
SI-12
AC-4(25)
null
SI-12
SI-12
SI-12
3.4.14
SI-12
SI-12
null
null
null
SI-12
null
null
null
null
null
null
null
null
null
3.2 3.2.1 3.2.2 3.2.3
9.4.6 9.4.7 10.5.1
9.4.6
9.4.6 10.5.1
9.4.6
9.4.6
9.4.6 10.5.1
9.4.6
9.4.6 9.4.7 10.5.1
9.4.6 9.4.7 10.5.1
9.4.6
P.7.1
null
null
null
null
null
null
KIM:SG4.SP3
null
4.2.2 4.2.3.1 4.2.3.2 4.3
null
null
null
null
null
null
DM-2
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
§ 1232g
null
null
null
314.4(c)(6)(i)
164.502 164.502(a) 164.502(a)(1) 164.502(a)(2) 164.502(a)(3) 164.502(a)(4) 164.502(a)(5) 164.502(b) 164.502(b)(1) 164.502(b)(2) 164.502(c) 164.502(d) 164.502(d)(1) 164.502(d)(2) 164.502(e) 164.502(e)(1) 164.502(e)(2) 164.502(f) 164.502(g) 164.502(g)(1) 164.502(g)(2) 164.502(g)(3) 164.502(g)(4) 164.502(g)(5) 164.502(h) 164.502(i) 164.502(j) 164.504 164.506 164.508 164.510 164.512 164.514
null
null
9.L.C
2.F.1 2.F.3 SI-12
null
null
null
null
null
Principle 5
null
null
5.8
null
null
null
null
45.48.500
null
null
null
null
Sec 15(a) Sec 15(b)(2)
null
Sec 40(a) Sec 40(b) Sec 40(b)(1) Sec 40(b)(2) Sec 40(c) Sec 40(d) Sec 40(e) Sec 40(f)
null
null
500.13
Sec 4(2)(b)(ii)(C)(4)
null
null
Sec. 521.052(b)
null
SI-12
null
null
null
null
null
null
null
Art 5 Art 7 Art 8 Art 13
Art 5.1 Art 18.1 Art 18.2 Art 21.1 Art 21.2 Art 21.3
null
Art 24
Principle 2.5.b
Sec 7
Art 4-7 Art 21
Art 5 Art 6 Art 20
Art 6
Sec 11 Sec 21 Sec 34 Sec 35
Art 6 Art 36
Sec 3a Sec 5 Sec 13 Sec 14 Sec 20
null
OPS-11 OPS-12 PI-03
Art 4 Art 7
Sec 5
Sec 2
15.4
Sec 8
Sec 11
25(g) 34(3) 39(1) 39(1)(a) 39(1)(b) 39(1)(c) 39(1)(d) 39(2)
Art 5-1
Sec 6 Sec 7 Sec 9 Sec 10 Sec 12
2.1(1)(c)
Sec 8 Sec 11 Sec 15 Sec 27 Sec 28
Art 23 Art 26
Art 5
null
Art 5
null
null
3.3.11
null
null
Article 5.5 Article 8
Sec 5 Sec 6
Sec 4 Sec 14 Sec 16
Art 8 Art 22
null
Sec 9
Art 4
Art 5 Art 7
Sec 8
null
null
null
Chapter29-Schedule1-Part1-Principle 5
null
null
null
null
APP Part 3 APP Part 6
APP 4 APP 6
null
null
null
null
null
null
Article 10 Article 19 Article 47 Article 47(1) Article 47(2) Article 47(3) Article 47(4) Article 47(5)
Principle 2 Sec 26 Principle 3 Sec 4
Sec 5
Art 46
Article 19
18.1.4
Sec 5 Sec 6 Sec 10
null
null
null
Sec 19 Sec 21
Sec 23 Sec 25
null
11.1.7
Art 3 Art 4 Art 15 Art 19 Art 21 Art 37
Art 5 Art 19
Art 4
Art 5.1 Art 4.3 Art 9.2
Sec 6 Sec 12
null
Art 6.2 Art 6.9 Art 13 Art 14 Art 15 Art 21
null
null
Sec 7 Sec 8 Principle 5 Principle 6
Art 9
Art 4
Art 6
Art 7 Art 8 Art 9 Art 11 Art 12 Art 13 Art 14
Art 7 Art 8 Art 14
Art 5 Art 6 Art 20 Art 21 Art 22
null
null
null
x
null
x
x
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-1 R-AM-2 R-AM-3 R-BC-1 R-BC-2 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-IR-1 R-IR-3 R-IR-4 R-SA-1 R-SA-2
R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
null
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
null
null
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
R-IR-1
null
R-IR-3
R-IR-4
R-SA-1
R-SA-2
NT-2 NT-3 NT-4 NT-5 NT-6 NT-7 NT-8 NT-9 NT-10 NT-11 NT-12 NT-13 NT-14 MT-1 MT-2 MT-3 MT-4 MT-5 MT-6 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15
null
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Data Privacy
Internal Use of Personal Data For Testing, Training and Research
PRI-05.1
Mechanisms exist to address the use of Personal Data (PD) for internal testing, training and research that: ▪ Takes measures to limit or minimize the amount of PD used for internal testing, training and research purposes; and ▪ Authorizes the use of PD when such information is required for internal testing, training and research.
null
E-PRI-02
Does the organization address the use of Personal Data (PD) for internal testing, training and research that: ▪ Takes measures to limit or minimize the amount of PD used for internal testing, training and research purposes; and ▪ Authorizes the use of PD when such information is required for internal testing, training and research?
8
Identify
null
X
null
There is no evidence of a capability to address the use of Personal Data (PD) for internal testing, training and research that: ▪ Takes measures to limit or minimize the amount of PD used for internal testing, training and research purposes; and ▪ Authorizes the use of PD when such information is required for internal testing, training and research.
SP-CMM1 is N/A, since a structured process is required to address the use of Personal Data (PD) for internal testing, training and research that: ▪ Takes measures to limit or minimize the amount of PD used for internal testing, training and research purposes; and ▪ Authorizes the use of PD when such information is required for internal testing, training and research.
Privacy (PRI) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Privacy management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • The data privacy program is developed to work with IT and cybersecurity staff to ensure that applicable statutory, regulatory and contractual data privacy obligations for Personal Data (PD) are properly identified and implemented across the enterprise. • IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for data privacy management. • A qualified individual is formally assigned as the Chief Privacy Officer (CPO), or similar role, to lead the organization’s data privacy program. This individual may be assigned to multiple duties, including that as a Data Protection Officer (DPO). • The CPO, or similar role, identifies “data privacy principles” that systems, applications, services, processes and third-parties must adhere to, based on leading data privacy practices. • Administrative processes and technologies collect, store, processes, transmit share or use PD only for the purposes identified in the data privacy notice.
Privacy (PRI) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • A Privacy program, run by a Chief Privacy Officer (CPO), or similar role, ensures that applicable statutory, regulatory and contractual data privacy obligations are properly identified and implemented to limit and secure Personal Data (PD) that the organization stores, transmits and processes. • A data privacy team oversees the centralized-management of physical security controls across the enterprise. • Data Protection Officers (DPOs) are assigned to work closely with business units and project teams to ensure data privacy principles are being implemented. • CPO and DPO determine and document the legal authority that permits the collection, use, maintenance and sharing of PD, either generally or in support of a specific program or system need. • As part of the organization’s data privacy program, the CPO publishes a clear set of “data privacy principles”, based on leading data privacy practices, that systems, applications, services, processes and third-parties must adhere to. • A Project Management Office (PMO), or project management function, ensures both cybersecurity & data privacy principles are identified and implemented within ongoing or planned projects. • Administrative processes and technologies collect, store, processes, transmit share or use PD only for the purposes identified in the data privacy notice.
Privacy (PRI) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to address the use of Personal Data (PD) for internal testing, training and research that: ▪ Takes measures to limit or minimize the amount of PD used for internal testing, training and research purposes; and ▪ Authorizes the use of PD when such information is required for internal testing, training and research.
P4.1
null
null
null
null
null
null
null
null
DSP-12 DSP-15
null
null
7.2.2 9.2.1 9.2.2
null
null
null
null
null
18.1.4
5.33
18.1.4
null
7.4.2
5.6
null
null
null
null
null
MAP 1.6
CT.PO-P1 CT.PO-P2
null
null
null
DM-1 DM-3 DM-3(1)
null
null
null
PM-25 PT-2 PT-3 SI-12(1) SI-12(2)
PM-25 PT-2 SI-12(1) SI-12(2)
null
null
null
null
null
null
null
null
null
PM-25
null
null
null
PM-25
null
null
null
null
null
null
null
null
null
null
6.4 6.4.3
6.5.5
null
null
null
null
null
null
6.5.5
6.5.5
null
P.7.4
null
9.2 9.4
null
null
null
null
COMP:SG2.SP1 COMP:SG3.SP1 KIM:SG2.SP1 KIM:SG2.SP2
null
4.2.2 4.2.3.1 4.2.3.2 4.3
null
null
null
null
null
null
DM-1 DM-3 DM-3(1)
6,502
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
§ 1232g
null
null
null
null
null
null
null
null
1.2 1.4 PT-2 SI-12(2)
null
null
null
null
null
null
null
null
5.8
null
null
null
null
null
null
7002(d) 7002(d)(1) 7002(d)(2) 7002(d)(3)
null
6-1-1308(4)
null
null
null
null
Sec 2.3
null
null
null
null
null
null
null
null
null
null
59.1-578.A.2 59.1-578.A.4 59.1-578.A.5
null
null
null
Art 5 Art 7
Art 5.1 Art 11.1 Art 18.1 Art 18.2
null
null
Principle 2.5.a Principle 2.5.b
Sec 12
Art 4-7 Art 21
Art 9 Art 13
null
null
Art 8 Art 9
null
null
null
null
Sec 9
null
null
Sec 8
Sec 13 Sec 20
25(a) 25(b) 25(c) 28(2)(a) 28(2)(b) 28(2)(c) 28(2)(d) 28(2)(e) 28(2)(f) 28(2)(f)(i) 28(2)(f)(ii) 28(2)(f)(iii) 28(3) 30(1)(a) 30(1)(b)(i) 30(1)(b)(ii) 30(1)(b)(iii) 30(1)(b)(iv) 30(1)(b)(v) 30(1)(b)(vi) 30(1)(b)(vii) 30(1)(b)(viii) 30(2) 30(3) 33(1)(a) 33(1)(b) 33(2) 33(3)(a) 33(3)(b) 33(3)(c) 33(3)(d) 33(3)(e) 33(4) 34(1)(a) 34(1)(b) 34(1)(c) 34(1)(d) 34(2)(a) 34(2)(b) 34(3) 36 37(1)(a) 37(1)(b) 37(2) 53(1) 53(2) 53(3)(a) 53(3)(b) 53(4)
null
Sec 11
2.1(1)(b) 3.1(12)
Sec 11 Sec 27
Art 26
null
Article 8.2 Article 9.4
null
null
null
null
null
null
Article 5.1 Article 5.3 Article 7 Article 7.1 Article 7.2 Article 20
null
Sec 10
Art 8
null
null
null
null
Sec 8
null
null
null
Chapter29-Schedule1-Part1-Principle 3
Article 5(1)(c)
null
null
null
APP Part 3
APP 6
null
null
null
null
null
null
Article 13 Article 13(1) Article 13(2) Article 13(3) Article 13(4) Article 13(5) Article 13(6) Article 13(7) Article 28 Article 47
null
null
null
Article 16-2
18.1.4
null
null
null
Principle 10 P10-(1) P10-(1)(a) P10-(1)(b)(i) P10-(1)(b)(ii) P10-(1)(c) P10-(1)(d) P10-(1)(e)(i) P10-(1)(e)(ii) P10-(1)(e)(iii) P10-(1)(e)(iv) P10-(1)(f)(i) P10-(1)(f)(ii) P10-(2)
Sec 19
null
null
null
Art 3
null
Art 4
Art 7.3 Art 9.2
Sec 6
null
null
null
null
null
null
Art 4
null
null
null
Art 5 Art 6 Art 20 Art 21 Art 22
null
null
null
x
null
null
x
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-1 R-AM-2 R-AM-3 R-BC-1 R-BC-2 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-IR-1 R-IR-3 R-IR-4 R-SA-1 R-SA-2
R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
null
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
null
null
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
R-IR-1
null
R-IR-3
R-IR-4
R-SA-1
R-SA-2
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Data Privacy
Personal Data Accuracy & Integrity
PRI-05.2
Mechanisms exist to confirm the accuracy and relevance of Personal Data (PD) throughout the information lifecycle.
null
null
Does the organization confirm the accuracy and relevance of Personal Data (PD) throughout the information lifecycle?
5
Identify
null
X
null
There is no evidence of a capability to confirm the accuracy and relevance of Personal Data (PD) throughout the information lifecycle.
SP-CMM1 is N/A, since a structured process is required to confirm the accuracy and relevance of Personal Data (PD) throughout the information lifecycle.
Privacy (PRI) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Privacy management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • The data privacy program is developed to work with IT and cybersecurity staff to ensure that applicable statutory, regulatory and contractual data privacy obligations for Personal Data (PD) are properly identified and implemented across the enterprise. • IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for data privacy management. • A qualified individual is formally assigned as the Chief Privacy Officer (CPO), or similar role, to lead the organization’s data privacy program. This individual may be assigned to multiple duties, including that as a Data Protection Officer (DPO). • The CPO, or similar role, identifies “data privacy principles” that systems, applications, services, processes and third-parties must adhere to, based on leading data privacy practices.
Privacy (PRI) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • A Privacy program, run by a Chief Privacy Officer (CPO), or similar role, ensures that applicable statutory, regulatory and contractual data privacy obligations are properly identified and implemented to limit and secure Personal Data (PD) that the organization stores, transmits and processes. • A data privacy team oversees the centralized-management of physical security controls across the enterprise. • Data Protection Officers (DPOs) are assigned to work closely with business units and project teams to ensure data privacy principles are being implemented. • CPO and DPO determine and document the legal authority that permits the collection, use, maintenance and sharing of PD, either generally or in support of a specific program or system need. • As part of the organization’s data privacy program, the CPO publishes a clear set of “data privacy principles”, based on leading data privacy practices, that systems, applications, services, processes and third-parties must adhere to. • A Project Management Office (PMO), or project management function, ensures both cybersecurity & data privacy principles are identified and implemented within ongoing or planned projects. • A Chief Data Officer (CDO), or similar function, oversees processes to ensure the quality, utility, objectivity, integrity, impact determination and de-identification of PD across the information lifecycle, including methods to identify and eliminate potential biases.
Privacy (PRI) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to confirm the accuracy and relevance of Personal Data (PD) throughout the information lifecycle.
null
null
null
null
null
null
null
null
null
null
null
null
9.2.1
null
null
null
null
null
null
null
null
null
7.4.3
5.7
null
null
null
null
null
null
PR.DS-P6
null
null
null
DI-2
null
null
null
PM-24
PM-24
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
P.5.3
null
null
null
null
null
null
COMP:SG2.SP3 EXD:SG3.SP4 KIM:SG5.SP3
null
null
null
null
null
null
null
null
DI-2
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Principle 5
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Art 7
Art 5.1
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
25(f)
null
Sec 11
null
Sec 11
null
null
null
null
null
null
null
null
null
Article 5.4
null
Sec 14 Sec 16
Art 8
null
null
null
null
Sec 8
null
null
null
null
null
null
null
null
APP Part 10
APP 10
null
null
null
null
null
null
Article 8
null
null
null
Article 19
null
Sec 11
null
null
Principle 9
null
Sec 23
null
null
Art 3
null
Art 4
Art 4.5
Sec 6
null
null
null
null
Principle 6
null
Art 4
Art 6
Art 9
Art 8
null
null
null
null
x
null
null
null
R-AM-3 R-BC-1 R-BC-2 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5
null
null
null
null
null
null
R-AM-3
R-BC-1
R-BC-2
null
null
null
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
null
null
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
null
null
null
null
null
null
null
null
null
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Data Privacy
Data Masking
PRI-05.3
Mechanisms exist to mask sensitive information through data anonymization, pseudonymization, redaction or de-identification.
null
null
Does the organization mask sensitive information through data anonymization, pseudonymization, redaction or de-identification?
8
Identify
null
X
X
There is no evidence of a capability to mask sensitive information through data anonymization, pseudonymization, redaction or de-identification.
SP-CMM1 is N/A, since a structured process is required to mask sensitive information through data anonymization, pseudonymization, redaction or de-identification.
SP-CMM2 is N/A, since a well-defined process is required to mask sensitive information through data anonymization, pseudonymization, redaction or de-identification.
Privacy (PRI) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • A Privacy program, run by a Chief Privacy Officer (CPO), or similar role, ensures that applicable statutory, regulatory and contractual data privacy obligations are properly identified and implemented to limit and secure Personal Data (PD) that the organization stores, transmits and processes. • A data privacy team oversees the centralized-management of physical security controls across the enterprise. • Data Protection Officers (DPOs) are assigned to work closely with business units and project teams to ensure data privacy principles are being implemented. • CPO and DPO determine and document the legal authority that permits the collection, use, maintenance and sharing of PD, either generally or in support of a specific program or system need. • As part of the organization’s data privacy program, the CPO publishes a clear set of “data privacy principles”, based on leading data privacy practices, that systems, applications, services, processes and third-parties must adhere to. • A Project Management Office (PMO), or project management function, ensures both cybersecurity & data privacy principles are identified and implemented within ongoing or planned projects. • Technologies are configured to mask sensitive/regulated data that is displayed or printed.
Privacy (PRI) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to mask sensitive information through data anonymization, pseudonymization, redaction or de-identification.
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
8.11
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
SI-19(4)
null
null
null
null
SI-19(4)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
3.3
3.4.1
null
null
3.4.1
3.4.1
3.4.1
3.4.1
3.4.1
3.4.1
null
P.7.7
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Art 7
Art 5.1
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
APP Part 2
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Art 3
null
null
Art 4.4
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
x
null
null
null
R-AM-3 R-BC-1 R-BC-2 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5
null
null
null
null
null
null
R-AM-3
R-BC-1
R-BC-2
null
null
null
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
null
null
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
null
null
null
null
null
null
null
null
null
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-10 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Data Privacy
Usage Restrictions of Sensitive Personal Data
PRI-05.4
Mechanisms exist to restrict the use of Personal Data (PD) to only the authorized purpose(s) consistent with applicable laws, regulations and in data privacy notices.
null
null
Does the organization restrict the use of Personal Data (PD) to only the authorized purpose(s) consistent with applicable laws, regulations and in data privacy notices?
8
Identify
null
X
X
There is no evidence of a capability to restrict the use of Personal Data (PD) to only the authorized purpose(s) consistent with applicable laws, regulations and in data privacy notices.
SP-CMM1 is N/A, since a structured process is required to restrict the use of Personal Data (PD) to only the authorized purpose(s) consistent with applicable laws, regulations and in data privacy notices.
SP-CMM2 is N/A, since a well-defined process is required to restrict the use of Personal Data (PD) to only the authorized purpose(s) consistent with applicable laws, regulations and in data privacy notices.
Privacy (PRI) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • A Privacy program, run by a Chief Privacy Officer (CPO), or similar role, ensures that applicable statutory, regulatory and contractual data privacy obligations are properly identified and implemented to limit and secure Personal Data (PD) that the organization stores, transmits and processes. • A data privacy team oversees the centralized-management of physical security controls across the enterprise. • Data Protection Officers (DPOs) are assigned to work closely with business units and project teams to ensure data privacy principles are being implemented. • CPO and DPO determine and document the legal authority that permits the collection, use, maintenance and sharing of PD, either generally or in support of a specific program or system need. • As part of the organization’s data privacy program, the CPO publishes a clear set of “data privacy principles”, based on leading data privacy practices, that systems, applications, services, processes and third-parties must adhere to. • A Project Management Office (PMO), or project management function, ensures both cybersecurity & data privacy principles are identified and implemented within ongoing or planned projects.
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to restrict the use of Personal Data (PD) to only the authorized purpose(s) consistent with applicable laws, regulations and in data privacy notices.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to restrict the use of Personal Data (PD) to only the authorized purpose(s) consistent with applicable laws, regulations and in data privacy notices.
P4.0 P4.1
P4.1-POF1
null
null
null
null
null
null
null
DSP-12 DSP-17
null
null
5.2.1 9.2.2
null
null
null
null
null
18.1.4
5.33
18.1.4
null
7.4.2 7.4.4 8.2.3
5.6
null
null
T1005, T1025, T1041, T1048, T1048.002, T1048.003, T1052, T1052.001, T1133, T1213, T1213.001, T1213.002, T1552.007, T1567
null
null
null
CT.DM-P8 CT.DP-P4 CT.PO-P1 CT.PO-P2
null
null
null
DM-3(1) UL-1
null
null
null
AC-23 PM-25 PT-2 PT-7
PM-25 PT-2 PT-7
null
null
null
AC-23
null
null
null
null
null
AC-23 PM-25
null
AC-23
null
AC-23 PM-25
AC-23
null
null
null
null
null
null
null
null
null
6.4 6.4.3
6.5.5
null
null
null
null
null
null
6.5.5
6.5.5
null
P.1.5
null
9.2 9.4
null
null
null
null
COMP:SG2.SP1 COMP:SG3.SP1 KIM:SG2.SP1 KIM:SG2.SP2
null
4.2.2 4.2.3.1 4.2.3.2 4.3
null
null
null
null
null
null
DM-3(1) UL-1
6,502
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
§ 1232g
null
null
null
null
null
null
null
null
AC-23 PT-2
null
null
null
null
null
Principle 5
null
null
5.8
null
null
null
null
null
null
7002(d) 7002(d)(1) 7002(d)(2) 7002(d)(3) 7027(a) 7027(b) 7027(b)(1) 7027(b)(2) 7027(b)(3) 7027(b)(4) 7027(c) 7027(d) 7027(e) 7027(f) 7027(g)(1) 7027(g)(2) 7027(g)(3) 7027(h) 7027(i) 7027(j) 7027(k) 7027(l) 7027(m) 7027(m)(1) 7027(m)(2) 7027(m)(3) 7027(m)(4) 7027(m)(5) 7027(m)(6) 7027(m)(7) 7027(m)(8)
null
6-1-1305(2) 6-1-1308(4) 6-1-1308(7)
Sec 15(b)(2)
null
null
null
Sec 2.3
null
null
null
null
null
null
null
null
null
null
59.1-578.A.2 59.1-578.A.4 59.1-578.A.5
null
null
null
Art 5 Art 7
Art 5.1 Art 9.1 Art 9.2 Art 10 Art 11.1 Art 18.1 Art 18.2
null
null
Principle 2.2.c Principle 2.2.c(i) Principle 2.2.c(ii) Principle 2.5.a Principle 2.5.b
Sec 12
Art 4-7 Art 21
Art 9 Art 13
null
null
Art 8 Art 9
null
null
null
null
Sec 9
null
null
Sec 8
Sec 13 Sec 20
44 45(a) 45(a)(i) 45(a)(ii) 45(b) 45(c)(i) 45(c)(ii) 45(c)(iii) 46(1)(a) 46(1)(b) 46(2)(a) 46(2)(b) 47(1) 47(2)(a) 47(2)(b) 47(2)(c) 47(2)(d) 47(3)
null
Sec 9
3.1(12)
Sec 9
Art 27
Art 7
Article 8.2 Article 9.4 Article 10 Article 16 Article 22
Art 6 Art 10
null
null
null
null
null
Article 5.1 Article 5.3 Article 17 Article 17.1 Article 17.2 Article 17.3 Article 17.4 Article 17.5 Article 17.6 Article 17.7 Article 17.8 Article 17.9 Article 17.10 Article 18.1 Article 18.2 Article 18.3 Article 19
null
Sec 15 Sec 26
null
null
Sec 13
null
Art 6
Sec 10
null
null
null
Chapter29-Schedule1-Part1-Principle 3
Article 9(1) Article 10
null
null
null
APP Part 3
APP 6 APP 7 APP 9
null
null
null
null
null
null
Article 13 Article 13(1) Article 13(2) Article 13(3) Article 13(4) Article 13(5) Article 13(6) Article 13(7) Article 18 Article 28 Article 29 Article 30 Article 31 Article 32
null
null
null
Article 16-2
18.1.4
Sec 34
null
null
Principle 10 P10-(1) P10-(1)(a) P10-(1)(b)(i) P10-(1)(b)(ii) P10-(1)(c) P10-(1)(d) P10-(1)(e)(i) P10-(1)(e)(ii) P10-(1)(e)(iii) P10-(1)(e)(iv) P10-(1)(f)(i) P10-(1)(f)(ii) P10-(2)
Sec 19 Sec 22 Sec 34
Sec 14
null
null
Art 16 Art 18 Art 23
Art 5
Art 6 Art 7
Art 4.3
Sec 12
null
null
null
null
null
Art 10
Art 4 Art 5 Art 6 Art 7
Art 9
Art 7 Art 9
null
Art 5 Art 6 Art 18 Art 19 Art 20 Art 21 Art 22
null
null
null
x
null
null
x
R-AM-3 R-BC-1 R-BC-2 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-SA-1 R-SA-2
null
null
null
null
null
null
R-AM-3
R-BC-1
R-BC-2
null
null
null
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
null
null
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
null
null
null
null
R-SA-1
R-SA-2
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Data Privacy
Inventory of Personal Data
PRI-05.5
Mechanisms exist to establish, maintain and update an inventory that contains a listing of all programs and systems identified as collecting, using, maintaining, or sharing Personal Data (PD).
null
E-AST-08
Does the organization establish, maintain and update an inventory that contains a listing of all programs and systems identified as collecting, using, maintaining, or sharing Personal Data (PD)?
8
Identify
null
X
null
There is no evidence of a capability to establish, maintain and update an inventory that contains a listing of all programs and systems identified as collecting, using, maintaining, or sharing Personal Data (PD).
SP-CMM1 is N/A, since a structured process is required to establish, maintain and update an inventory that contains a listing of all programs and systems identified as collecting, using, maintaining, or sharing Personal Data (PD).
Privacy (PRI) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Privacy management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • The data privacy program is developed to work with IT and cybersecurity staff to ensure that applicable statutory, regulatory and contractual data privacy obligations for Personal Data (PD) are properly identified and implemented across the enterprise. • IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for data privacy management. • A qualified individual is formally assigned as the Chief Privacy Officer (CPO), or similar role, to lead the organization’s data privacy program. This individual may be assigned to multiple duties, including that as a Data Protection Officer (DPO). • The CPO, or similar role, identifies “data privacy principles” that systems, applications, services, processes and third-parties must adhere to, based on leading data privacy practices. • Administrative processes and technologies establish, maintain and update an inventory that contains a listing of all systems, applications, services and third-parties that store, process and/ or transmit PD.
Privacy (PRI) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • A Privacy program, run by a Chief Privacy Officer (CPO), or similar role, ensures that applicable statutory, regulatory and contractual data privacy obligations are properly identified and implemented to limit and secure Personal Data (PD) that the organization stores, transmits and processes. • A data privacy team oversees the centralized-management of physical security controls across the enterprise. • Data Protection Officers (DPOs) are assigned to work closely with business units and project teams to ensure data privacy principles are being implemented. • CPO and DPO determine and document the legal authority that permits the collection, use, maintenance and sharing of PD, either generally or in support of a specific program or system need. • As part of the organization’s data privacy program, the CPO publishes a clear set of “data privacy principles”, based on leading data privacy practices, that systems, applications, services, processes and third-parties must adhere to. • A Project Management Office (PMO), or project management function, ensures both cybersecurity & data privacy principles are identified and implemented within ongoing or planned projects. • Administrative processes and technologies establish, maintain and update an inventory that contains a listing of all systems, applications, services and third-parties that store, process and/ or transmit PD.
Privacy (PRI) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to establish, maintain and update an inventory that contains a listing of all programs and systems identified as collecting, using, maintaining, or sharing Personal Data (PD).
null
null
null
null
null
null
null
null
null
null
null
null
7.2.2
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
ID.IM-P1 ID.IM-P3 ID.IM-P6
null
null
null
SE-1
null
null
null
PM-5(1)
PM-5(1)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
ID.AM-07
null
null
null
null
null
null
null
null
null
null
null
null
D.1.1
null
null
null
null
null
null
ADM:SG2.SP1 ADM:SG3.SP1 MON:SG2.SP3 MON:SG2.SP4
null
null
null
null
null
null
null
null
SE-1
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
PM-5(1)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Art 3
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
B3.e
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Art 33
null
null
null
null
null
null
null
3.1.4
null
null
null
null
null
null
null
null
null
null
x
null
null
null
R-AC-1 R-AC-2 R-AC-4 R-AM-3 R-BC-1 R-BC-2 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-IR-1 R-IR-2 R-IR-4 R-SA-1
R-AC-1
R-AC-2
null
R-AC-4
null
null
R-AM-3
R-BC-1
R-BC-2
null
null
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
null
null
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
R-IR-1
R-IR-2
null
R-IR-4
R-SA-1
null
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Data Privacy
Personal Data Inventory Automation Support
PRI-05.6
Automated mechanisms exist to determine if Personal Data (PD) is maintained in electronic form.
null
null
Does the organization use automated mechanisms to determine if Personal Data (PD) is maintained in electronic form?
1
Identify
null
X
X
There is no evidence of a capability to determine if Personal Data (PD) is maintained in electronic form.
SP-CMM1 is N/A, since a structured process is required to determine if Personal Data (PD) is maintained in electronic form.
SP-CMM2 is N/A, since a well-defined process is required to determine if Personal Data (PD) is maintained in electronic form.
Privacy (PRI) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • A Privacy program, run by a Chief Privacy Officer (CPO), or similar role, ensures that applicable statutory, regulatory and contractual data privacy obligations are properly identified and implemented to limit and secure Personal Data (PD) that the organization stores, transmits and processes. • A data privacy team oversees the centralized-management of physical security controls across the enterprise. • Data Protection Officers (DPOs) are assigned to work closely with business units and project teams to ensure data privacy principles are being implemented. • CPO and DPO determine and document the legal authority that permits the collection, use, maintenance and sharing of PD, either generally or in support of a specific program or system need. • As part of the organization’s data privacy program, the CPO publishes a clear set of “data privacy principles”, based on leading data privacy practices, that systems, applications, services, processes and third-parties must adhere to. • A Project Management Office (PMO), or project management function, ensures both cybersecurity & data privacy principles are identified and implemented within ongoing or planned projects.
Privacy (PRI) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to determine if Personal Data (PD) is maintained in electronic form.
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
ID.IM-P1 ID.IM-P3 ID.IM-P6
null
null
null
null
null
null
null
PM-5(1)
PM-5(1)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
P.1.6.4
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Art 13
null
Art 16
null
null
null
null
null
null
null
null
null
null
Sec 29
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
R-AC-1 R-AC-2 R-AC-4 R-AM-3 R-BC-1 R-BC-2 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-IR-1 R-IR-2 R-IR-4 R-SA-1
R-AC-1
R-AC-2
null
R-AC-4
null
null
R-AM-3
R-BC-1
R-BC-2
null
null
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
null
null
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
null
null
null
R-IR-1
R-IR-2
null
R-IR-4
R-SA-1
null
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
null
null
null
Data Privacy
Personal Data Categories
PRI-05.7
Mechanisms exist to define and implement data handling and protection requirements for specific categories of sensitive Personal Data (PD).
null
E-PRI-07
Does the organization define and implement data handling and protection requirements for specific categories of sensitive Personal Data (PD)?
5
Identify
null
X
null
There is no evidence of a capability to define and implement data handling and protection requirements for specific categories of sensitive Personal Data (PD).
SP-CMM1 is N/A, since a structured process is required to define and implement data handling and protection requirements for specific categories of sensitive Personal Data (PD).
Privacy (PRI) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Privacy management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • The data privacy program is developed to work with IT and cybersecurity staff to ensure that applicable statutory, regulatory and contractual data privacy obligations for Personal Data (PD) are properly identified and implemented across the enterprise. • IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for data privacy management. • A qualified individual is formally assigned as the Chief Privacy Officer (CPO), or similar role, to lead the organization’s data privacy program. This individual may be assigned to multiple duties, including that as a Data Protection Officer (DPO). • The CPO, or similar role, identifies “data privacy principles” that systems, applications, services, processes and third-parties must adhere to, based on leading data privacy practices.
Privacy (PRI) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • A Privacy program, run by a Chief Privacy Officer (CPO), or similar role, ensures that applicable statutory, regulatory and contractual data privacy obligations are properly identified and implemented to limit and secure Personal Data (PD) that the organization stores, transmits and processes. • A data privacy team oversees the centralized-management of physical security controls across the enterprise. • Data Protection Officers (DPOs) are assigned to work closely with business units and project teams to ensure data privacy principles are being implemented. • CPO and DPO determine and document the legal authority that permits the collection, use, maintenance and sharing of PD, either generally or in support of a specific program or system need. • As part of the organization’s data privacy program, the CPO publishes a clear set of “data privacy principles”, based on leading data privacy practices, that systems, applications, services, processes and third-parties must adhere to. • A Project Management Office (PMO), or project management function, ensures both cybersecurity & data privacy principles are identified and implemented within ongoing or planned projects.
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to define and implement data handling and protection requirements for specific categories of sensitive Personal Data (PD).
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to define and implement data handling and protection requirements for specific categories of sensitive Personal Data (PD).
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
PT-7 PT-7(1) PT-7(2)
PT-7 PT-7(1) PT-7(2)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
D.3.1
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
7002(f)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
59.1-578.C.1 59.1-578.C.2 59.1-578.C.3 59.1-578.C.4 59.1-578.C.5
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
47(1) 47(2)(a) 47(2)(b) 47(2)(c) 47(2)(d) 47(3)
null
null
null
null
null
null
null
null
null
null
null
null
null
Article 9 Article 9.1 Article 9.2 Article 9.3 Article 9.4 Article 9.5 Article 10 Article 13
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
APP 9
null
null
null
null
null
null
Article 51(2)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
R-AM-3 R-BC-1 R-BC-2 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5
null
null
null
null
null
null
R-AM-3
R-BC-1
R-BC-2
null
null
null
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
null
null
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
null
null
null
null
null
null
null
null
null
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Data Privacy
Data Subject Access
PRI-06
Mechanisms exist to provide data subjects the ability to access their Personal Data (PD) maintained in organizational systems of records.
null
E-PRI-06
Does the organization provide data subjects the ability to access their Personal Data (PD) maintained in organizational systems of records?
6
Identify
null
X
null
There is no evidence of a capability to provide data subjects the ability to access their Personal Data (PD) maintained in organizational systems of records.
SP-CMM1 is N/A, since a structured process is required to provide data subjects the ability to access their Personal Data (PD) maintained in organizational systems of records.
Privacy (PRI) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Privacy management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • The data privacy program is developed to work with IT and cybersecurity staff to ensure that applicable statutory, regulatory and contractual data privacy obligations for Personal Data (PD) are properly identified and implemented across the enterprise. • IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for data privacy management. • A qualified individual is formally assigned as the Chief Privacy Officer (CPO), or similar role, to lead the organization’s data privacy program. This individual may be assigned to multiple duties, including that as a Data Protection Officer (DPO). • The CPO, or similar role, identifies “data privacy principles” that systems, applications, services, processes and third-parties must adhere to, based on leading data privacy practices. • Administrative processes and technologies provide data subjects the ability to access their PD maintained in organizational systems of records.
Privacy (PRI) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • A Privacy program, run by a Chief Privacy Officer (CPO), or similar role, ensures that applicable statutory, regulatory and contractual data privacy obligations are properly identified and implemented to limit and secure Personal Data (PD) that the organization stores, transmits and processes. • A data privacy team oversees the centralized-management of physical security controls across the enterprise. • Data Protection Officers (DPOs) are assigned to work closely with business units and project teams to ensure data privacy principles are being implemented. • CPO and DPO determine and document the legal authority that permits the collection, use, maintenance and sharing of PD, either generally or in support of a specific program or system need. • As part of the organization’s data privacy program, the CPO publishes a clear set of “data privacy principles”, based on leading data privacy practices, that systems, applications, services, processes and third-parties must adhere to. • A Project Management Office (PMO), or project management function, ensures both cybersecurity & data privacy principles are identified and implemented within ongoing or planned projects. • Administrative processes and technologies provide data subjects the ability to access their PD maintained in organizational systems of records.
Privacy (PRI) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to provide data subjects the ability to access their Personal Data (PD) maintained in organizational systems of records.
P5.0 P5.1
P5.1-POF1 P5.1-POF2 P5.1-POF3
null
null
null
null
null
null
null
DSP-11
null
null
6.2.1 6.2.2 6.2.3 6.2.4 6.2.5 6.2.6
null
null
null
null
null
null
null
null
A.8
7.3.6 8.2.5
5.9
null
null
null
null
null
null
CT.DM-P1
null
null
null
IP-2
null
null
null
AC-3(14) SI-18(4)
AC-3(14) SI-18(4)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
P.5.5.6.3
null
null
null
null
null
null
AM:SG1.SP1 COMP:SG3.SP1 EF:SG2.SP1 EF:SG2.SP2
null
null
null
null
null
null
null
null
IP-2
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
§ 1232g
null
null
null
null
164.522 164.522(a) 164.522(a)(1) 164.522(a)(2) 164.522(a)(3) 164.524 164.524(a) 164.524(b) 164.524(c) 164.524(d) 164.524(e)
null
null
null
null
null
null
null
null
null
Principle 6
null
null
null
null
null
null
null
null
null
7024(a) 7024(b) 7024(c) 7024(c)(1) 7024(c)(2) 7024(c)(3) 7024(c)(4) 7024(d) 7024(e) 7024(f) 7024(g) 7024(h) 7024(i) 7024(j) 7024(k) 7024(k)(1) 7024(k)(2) 7024(k)(3) 7024(k)(4) 7024(k)(5) 7024(k)(6) 7024(l)
null
6-1-1306(1)(b)
null
null
null
null
Sec 2.1
null
null
null
null
null
null
null
null
null
null
59.1-577.A 59.1-577.A.1 59.1-577.A.2 59.1-577.A.3 59.1-577.A.4 59.1-577.A.5 59.1-577.B 59.1-577.B.1 59.1-577.B.2 59.1-577.B.3 59.1-577.B.4 59.1-577.B.5 59.1-577.C 59.1-581.C 59.1-581.C.1 59.1-581.C.2 59.1-581.C.3
null
null
null
null
Art 12.1 Art 12.2 Art 13.2 Art 14.2 Art 15.1 Art 15.2 Art 15.3 Art 15.4 Art 16 Art 26.3
null
null
Principle 2.6.a
Sec 26
Art 10 Art 12
Art 12
null
Sec 24 Sec 26
Art 39
Sec 19
null
null
Art 11 Art 12
Sec 14 Sec 15
Sec 2
null
Sec 13
Sec 7
26(a) 26(b) 26(c) 26(d) 26(e)
null
Sec 35
3.1(1) 3.1(3) 3.1(3)(a) 3.1(3)(b)
Sec 18
Art 32
Art 10 Art 11
Article 6 Article 21.1 Article 21.2
Art 14
null
null
null
null
null
Article 21 Article 23 Article 24 Article 25 Article 26 Article 28.1 Article 28.2 Article 28.3 Article 28.4 Article 28.5
null
Sec 23
Art 23 Art 24 Art 27 Art 28 Art 29
null
null
Art 8
Art 11
Sec 17
null
null
null
null
Article 5(1)(e) Article 12(1) Article 12(2) Article 12(3) Article 12(4) Article 12(5) Article 12(6) Article 12(7) Article 15(1)(a) Article 15(1)(b) Article 15(1)(c) Article 15(1)(d) Article 15(1)(e) Article 15(1)(f) Article 15(1)(g) Article 15(1)(h) Article 15(3) Article 15(4)
null
null
null
APP Part 12
APP 12
null
null
null
null
null
null
Article 45 Article 46 Article 49
Principle 6 Sec 17A Sec 18
null
null
Article 27(1) Article 27(1)(i) Article 27(1)(ii) Article 27(1)(iii) Article 27(1)(iv) Article 27(2)(i) Article 27(2)(ii) Article 27(3) Article 28(1) Article 28(2) Article 28(2)(i) Article 28(2)(ii) Article 28(2)(iii) Article 28(3) Article 28(4) Article 28(5)
null
Sec 12 Sec 30
null
null
Principle 6 P6-(1) P6-(1)(a) P6-(1)(b) P6-(2) P6-(3)
Sec 34
Sec 21
null
null
Art 4 Art 35
Art 3
Art 14 Art 15
Art 4.6 Art 13 Art 14.1 Art 14.2 Art 14.3 Art 14.4
Sec 8
null
Art 6.4 Art 9 Art 17 Art 18.1 Art 18.2 Art 20
null
null
Principle 8 Principle 9
Art 12
Art 8 Art 11
Art 7
Art 15 Art 22 Art 23 Art 25
Art 10 Art 18 Art 19
Art 14
null
null
null
x
null
null
x
R-AM-3 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5
null
null
null
null
null
null
R-AM-3
null
null
null
null
null
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
null
null
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
null
null
null
null
null
null
null
null
null
NT-2 NT-3 NT-4 NT-5 NT-6 NT-7 NT-8 NT-9 NT-10 NT-11 NT-12 NT-13 NT-14 MT-1 MT-2 MT-3 MT-4 MT-5 MT-6 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15
null
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Data Privacy
Correcting Inaccurate Personal Data
PRI-06.1
Mechanisms exist to establish and implement a process for: ▪ Data subjects to have inaccurate Personal Data (PD) maintained by the organization corrected or amended; and ▪ Disseminating corrections or amendments of PD to other authorized users of the PD.
- Data Protection Impact Assessment (DPIA)
null
Does the organization establish and implement a process for: ▪ Data subjects to have inaccurate Personal Data (PD) maintained by the organization corrected or amended; and ▪ Disseminating corrections or amendments of PD to other authorized users of the PD?
5
Respond
null
X
null
There is no evidence of a capability to establish and implement a process for: ▪ Data subjects to have inaccurate Personal Data (PD) maintained by the organization corrected or amended; and ▪ Disseminating corrections or amendments of PD to other authorized users of the PD.
SP-CMM1 is N/A, since a structured process is required to establish and implement a process for: ▪ Data subjects to have inaccurate Personal Data (PD) maintained by the organization corrected or amended; and ▪ Disseminating corrections or amendments of PD to other authorized users of the PD.
Privacy (PRI) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Privacy management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • The data privacy program is developed to work with IT and cybersecurity staff to ensure that applicable statutory, regulatory and contractual data privacy obligations for Personal Data (PD) are properly identified and implemented across the enterprise. • IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for data privacy management. • A qualified individual is formally assigned as the Chief Privacy Officer (CPO), or similar role, to lead the organization’s data privacy program. This individual may be assigned to multiple duties, including that as a Data Protection Officer (DPO). • The CPO, or similar role, identifies “data privacy principles” that systems, applications, services, processes and third-parties must adhere to, based on leading data privacy practices. • Administrative processes exist for data subjects to have inaccurate PD maintained by the organization corrected or amended.
Privacy (PRI) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • A Privacy program, run by a Chief Privacy Officer (CPO), or similar role, ensures that applicable statutory, regulatory and contractual data privacy obligations are properly identified and implemented to limit and secure Personal Data (PD) that the organization stores, transmits and processes. • A data privacy team oversees the centralized-management of physical security controls across the enterprise. • Data Protection Officers (DPOs) are assigned to work closely with business units and project teams to ensure data privacy principles are being implemented. • CPO and DPO determine and document the legal authority that permits the collection, use, maintenance and sharing of PD, either generally or in support of a specific program or system need. • As part of the organization’s data privacy program, the CPO publishes a clear set of “data privacy principles”, based on leading data privacy practices, that systems, applications, services, processes and third-parties must adhere to. • A Project Management Office (PMO), or project management function, ensures both cybersecurity & data privacy principles are identified and implemented within ongoing or planned projects. • The CPO and DPO develop and implement a process for data subjects to have inaccurate PD maintained by the organization corrected or amended.
Privacy (PRI) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to establish and implement a process for: ▪ Data subjects to have inaccurate Personal Data (PD) maintained by the organization corrected or amended; and ▪ Disseminating corrections or amendments of PD to other authorized users of the PD.
P5.1 P5.2
P5.2-POF2
null
null
null
null
null
null
null
null
null
null
6.2.5 6.2.6 10.2.1 10.2.2
null
null
null
null
null
null
null
null
null
7.3.6
5.9
null
null
null
null
null
null
CM.AW-P8 CT.DM-P3
null
null
null
IP-3
null
null
null
SI-18(4) SI-18(5)
SI-18(4)
null
null
null
SI-18(5)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
P.1.4.3
null
null
null
null
null
null
COMM:SG1.SP3 KIM:SG5.SP1
null
null
null
null
null
null
null
null
IP-3
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
164.526 164.526(a) 164.526(b) 164.526(c) 164.526(d) 164.526(e) 164.526(f)
null
null
null
null
null
null
null
null
null
Principle 7
null
null
null
null
null
null
null
null
null
7023(a) 7023(b) 7023(b)(1) 7023(b)(1)(A) 7023(b)(1)(B) 7023(b)(1)(C) 7023(b)(2) 7023(c) 7023(d)(1) 7023(d)(2) 7023(d)(2)(A) 7023(d)(2)(B) 7023(d)(2)(C) 7023(d)(2)(D) 7023(d)(3) 7023(d)(4) 7023(e) 7023(f) 7023(f)(1) 7023(f)(2) 7023(f)(3) 7023(f)(4) 7023(g) 7023(h) 7023(i) 7023(j) 7023(k)
null
6-1-1306(1)(c)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
59.1-577.A.2
null
null
null
null
Art 12.3 Art 14.2 Art 16 Art 18.1 Art 26.3
null
null
Principle 2.6
Sec 27
Art 10 Art 12
Art 21
Art 24 Art 37
Sec 29
Art 38 Art 39
Sec 20
null
null
Art 13
Sec 14 Sec 15 Sec 17
Sec 2
null
Sec 14
Sec 7
25(f) 26(d) 40(1)(a) 40(2)(a)
null
Sec 36
null
Sec 27
Art 32
Art 12
Article 5.4 Article 6.2
Art 17
null
null
null
null
null
Article 5.4 Article 11 Article 29
null
Sec 24
Art 23 Art 24 Art 31 Art 32
null
Sec 28
Art 5
null
Sec 17
null
null
null
null
Article 5(1)(d) Article 16 Article 19
null
null
null
APP Part 13
APP 13
null
null
null
null
null
Sec 8
Article 46 Article 49
Sec 22
null
null
Article 26(1) Article 26(1)(i) Article 26(1)(ii) Article 29(1) Article 29(2) Article 29(3)
null
Sec 34
null
null
P6-(2) Principle 7 P7-(1) P7-(2) P7-(3)(a) P7-(3)(b) P7-(4) P7-(5) P7-(6)
Sec 34
Sec 22
null
null
Art 4 Art 36
Art 3
Art 16
Art 16.1 Art 16.3
Sec 10
null
Art 18.3
null
null
Principle 10
Art 13
Art 8 Art 11
Art 7
Art 24 Art 28 Art 29
Art 20
Art 15 Art 16
null
null
null
x
null
null
null
R-AC-4 R-AM-2 R-AM-3 R-BC-2 R-BC-3 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7
null
null
null
R-AC-4
null
R-AM-2
R-AM-3
null
R-BC-2
R-BC-3
null
null
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
null
null
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
null
null
null
null
null
null
NT-2 NT-3 NT-4 NT-5 NT-6 NT-7 NT-8 NT-9 NT-10 NT-11 NT-12 NT-13 NT-14 MT-1 MT-2 MT-3 MT-4 MT-5 MT-6 MT-7 MT-8 MT-9 MT-10 MT-11 MT-12 MT-13 MT-14 MT-15
null
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Data Privacy
Notice of Correction or Processing Change
PRI-06.2
Mechanisms exist to notify affected data subjects if their Personal Data (PD) has been corrected or amended.
The organization should, in the case of having general written authorization, inform the customer of any intended changes concerning the addition or replacement of subcontractors to process PD, thereby giving the customer the opportunity to object to such changes.
null
Does the organization notify affected data subjects if their Personal Data (PD) has been corrected or amended?
4
Respond
null
X
null
There is no evidence of a capability to notify affected data subjects if their Personal Data (PD) has been corrected or amended.
SP-CMM1 is N/A, since a structured process is required to notify affected data subjects if their Personal Data (PD) has been corrected or amended.
SP-CMM2 is N/A, since a well-defined process is required to notify affected data subjects if their Personal Data (PD) has been corrected or amended.
Privacy (PRI) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • A Privacy program, run by a Chief Privacy Officer (CPO), or similar role, ensures that applicable statutory, regulatory and contractual data privacy obligations are properly identified and implemented to limit and secure Personal Data (PD) that the organization stores, transmits and processes. • A data privacy team oversees the centralized-management of physical security controls across the enterprise. • Data Protection Officers (DPOs) are assigned to work closely with business units and project teams to ensure data privacy principles are being implemented. • CPO and DPO determine and document the legal authority that permits the collection, use, maintenance and sharing of PD, either generally or in support of a specific program or system need. • As part of the organization’s data privacy program, the CPO publishes a clear set of “data privacy principles”, based on leading data privacy practices, that systems, applications, services, processes and third-parties must adhere to. • A Project Management Office (PMO), or project management function, ensures both cybersecurity & data privacy principles are identified and implemented within ongoing or planned projects. • Administrative processes and technologies notify affected data subjects if their PD has been corrected or amended.
Privacy (PRI) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to notify affected data subjects if their Personal Data (PD) has been corrected or amended.
P5.2
P3.1-POF4 P5.2-POF2 P5.2-POF3
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
8.5.8
5.9
null
null
null
null
null
null
CM.AW-P1 CM.PO-P1 CT.PO-P4
null
null
null
null
null
null
null
SI-18(5)
null
null
null
null
SI-18(5)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
P.5.5.6.4
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
7023(j)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Art 12.3 Art 18.3 Art 19 Art 26.3
null
null
null
null
null
Art 16
Art 37
null
Art 39
null
null
null
null
Sec 14 Sec 15 Sec 17 Sec 18
Sec 2
null
null
Sec 10
null
null
Sec 38
3.1(13)
null
Art 32
null
Article 6.2
Art 18
null
null
null
null
null
Article 34 Article 34.1 Article 34.2 Article 34.3 Article 34.4 Article 34.5
null
Sec 24
Art 23 Art 24 Art 31 Art 32
null
null
null
null
null
null
null
null
null
Article 18(3)
null
null
null
APP Part 13
APP 13
null
null
null
null
null
null
Article 22 Article 46 Article 49
null
null
null
Article 18(3) Article 18(4)(i) Article 18(4)(ii) Article 18(4)(iii) Article 18(4)(iv) Article 29(1) Article 29(2) Article 29(3)
null
null
null
null
P6-(2)
Sec 34
Sec 23
null
null
Art 4 Art 36
null
Art 16
Art 16.2
Sec 11
null
Art 18.9
null
null
null
null
Art 8 Art 11
null
null
null
null
null
null
null
x
null
null
null
R-AM-3 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-GV-1 R-GV-2 R-GV-4 R-GV-5
null
null
null
null
null
null
R-AM-3
null
null
null
null
null
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
null
null
R-GV-1
R-GV-2
null
R-GV-4
R-GV-5
null
null
null
null
null
null
null
null
null
NT-2 NT-3 NT-4 NT-5 NT-6 NT-7 NT-8 NT-9 NT-10 NT-11 NT-12 NT-13 NT-14 MT-1 MT-2 MT-3 MT-4 MT-5 MT-6 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15
null
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Data Privacy
Appeal Adverse Decision
PRI-06.3
Mechanisms exist to provide an organization-defined process for data subjects to appeal an adverse decision and have incorrect information amended.
null
null
Does the organization provide an organization-defined process for data subjects to appeal an adverse decision and have incorrect information amended?
4
Respond
null
X
X
There is no evidence of a capability to provide an organization-defined process for data subjects to appeal an adverse decision and have incorrect information amended.
SP-CMM1 is N/A, since a structured process is required to provide an organization-defined process for data subjects to appeal an adverse decision and have incorrect information amended.
SP-CMM2 is N/A, since a well-defined process is required to provide an organization-defined process for data subjects to appeal an adverse decision and have incorrect information amended.
Privacy (PRI) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • A Privacy program, run by a Chief Privacy Officer (CPO), or similar role, ensures that applicable statutory, regulatory and contractual data privacy obligations are properly identified and implemented to limit and secure Personal Data (PD) that the organization stores, transmits and processes. • A data privacy team oversees the centralized-management of physical security controls across the enterprise. • Data Protection Officers (DPOs) are assigned to work closely with business units and project teams to ensure data privacy principles are being implemented. • CPO and DPO determine and document the legal authority that permits the collection, use, maintenance and sharing of PD, either generally or in support of a specific program or system need. • As part of the organization’s data privacy program, the CPO publishes a clear set of “data privacy principles”, based on leading data privacy practices, that systems, applications, services, processes and third-parties must adhere to. • A Project Management Office (PMO), or project management function, ensures both cybersecurity & data privacy principles are identified and implemented within ongoing or planned projects. • Administrative processes and technologies provide a process for data subjects to appeal an adverse decision and have incorrect information amended.
Privacy (PRI) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to provide an organization-defined process for data subjects to appeal an adverse decision and have incorrect information amended.
P5.2
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
5.9
null
null
null
null
null
null
CM.AW-P8
null
null
null
null
null
null
null
PM-26
PM-26
null
null
null
null
null
null
null
null
null
PM-26
null
null
null
PM-26
PM-26
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
P.5.5.6.7
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Principle 7
null
null
null
null
null
null
null
null
null
null
null
6-1-1306(3)(a) 6-1-1306(3)(b) 6-1-1306(3)(c)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
59.1-577.C
null
null
null
null
Art 21.1 Art 21.2 Art 21.3 Art 26.3
null
null
null
Sec 28
null
null
Art 35
null
Art 38 Art 39
null
null
null
Art 13
Sec 14 Sec 15 Sec 17 Sec 18
Sec 2
null
null
null
null
null
Sec 40
null
null
null
null
null
Art 17
null
null
null
null
null
null
null
Sec 63 Sec 74
Art 23 Art 24
null
null
null
null
Sec 17
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Article 31
null
null
null
null
null
Sec 34
null
null
null
Art 38
null
null
null
null
null
Art 18.9
null
null
Sec 11
null
Art 15
null
null
Art 22
Art 16
null
null
null
x
null
null
null
R-AC-4 R-AM-2 R-AM-3 R-BC-2 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-GV-1 R-GV-2 R-GV-4 R-GV-5
null
null
null
R-AC-4
null
R-AM-2
R-AM-3
null
R-BC-2
null
null
null
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
null
null
R-GV-1
R-GV-2
null
R-GV-4
R-GV-5
null
null
null
null
null
null
null
null
null
NT-2 NT-3 NT-4 NT-5 NT-6 NT-7 NT-8 NT-9 NT-10 NT-11 NT-12 NT-13 NT-14 MT-1 MT-2 MT-3 MT-4 MT-5 MT-6 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15
null
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Data Privacy
User Feedback Management
PRI-06.4
Mechanisms exist to implement a process for receiving and responding to complaints, concerns or questions from data subjects about the organizational data privacy practices.
null
null
Does the organization implement a process for receiving and responding to complaints, concerns or questions from data subjects about the organizational data privacy practices?
5
Respond
null
X
X
There is no evidence of a capability to implement a process for receiving and responding to complaints, concerns or questions from individuals about the organizational data privacy practices.
SP-CMM1 is N/A, since a structured process is required to implement a process for receiving and responding to complaints, concerns or questions from individuals about the organizational data privacy practices.
SP-CMM2 is N/A, since a well-defined process is required to implement a process for receiving and responding to complaints, concerns or questions from individuals about the organizational data privacy practices.
Privacy (PRI) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • A Privacy program, run by a Chief Privacy Officer (CPO), or similar role, ensures that applicable statutory, regulatory and contractual data privacy obligations are properly identified and implemented to limit and secure Personal Data (PD) that the organization stores, transmits and processes. • A data privacy team oversees the centralized-management of physical security controls across the enterprise. • Data Protection Officers (DPOs) are assigned to work closely with business units and project teams to ensure data privacy principles are being implemented. • CPO and DPO determine and document the legal authority that permits the collection, use, maintenance and sharing of PD, either generally or in support of a specific program or system need. • As part of the organization’s data privacy program, the CPO publishes a clear set of “data privacy principles”, based on leading data privacy practices, that systems, applications, services, processes and third-parties must adhere to. • A Project Management Office (PMO), or project management function, ensures both cybersecurity & data privacy principles are identified and implemented within ongoing or planned projects. • Administrative processes and technologies empower data subjects to edit and/ or revoke authorizations for the organization to collect, store, processes, transmit share or use their PD.
Privacy (PRI) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to implement a process for receiving and responding to complaints, concerns or questions from individuals about the organizational data privacy practices.
P5.2 P8.1
P4.3-POF1 P5.1-POF4 P5.2-POF1 P5.2-POF3 P6.7-POF2 P8.1-POF1 P8.1-POF2 P8.1-POF3
null
null
null
null
null
null
null
null
null
null
6.2.5 6.2.6 7.1.2 10.2.1 10.2.2
null
null
null
null
null
null
null
null
null
7.3.9
5.9
null
null
null
null
null
null
GV.MT-P4 GV.MT-P7 CM.AW-P2 CT.PO-P4
null
null
null
IP-4 IP-4(1)
null
null
null
PM-26
PM-26
null
null
null
null
null
null
null
null
null
PM-26
null
null
null
PM-26
PM-26
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
P.10.1
null
null
null
null
null
null
OPD:SG1.SP1
null
null
null
null
null
null
null
null
IP-4 IP-4(1)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
164.530(d) 164.530(d)(1) 164.530(d)(2)
null
null
null
null
null
null
null
null
null
Principle 7
null
null
null
null
null
null
null
null
null
7020(a) 7020(b) 7020(c) 7020(e) 7020(f) 7020(g) 7020(h) 7021(a) 7021(b) 7060(a) 7060(b) 7060(c)(1) 7060(c)(2) 7060(c)(3)(A) 7060(c)(3)(B) 7060(c)(3)(C) 7060(c)(3)(D) 7060(c)(3)(E) 7060(c)(3)(F) 7060(d) 7060(e) 7060(f) 7060(g) 7060(h) 7061(a) 7061(b) 7062(a) 7062(b) 7062(c) 7062(d) 7062(e) 7062(e)(1) 7062(e)(2) 7062(f) 7062(g)
null
6-1-1306(2)(a) 6-1-1306(2)(b) 6-1-1306(2)(c) 6-1-1306(2)(d)
null
null
null
null
Sec 2.1 Sec 2.2 Sec 2.4
null
null
null
null
null
null
null
null
null
null
59.1-577.A 59.1-577.A.1 59.1-577.A.2 59.1-577.A.3 59.1-577.A.4 59.1-577.A.5 59.1-577.B 59.1-577.B.1 59.1-577.B.2 59.1-577.B.3 59.1-577.B.4 59.1-577.B.5 59.1-577.C
null
null
null
null
Art 18.1 Art 18.2 Art 18.3 Art 19 Art 21.1 Art 21.6 Art 22 Art 26.3
null
null
Principle 2.6 Principle 2.7.a.i Principle 2.7.a.ii Principle 2.7.a.iii Principle 2.7.b Principle 2.7.c Principle 2.7.d
null
null
Art 21
null
null
null
null
null
null
null
Sec 14 Sec 15 Sec 17
null
null
null
Sec 9
40(1)(b)
null
null
2.8 2.8(a) 2.8(b) 3.1(2) 3.1(4) 3.1(5) 3.1(11)(a) 3.1(11)(b) 3.1(11)(c) 3.1(11)(d) 3.1(13)
null
null
null
Article 5.3 Article 5.4 Article 6.3
null
null
null
null
null
null
Article 21 Article 21.1 Article 21.2 Article 22 Article 22.1 Article 22.2 Article 23 Article 23.x Article 24 Article 24.x Article 25 Article 25.x Article 26 Article 26.1 Article 26.2 Article 26.3 Article 26.4 Article 26.5 Article 26.6 Article 26.7 Article 26.8 Article 27.1 Article 27.2 Article 27.3 Article 27.4 Article 27.5 Article 27.6 Article 27.7
null
null
Art 26
null
null
null
null
null
null
null
null
null
Article 12(4) Article 18(3)
null
null
null
APP Part 13
APP 12 APP 13
null
null
null
null
null
null
Article 45 Article 46 Article 50
null
null
null
Article 27(3) Article 28(2) Article 28(2)(i) Article 28(2)(ii) Article 28(2)(iii) Article 28(3) Article 28(4) Article 28(5) Article 31 Article 32(1) Article 32(2) Article 32(3) Article 32(4)
null
null
null
null
null
null
null
null
null
Art 37
null
null
Art 16.2 Art 16.6
Sec 11
null
Art 18 Art 19 Art 21
null
null
null
null
Art 12 Art 15
null
Art 30
Art 10
null
null
null
null
x
null
null
null
R-AM-3 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-GV-1 R-GV-2 R-GV-4 R-GV-5
null
null
null
null
null
null
R-AM-3
null
null
null
null
null
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
null
null
R-GV-1
R-GV-2
null
R-GV-4
R-GV-5
null
null
null
null
null
null
null
null
null
NT-2 NT-3 NT-4 NT-5 NT-6 NT-7 NT-8 NT-9 NT-10 NT-11 NT-12 NT-13 NT-14 MT-1 MT-2 MT-3 MT-4 MT-5 MT-6 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15
null
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Data Privacy
Right to Erasure
PRI-06.5
Mechanisms exist to erase personal data of a data subject, without delay.
null
null
Does the organization erase personal data of a data subject, without delay?
5
Respond
null
X
null
There is no evidence of a capability to erase personal data of an individual, without delay.
SP-CMM1 is N/A, since a structured process is required to erase personal data of an individual, without delay.
SP-CMM2 is N/A, since a well-defined process is required to erase personal data of an individual, without delay.
Privacy (PRI) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • A Privacy program, run by a Chief Privacy Officer (CPO), or similar role, ensures that applicable statutory, regulatory and contractual data privacy obligations are properly identified and implemented to limit and secure Personal Data (PD) that the organization stores, transmits and processes. • A data privacy team oversees the centralized-management of physical security controls across the enterprise. • Data Protection Officers (DPOs) are assigned to work closely with business units and project teams to ensure data privacy principles are being implemented. • CPO and DPO determine and document the legal authority that permits the collection, use, maintenance and sharing of PD, either generally or in support of a specific program or system need. • As part of the organization’s data privacy program, the CPO publishes a clear set of “data privacy principles”, based on leading data privacy practices, that systems, applications, services, processes and third-parties must adhere to. • A Project Management Office (PMO), or project management function, ensures both cybersecurity & data privacy principles are identified and implemented within ongoing or planned projects. • Administrative processes and technologies empower data subjects to edit and/ or revoke authorizations for the organization to collect, store, processes, transmit share or use their PD. • Up on legitimate request, administrative processes exist to erase PD of an individual, without undue delay.
Privacy (PRI) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to erase personal data of an individual, without delay.
null
P4.3-POF1
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
7.3.6
null
null
null
null
null
null
null
CT.DM-P4
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
P.1.6.3
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
7022(a) 7022(b)(1) 7022(b)(2) 7022(b)(3) 7022(c)(1) 7022(c)(2) 7022(c)(3) 7022(c)(4) 7022(d) 7022(e) 7022(f)(1) 7022(f)(2) 7022(f)(3) 7022(f)(4) 7022(g) 7022(h)
null
6-1-1306(1)(d)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
59.1-577.A.3
null
null
null
null
Art 17.1 Art 17.2 Art 17.3
null
null
Principle 2.6
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
26(e) 40(1)(b) 40(2)(b) 40(3)
null
null
3.1(13)
null
null
null
Article 5.3
null
null
null
null
null
null
Article 30 Article 30.x Article 32 Article 32.1 Article 32.2
null
null
null
null
null
null
null
null
null
null
null
null
Article 17(1) Article 17(1)(a) Article 17(1)(b) Article 17(1)(c) Article 17(1)(d) Article 17(1)(e) Article 17(1)(f)
null
null
null
null
null
null
null
null
null
null
null
Article 47 Article 47(1) Article 47(2) Article 47(3) Article 47(4) Article 47(5) Article 49
null
null
null
Article 30(1) Article 30(2) Article 30(3) Article 30(4) Article 30(5) Article 30(6) Article 30(7) Article 33(1) Article 33(2) Article 34 Article 34(1) Article 34(2) Article 34(3) Article 35(1) Article 35(2)
null
null
null
null
null
null
null
null
null
null
null
null
Art 16.5 Art 16.7
null
null
Art 18.4 Art 18.6
null
null
null
null
null
null
null
null
null
null
null
null
x
null
null
null
R-AM-3 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-GV-1 R-GV-2 R-GV-4 R-GV-5
null
null
null
null
null
null
R-AM-3
null
null
null
null
null
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
null
null
R-GV-1
R-GV-2
null
R-GV-4
R-GV-5
null
null
null
null
null
null
null
null
null
NT-2 NT-3 NT-4 NT-5 NT-6 NT-7 NT-8 NT-9 NT-10 NT-11 NT-12 NT-13 NT-14 MT-1 MT-2 MT-3 MT-4 MT-5 MT-6 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15
null
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Data Privacy
Data Portability
PRI-06.6
Mechanisms exist to export Personal Data (PD) in a structured, commonly used and machine-readable format that allows the data subject to transmit the data to another controller without hindrance.
null
null
Does the organization export Personal Data (PD) in a structured, commonly used and machine-readable format that allows the data subject to transmit the data to another controller without hindrance?
3
Identify
null
X
X
There is no evidence of a capability to export Personal Data (PD) in a structured, commonly used and machine-readable format that allows the data subject to transmit the data to another controller without hindrance.
SP-CMM1 is N/A, since a structured process is required to export Personal Data (PD) in a structured, commonly used and machine-readable format that allows the data subject to transmit the data to another controller without hindrance.
Privacy (PRI) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Privacy management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • The data privacy program is developed to work with IT and cybersecurity staff to ensure that applicable statutory, regulatory and contractual data privacy obligations for Personal Data (PD) are properly identified and implemented across the enterprise. • IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for data privacy management. • A qualified individual is formally assigned as the Chief Privacy Officer (CPO), or similar role, to lead the organization’s data privacy program. This individual may be assigned to multiple duties, including that as a Data Protection Officer (DPO). • The CPO, or similar role, identifies “data privacy principles” that systems, applications, services, processes and third-parties must adhere to, based on leading data privacy practices.
Privacy (PRI) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • A Privacy program, run by a Chief Privacy Officer (CPO), or similar role, ensures that applicable statutory, regulatory and contractual data privacy obligations are properly identified and implemented to limit and secure Personal Data (PD) that the organization stores, transmits and processes. • A data privacy team oversees the centralized-management of physical security controls across the enterprise. • Data Protection Officers (DPOs) are assigned to work closely with business units and project teams to ensure data privacy principles are being implemented. • CPO and DPO determine and document the legal authority that permits the collection, use, maintenance and sharing of PD, either generally or in support of a specific program or system need. • As part of the organization’s data privacy program, the CPO publishes a clear set of “data privacy principles”, based on leading data privacy practices, that systems, applications, services, processes and third-parties must adhere to. • A Project Management Office (PMO), or project management function, ensures both cybersecurity & data privacy principles are identified and implemented within ongoing or planned projects.
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to export Personal Data (PD) in a structured, commonly used and machine-readable format that allows the data subject to transmit the data to another controller without hindrance.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to export Personal Data (PD) in a structured, commonly used and machine-readable format that allows the data subject to transmit the data to another controller without hindrance.
null
P6.7-POF2
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
ID.DE-P4 CT.DM-P2 CT.DM-P6
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
P.5.5.6.11
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
6-1-1306(1)(e)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
59.1-577.A.4
null
null
null
null
Art 20.1 Art 20.2 Art 20.3 Art 20.4
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
38(1) 38(2) 38(3) 38(4) 38(5)(a) 38(5)(b) 38(6) 38(7)
null
null
3.1(6) 3.1(14) 3.1(14)(a) 3.1(14)(b) 3.1(14)(c) 3.1(15)
null
null
null
Article 6.3
null
null
null
null
4-2-3-1
null
Article 21 Article 22 Article 36 Article 36.1 Article 36.2
null
null
null
null
null
null
null
null
null
null
null
null
Article 20(1) Article 20(1)(a) Article 20(1)(b) Article 20(2)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Art 15.1 Art 15.2 Art 15.3
null
null
Art 18.5 Art 40
null
null
null
null
null
null
null
null
null
null
null
null
x
null
null
null
R-AM-3 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-GV-1 R-GV-2 R-GV-4 R-GV-5
null
null
null
null
null
null
R-AM-3
null
null
null
null
null
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
null
null
R-GV-1
R-GV-2
null
R-GV-4
R-GV-5
null
null
null
null
null
null
null
null
null
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Data Privacy
Personal Data Exportability
PRI-06.7
Mechanisms exist to digitally export Personal Data (PD) in a secure manner upon request by the data subject.
null
null
Does the organization digitally export Personal Data (PD) in a secure manner upon request by the data subject?
5
Identify
null
X
null
There is no evidence of a capability to digitally export Personal Data (PD) in a secure manner up on request by the data subject.
SP-CMM1 is N/A, since a structured process is required to digitally export Personal Data (PD) in a secure manner up on request by the data subject.
Privacy (PRI) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Privacy management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • The data privacy program is developed to work with IT and cybersecurity staff to ensure that applicable statutory, regulatory and contractual data privacy obligations for Personal Data (PD) are properly identified and implemented across the enterprise. • IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for data privacy management. • A qualified individual is formally assigned as the Chief Privacy Officer (CPO), or similar role, to lead the organization’s data privacy program. This individual may be assigned to multiple duties, including that as a Data Protection Officer (DPO). • The CPO, or similar role, identifies “data privacy principles” that systems, applications, services, processes and third-parties must adhere to, based on leading data privacy practices. • Administrative processes and technologies export PD in a structured, commonly used and machine-readable format that allows the data subject to transmit the data to another controller without hindrance.
Privacy (PRI) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • A Privacy program, run by a Chief Privacy Officer (CPO), or similar role, ensures that applicable statutory, regulatory and contractual data privacy obligations are properly identified and implemented to limit and secure Personal Data (PD) that the organization stores, transmits and processes. • A data privacy team oversees the centralized-management of physical security controls across the enterprise. • Data Protection Officers (DPOs) are assigned to work closely with business units and project teams to ensure data privacy principles are being implemented. • CPO and DPO determine and document the legal authority that permits the collection, use, maintenance and sharing of PD, either generally or in support of a specific program or system need. • As part of the organization’s data privacy program, the CPO publishes a clear set of “data privacy principles”, based on leading data privacy practices, that systems, applications, services, processes and third-parties must adhere to. • A Project Management Office (PMO), or project management function, ensures both cybersecurity & data privacy principles are identified and implemented within ongoing or planned projects. • Administrative processes and technologies export PD in a structured, commonly used and machine-readable format that allows the data subject to transmit the data to another controller without hindrance.
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to digitally export Personal Data (PD) in a secure manner up on request by the data subject.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to digitally export Personal Data (PD) in a secure manner up on request by the data subject.
null
P6.7-POF2
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
7.3.8
null
null
null
null
null
null
null
CT.DM-P2 CT.DM-P6
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
P.5.5.6.5
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
6-1-1306(1)(e)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
59.1-577.A.4
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
38(1) 38(2) 38(3) 38(4) 38(5)(a) 38(5)(b) 38(6) 38(7)
null
null
3.1(6) 3.1(14) 3.1(14)(a) 3.1(14)(b) 3.1(14)(c)
null
null
null
Article 6.3
null
null
null
null
null
null
Article 21 Article 22
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Article 45
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
R-AM-3 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-GV-1 R-GV-2 R-GV-4 R-GV-5
null
null
null
null
null
null
R-AM-3
null
null
null
null
null
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
null
null
R-GV-1
R-GV-2
null
R-GV-4
R-GV-5
null
null
null
null
null
null
null
null
null
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Data Privacy
Information Sharing With Third Parties
PRI-07
Mechanisms exist to disclose Personal Data (PD) to third-parties only for the purposes identified in the data privacy notice and with the implicit or explicit consent of the data subject.
- Veris (incident sharing) (http://veriscommunity.net)
E-PRI-05 E-TPM-01
Does the organization disclose Personal Data (PD) to third-parties only for the purposes identified in the data privacy notice and with the implicit or explicit consent of the data subject?
9
Identify
X
X
null
There is no evidence of a capability to disclose Personal Data (PD) to third-parties only for the purposes identified in the data privacy notice and with the implicit or explicit consent of the data subject.
SP-CMM1 is N/A, since a structured process is required to disclose Personal Data (PD) to third-parties only for the purposes identified in the data privacy notice and with the implicit or explicit consent of the data subject.
SP-CMM2 is N/A, since a well-defined process is required to disclose Personal Data (PD) to third-parties only for the purposes identified in the data privacy notice and with the implicit or explicit consent of the data subject.
Privacy (PRI) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • A Privacy program, run by a Chief Privacy Officer (CPO), or similar role, ensures that applicable statutory, regulatory and contractual data privacy obligations are properly identified and implemented to limit and secure Personal Data (PD) that the organization stores, transmits and processes. • A data privacy team oversees the centralized-management of physical security controls across the enterprise. • Data Protection Officers (DPOs) are assigned to work closely with business units and project teams to ensure data privacy principles are being implemented. • CPO and DPO determine and document the legal authority that permits the collection, use, maintenance and sharing of PD, either generally or in support of a specific program or system need. • As part of the organization’s data privacy program, the CPO publishes a clear set of “data privacy principles”, based on leading data privacy practices, that systems, applications, services, processes and third-parties must adhere to. • A Project Management Office (PMO), or project management function, ensures both cybersecurity & data privacy principles are identified and implemented within ongoing or planned projects. • Administrative processes exist disclose PD to third-parties only for the purposes identified in the data privacy notice and with the implicit or explicit consent of the individual. • Administrative processes exist include data privacy requirements in contracts and other acquisition-related documents that establish data privacy roles and responsibilities for contractors and service providers.
Privacy (PRI) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to disclose Personal Data (PD) to third-parties only for the purposes identified in the data privacy notice and with the implicit or explicit consent of the data subject.
P6.1
P6.1-POF1
null
null
null
null
null
null
null
DSP-13
null
null
7.2.1 7.2.2 7.2.3
null
null
null
null
null
18.1.4
5.33
18.1.4
A.5.1
7.4.9 7.5 8.4.3 8.5.1 8.5.7
null
null
null
T1213, T1213.001, T1213.002
null
null
null
CT.PO-P2
null
null
null
UL-2
null
null
null
AC-21
null
null
AC-21
AC-21
null
null
null
AC-21
AC-21
null
AC-21
null
null
AC-21
AC-21
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
P.5.4.1
2.5A 2.11A
null
null
null
null
null
COMP:SG1.SP3 COMP:SG3.SP1 EXD:SG3.SP1 OTA:SG3.SP2
null
5.1.1.2 5.1.1.3 5.1.1.4 5.1.1.5 5.1.1.6 5.1.1.7 5.1.1.8 5.1.4
null
null
null
null
null
null
UL-2
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
§ 1232g
null
null
null
null
null
null
null
null
1.9.4 AC-21
null
null
null
null
null
Principle 3
null
null
5.1
null
null
null
null
45.48.420 45.48.430
null
7012(g) 7012(g)(1) 7012(g)(2) 7012(g)(3)(A) 7012(g)(3)(B) 7012(g)(3)(C) 7022(c)(3) 7022(c)(4) 7050(a)(1) 7050(a)(2) 7050(a)(3) 7050(a)(3)(A) 7050(a)(3)(B) 7050(a)(4) 7050(a)(5) 7050(b) 7050(b)(1) 7050(b)(2) 7050(c) 7050(d) 7050(e) 7050(f) 7050(g) 7051(a)(1) 7051(a)(2) 7051(a)(3) 7051(a)(4) 7051(a)(5) 7051(a)(6) 7051(a)(7) 7051(a)(8) 7051(a)(9) 7051(a)(10) 7051(b) 7051(c) 7052(a) 7052(b) 7053(a)(1) 7053(a)(2) 7053(a)(3) 7053(a)(4) 7053(a)(5) 7053(a)(6) 7053(b)
null
6-1-1305(7) 6-1-1305(8)(a) 6-1-1305(8)(b) 6-1-1307(2) 6-1-1307(3)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
59.1-577.A.5 59.1-577.A.5(i) 59.1-577.A.5(ii) 59.1-577.A.5(iii)
null
null
null
null
Art 6.1 Art 6.4 Art 15.2 Art 20.2 Art 26.1 Art 26.2 Art 26.3 Art 44 Art 45.1 Art 45.2 Art 46.1 Art 46.2 Art 46.3 Art 47.1 Art 47.2 Art 48 Art 49.1 Art 49.2 Art 49.6
null
null
Principle 2.3.a Principle 2.3.b(i) Principle 2.3.b(ii) Principle 2.3.b(iii) Principle 2.3.b(iv) Principle 2.3.b(v) Principle 2.3.b(vi) Principle 2.7.d
Sec 10
null
Art 14 Art 27
null
null
null
null
null
null
null
null
null
10.5
null
null
25(h) 42(2)(a) 42(2)(b) 42(3)
null
null
2.4(b)
null
null
null
null
null
null
null
null
null
null
Article 5
null
Sec 18 Sec 28 Sec 30 Sec 31
null
null
null
null
null
null
null
null
null
null
Article 15(2)
null
null
null
null
APP 7 APP 8
null
null
null
null
null
null
Article 20 Article 21 Article 22 Article 27 Article 38(3) Article 41 Article 42 Article 49
null
null
null
Article 23(1)(i) Article 23(1)(ii) Article 23(1)(iii) Article 23(1)(iv) Article 23(2) Article 23(2)(i) Article 23(2)(ii) Article 23(2)(iii) Article 23(2)(iv) Article 23(2)(v) Article 23(2)(vi) Article 23(2)(vii) Article 23(2)(viii) Article 23(3) Article 23(4) Article 23(5)(i) Article 23(5)(ii) Article 23(5)(iii) Article 23(6) Article 23(1) Article 26(1) Article 26(1)(i) Article 26(1)(ii) Article 26(2) Article 26(3) Article 26(4) Article 26-2(1) Article 26-2(1)(i) Article 26-2(1)(ii) Article 26-2(2) Article 26-2(3)
18.1.4
Sec 9
null
20.1.6.C.01 20.1.6.C.02 20.1.7.C.01 20.1.7.C.02 20.1.8.C.01 20.1.9.C.01 20.1.10.C.01 20.1.10.C.02 20.1.11.C.01 20.1.12.C.01 20.1.13.C.01 20.2.3.C.01 20.2.4.C.01 20.2.5.C.01 20.2.6.C.01 20.2.6.C.02 20.2.6.C.03 20.2.7.C.01 20.2.8.C.01 20.2.9.C.01 20.2.9.C.02 20.2.9.C.03 20.2.9.C.04 20.2.10.C.01 20.2.10.C.02 20.2.11.C.01 20.2.11.C.02 20.2.11.C.03
null
null
Sec 26
null
null
Art 17 Art 26 Art 27
null
null
Art 11.1 Art 11.2 Art 11.3 Art 11.4 Art 12.1 Art 16.4
null
null
null
null
null
Sec 20 Sec 23
null
Art 26
null
null
null
Art 17 Art 23
null
null
null
x
null
null
x
R-AM-3 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-GV-1 R-GV-2 R-GV-4 R-GV-5
null
null
null
null
null
null
R-AM-3
null
null
null
null
null
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
null
null
R-GV-1
R-GV-2
null
R-GV-4
R-GV-5
null
null
null
null
null
null
null
null
null
NT-2 NT-3 NT-4 NT-5 NT-6 NT-7 NT-8 NT-9 NT-10 NT-11 NT-12 NT-13 NT-14 MT-1 MT-2 MT-3 MT-4 MT-5 MT-6 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15
null
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Data Privacy
Data Privacy Requirements for Contractors & Service Providers
PRI-07.1
Mechanisms exist to include data privacy requirements in contracts and other acquisition-related documents that establish data privacy roles and responsibilities for contractors and service providers.
null
E-PRI-05 E-TPM-01
Does the organization include data privacy requirements in contracts and other acquisition-related documents that establish data privacy roles and responsibilities for contractors and service providers?
10
Identify
X
X
X
There is no evidence of a capability to include data privacy requirements in contracts and other acquisition-related documents that establish data privacy roles and responsibilities for contractors and service providers.
SP-CMM1 is N/A, since a structured process is required to include data privacy requirements in contracts and other acquisition-related documents that establish data privacy roles and responsibilities for contractors and service providers.
SP-CMM2 is N/A, since a well-defined process is required to include data privacy requirements in contracts and other acquisition-related documents that establish data privacy roles and responsibilities for contractors and service providers.
Privacy (PRI) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • A Privacy program, run by a Chief Privacy Officer (CPO), or similar role, ensures that applicable statutory, regulatory and contractual data privacy obligations are properly identified and implemented to limit and secure Personal Data (PD) that the organization stores, transmits and processes. • A data privacy team oversees the centralized-management of physical security controls across the enterprise. • Data Protection Officers (DPOs) are assigned to work closely with business units and project teams to ensure data privacy principles are being implemented. • CPO and DPO determine and document the legal authority that permits the collection, use, maintenance and sharing of PD, either generally or in support of a specific program or system need. • As part of the organization’s data privacy program, the CPO publishes a clear set of “data privacy principles”, based on leading data privacy practices, that systems, applications, services, processes and third-parties must adhere to. • A Project Management Office (PMO), or project management function, ensures both cybersecurity & data privacy principles are identified and implemented within ongoing or planned projects. • Administrative processes exist disclose PD to third-parties only for the purposes identified in the data privacy notice and with the implicit or explicit consent of the individual. • Administrative processes exist include data privacy requirements in contracts and other acquisition-related documents that establish data privacy roles and responsibilities for contractors and service providers.
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to include data privacy requirements in contracts and other acquisition-related documents that establish data privacy roles and responsibilities for contractors and service providers.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to include data privacy requirements in contracts and other acquisition-related documents that establish data privacy roles and responsibilities for contractors and service providers.
P6.4
P6.1-POF1
null
15.4
null
15.4
15.4
null
null
DSP-13 IPY-04 STA-04 STA-09
CLS-04
null
4.2.3 7.2.4
null
null
null
null
null
18.1.4
5.31 5.33
18.1.4
A.7.1
7.2.6 8.2.5 8.5.8
null
null
null
null
null
null
null
ID.DE-P3
null
null
null
AR-3
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
PO.1 PO.1.1 PO.1.2 PO.1.3
null
GV.SC-10
A01:2021 A02:2021 A03:2021 A04:2021 A05:2021 A06:2021 A07:2021 A08:2021 A09:2021 A10:2021
null
null
null
null
null
null
null
null
null
null
null
P.9.2
2.8A
9.2
null
null
null
null
AM:SG1.SP1 EXD:SG3.SP1 SC:SG1.SP2
null
5.1.1.2 5.1.1.3 5.1.1.4 5.1.1.5 5.1.1.6 5.1.1.7 5.1.1.8 5.1.4
null
null
null
null
null
null
AR-3
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
§ 1232g
null
null
null
null
164.308(b)(3)
null
null
null
1.9.3 1.9.5
null
null
null
null
null
Principle 3
null
null
null
null
null
null
null
null
null
7012(g) 7012(g)(1) 7012(g)(2) 7012(g)(3)(A) 7012(g)(3)(B) 7012(g)(3)(C) 7050(a)(1) 7050(a)(2) 7050(a)(3) 7050(a)(3)(A) 7050(a)(3)(B) 7050(a)(4) 7050(a)(5) 7050(b) 7050(b)(1) 7050(b)(2) 7050(c) 7050(d) 7050(e) 7050(f) 7050(g) 7051(a)(1) 7051(a)(2) 7051(a)(3) 7051(a)(4) 7051(a)(5) 7051(a)(6) 7051(a)(7) 7051(a)(8) 7051(a)(9) 7051(a)(10) 7051(b) 7051(c) 7052(a) 7052(b) 7053(a)(1) 7053(a)(2) 7053(a)(3) 7053(a)(4) 7053(a)(5) 7053(a)(6) 7053(b)
null
6-1-1305(3)(b) 6-1-1305(5) 6-1-1305(5)(a) 6-1-1305(5)(b) 6-1-1305(5)(c) 6-1-1305(5)(d) 6-1-1305(5)(d)(I) 6-1-1305(5)(d)(I)(A) 6-1-1305(5)(d)(I)(B) 6-1-1305(6) 6-1-1305(7) 6-1-1307(2) 6-1-1307(3)
null
null
Sec 45(a) Sec 45(b) Sec 45(c) Sec 45(d) Sec 50
null
null
null
null
null
null
null
null
null
null
null
null
59.1-578.B 59.1-579.A 59.1-579.A.1 59.1-579.A.2 59.1-579.A.3 59.1-579.B 59.1-579.B.1 59.1-579.B.2 59.1-579.B.3 59.1-579.B.4 59.1-579.B.5 59.1-579.C 59.1-579.D 59.1-581.A.3 59.1-582.A.1 59.1-582.A.2 59.1-582.A.3 59.1-582.A.4 59.1-582.A.5 59.1-582.A.6 59.1-582.A.7 59.1-582.A.8 59.1-582.A.9 59.1-582.B.1 59.1-582.B.2 59.1-582.B.3 59.1-582.B.4 59.1-582.C 59.1-582.D 59.1-582.E 59.1-582.F 59.1-582.G 59.1-582.H
null
null
null
null
Art 6.1 Art 6.4 Art 26.1 Art 26.2 Art 26.3 Art 28.1 Art 28.2 Art 28.3 Art 28.4 Art 28.5 Art 28.6 Art 28.9 Art 28.10 Art 29
null
null
Principle 2.3.b(i) Principle 2.3.b(ii) Principle 2.3.b(iii) Principle 2.3.b(iv) Principle 2.3.b(v) Principle 2.3.b(vi) Principle 2.7.a.i Principle 2.7.a.ii Principle 2.7.a.iii Principle 2.7.b Principle 2.7.c Principle 2.7.d Principle 3.10.a.i Principle 3.10.a.ii Principle 3.10.a.ii.1 Principle 3.10.a.ii.2 Principle 3.10.a.ii.3 Principle 3.10.a.iii Principle 3.10.b.i Principle 3.10.c.i
Sec 10
null
Art 14 Art 27
null
null
null
null
null
HR-06 PI-02
null
null
null
11.1
null
null
25(h) 40(2) 40(2)(a) 40(2)(b) 40(3) 42(2)(a) 42(2)(b) 42(3)
null
null
2.4(b) 2.7
null
null
null
Article 12
null
null
TPC-25
null
null
null
Article 5 Article 11 Article 30 Article 30.x Article 32 Article 32.1 Article 32.2 Article 33 Article 45 Article 45.x Article 46
null
Sec 11 Sec 20 Sec 21
null
null
null
null
null
null
A4.a
null
null
null
Article 3 Article 28(1) Article 28(2) Article 28(3)(a) Article 28(3)(b) Article 28(3)(c) Article 28(3)(d) Article 28(3)(e) Article 28(3)(f) Article 28(3)(g) Article 28(3)(h) Article 28(4) Article 28(5) Article 28(6) Article 28(7) Article 28(8) Article 28(9) Article 28(10) Article 29
null
null
null
null
APP 7
null
null
null
null
null
null
Article 20 Article 21 Article 27 Article 38(3) Article 42
null
null
null
Article 22 Article 23(1)(i) Article 23(1)(ii) Article 23(1)(iii) Article 23(1)(iv) Article 23(2) Article 23(2)(i) Article 23(2)(ii) Article 23(2)(iii) Article 23(2)(iv) Article 23(2)(v) Article 23(2)(vi) Article 23(2)(vii) Article 23(2)(viii) Article 23(3) Article 23(4) Article 23(5)(i) Article 23(5)(ii) Article 23(5)(iii) Article 23(6) Article 23(1) Article 26(1) Article 26(1)(i) Article 26(1)(ii) Article 26(2) Article 26(3) Article 26(4) Article 26-2(1) Article 26-2(1)(i) Article 26-2(1)(ii) Article 26-2(2) Article 26-2(3)
18.1.4
null
null
null
Principle 5 P5-(a) P5-(a)(i) P5-(a)(ii) P5-(a)(iii) P5-(b)
null
null
null
null
Art 26 Art 27
null
null
Art 11.4
null
null
Art 35 Art 39
null
null
Sec 20 Sec 23
null
null
null
null
null
Art 17 Art 23
null
null
null
x
null
x
x
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-2 R-AM-3 R-BC-2 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-IR-1 R-IR-2 R-IR-4 R-SA-1
R-AC-1
R-AC-2
R-AC-3
R-AC-4
null
R-AM-2
R-AM-3
null
R-BC-2
null
null
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
null
null
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
R-IR-1
R-IR-2
null
R-IR-4
R-SA-1
null
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Data Privacy
Joint Processing of Personal Data
PRI-07.2
Mechanisms exist to clearly define and communicate the organization's role in processing Personal Data (PD) in the data processing ecosystem.
null
E-PRI-05 E-TPM-01
Does the organization clearly define and communicate the organization's role in processing Personal Data (PD) in the data processing ecosystem?
5
Identify
null
X
null
There is no evidence of a capability to clearly define and communicate the organization's role in processing Personal Data (PD) in the data processing ecosystem.
SP-CMM1 is N/A, since a structured process is required to clearly define and communicate the organization's role in processing Personal Data (PD) in the data processing ecosystem.
SP-CMM2 is N/A, since a well-defined process is required to clearly define and communicate the organization's role in processing Personal Data (PD) in the data processing ecosystem.
Privacy (PRI) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • A Privacy program, run by a Chief Privacy Officer (CPO), or similar role, ensures that applicable statutory, regulatory and contractual data privacy obligations are properly identified and implemented to limit and secure Personal Data (PD) that the organization stores, transmits and processes. • A data privacy team oversees the centralized-management of physical security controls across the enterprise. • Data Protection Officers (DPOs) are assigned to work closely with business units and project teams to ensure data privacy principles are being implemented. • CPO and DPO determine and document the legal authority that permits the collection, use, maintenance and sharing of PD, either generally or in support of a specific program or system need. • As part of the organization’s data privacy program, the CPO publishes a clear set of “data privacy principles”, based on leading data privacy practices, that systems, applications, services, processes and third-parties must adhere to. • A Project Management Office (PMO), or project management function, ensures both cybersecurity & data privacy principles are identified and implemented within ongoing or planned projects. • Administrative processes exist disclose PD to third-parties only for the purposes identified in the data privacy notice and with the implicit or explicit consent of the individual. • Administrative processes exist include data privacy requirements in contracts and other acquisition-related documents that establish data privacy roles and responsibilities for contractors and service providers.
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to clearly define and communicate the organization's role in processing Personal Data (PD) in the data processing ecosystem.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to clearly define and communicate the organization's role in processing Personal Data (PD) in the data processing ecosystem.
null
null
null
null
null
null
null
null
null
DSP-13
null
null
null
null
null
null
null
null
null
null
null
null
7.2.7 7.4.9 8.4.3 8.5.7
null
null
null
null
null
null
null
ID.BE-P1
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
C.1
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
7012(g) 7012(g)(1) 7012(g)(2) 7012(g)(3)(A) 7012(g)(3)(B) 7012(g)(3)(C) 7050(a)(1) 7050(a)(2) 7050(a)(3) 7050(a)(3)(A) 7050(a)(3)(B) 7050(a)(4) 7050(a)(5) 7050(b) 7050(b)(1) 7050(b)(2) 7050(c) 7050(d) 7050(e) 7050(f) 7050(g) 7051(a)(1) 7051(a)(2) 7051(a)(3) 7051(a)(4) 7051(a)(5) 7051(a)(6) 7051(a)(7) 7051(a)(8) 7051(a)(9) 7051(a)(10) 7051(b) 7051(c) 7052(a) 7052(b) 7053(a)(1) 7053(a)(2) 7053(a)(3) 7053(a)(4) 7053(a)(5) 7053(a)(6) 7053(b)
null
6-1-1305(7)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
59.1-579.A 59.1-579.A.1 59.1-579.A.2 59.1-579.A.3 59.1-579.B 59.1-579.B.1 59.1-579.B.2 59.1-579.B.3 59.1-579.B.4 59.1-579.B.5 59.1-579.C 59.1-579.D
null
null
null
null
null
null
null
Principle 2.3.b(i) Principle 2.3.b(ii) Principle 2.3.b(iii) Principle 2.3.b(iv) Principle 2.3.b(v) Principle 2.3.b(vi)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
42(2)(a) 42(2)(b) 42(3)
null
null
null
null
null
null
null
null
null
null
null
null
null
Article 5 Article 11 Article 30 Article 30.x Article 32 Article 32.1 Article 32.2 Article 33 Article 43
null
null
null
null
null
null
null
null
null
null
null
null
Article 15(2) Article 26(1) Article 26(2) Article 26(3)
null
null
null
null
null
null
null
null
null
null
null
Article 20 Article 21 Article 27 Article 38(3)
null
null
null
Article 22 Article 23(1)(i) Article 23(1)(ii) Article 23(1)(iii) Article 23(1)(iv) Article 23(2) Article 23(2)(i) Article 23(2)(ii) Article 23(2)(iii) Article 23(2)(iv) Article 23(2)(v) Article 23(2)(vi) Article 23(2)(vii) Article 23(2)(viii) Article 23(3) Article 23(4) Article 23(5)(i) Article 23(5)(ii) Article 23(5)(iii) Article 23(6) Article 23(1) Article 26(1) Article 26(1)(i) Article 26(1)(ii) Article 26(2) Article 26(3) Article 26(4) Article 26-2(1) Article 26-2(1)(i) Article 26-2(1)(ii) Article 26-2(2) Article 26-2(3)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-2 R-AM-3 R-BC-2 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-IR-1 R-IR-2 R-IR-4 R-SA-1
R-AC-1
R-AC-2
R-AC-3
R-AC-4
null
R-AM-2
R-AM-3
null
R-BC-2
null
null
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
null
null
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
R-IR-1
R-IR-2
null
R-IR-4
R-SA-1
null
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Data Privacy
Obligation To Inform Third-Parties
PRI-07.3
Mechanisms exist to inform applicable third-parties of any modification, deletion or other change that affects shared Personal Data (PD).
- CimTrak Integrity Suite (https://www.cimcor.com/cimtrak/)
null
Does the organization inform applicable third-parties of any modification, deletion or other change that affects shared Personal Data (PD)?
5
Identify
null
X
null
There is no evidence of a capability to inform applicable third-parties of any modification, deletion or other change that affects shared Personal Data (PD).
SP-CMM1 is N/A, since a structured process is required to inform applicable third-parties of any modification, deletion or other change that affects shared Personal Data (PD).
SP-CMM2 is N/A, since a well-defined process is required to inform applicable third-parties of any modification, deletion or other change that affects shared Personal Data (PD).
Privacy (PRI) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • A Privacy program, run by a Chief Privacy Officer (CPO), or similar role, ensures that applicable statutory, regulatory and contractual data privacy obligations are properly identified and implemented to limit and secure Personal Data (PD) that the organization stores, transmits and processes. • A data privacy team oversees the centralized-management of physical security controls across the enterprise. • Data Protection Officers (DPOs) are assigned to work closely with business units and project teams to ensure data privacy principles are being implemented. • CPO and DPO determine and document the legal authority that permits the collection, use, maintenance and sharing of PD, either generally or in support of a specific program or system need. • As part of the organization’s data privacy program, the CPO publishes a clear set of “data privacy principles”, based on leading data privacy practices, that systems, applications, services, processes and third-parties must adhere to. • A Project Management Office (PMO), or project management function, ensures both cybersecurity & data privacy principles are identified and implemented within ongoing or planned projects. • Administrative processes exist include data privacy requirements in contracts and other acquisition-related documents to inform applicable third-parties of any modification, deletion or other change that affects shared PD.
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to inform applicable third-parties of any modification, deletion or other change that affects shared Personal Data (PD).
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to inform applicable third-parties of any modification, deletion or other change that affects shared Personal Data (PD).
null
null
null
null
null
null
null
null
null
DSP-13
null
null
null
null
null
null
null
null
null
null
null
null
7.3.7 7.4.9 8.4.3
null
null
null
null
null
null
null
CM.AW-P5 CM.AW-P7
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
P.5.5.6.4
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
7022(c)(3) 7022(c)(4) 7050(a)(1) 7050(a)(2) 7050(a)(3) 7050(a)(3)(A) 7050(a)(3)(B) 7050(a)(4) 7050(a)(5) 7050(b) 7050(b)(1) 7050(b)(2) 7050(c) 7050(d) 7050(e) 7050(f) 7050(g) 7051(a)(1) 7051(a)(2) 7051(a)(3) 7051(a)(4) 7051(a)(5) 7051(a)(6) 7051(a)(7) 7051(a)(8) 7051(a)(9) 7051(a)(10) 7051(b) 7051(c) 7052(a) 7052(b) 7053(a)(1) 7053(a)(2) 7053(a)(3) 7053(a)(4) 7053(a)(5) 7053(a)(6) 7053(b)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Principle 2.3.b(i) Principle 2.3.b(ii) Principle 2.3.b(iii) Principle 2.3.b(iv) Principle 2.3.b(v) Principle 2.3.b(vi)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
40(2) 40(2)(a) 40(2)(b) 40(3)
null
null
3.1(10)
null
null
null
null
null
null
null
null
null
null
Article 30 Article 30.x Article 32 Article 32.1 Article 32.2 Article 33
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Article 46
null
null
null
Article 22 Article 23(1)(i) Article 23(1)(ii) Article 23(1)(iii) Article 23(1)(iv) Article 23(2) Article 23(2)(i) Article 23(2)(ii) Article 23(2)(iii) Article 23(2)(iv) Article 23(2)(v) Article 23(2)(vi) Article 23(2)(vii) Article 23(2)(viii) Article 23(3) Article 23(4) Article 23(5)(i) Article 23(5)(ii) Article 23(5)(iii) Article 23(6) Article 23(1)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
R-AM-3 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-GV-1 R-GV-2 R-GV-4 R-GV-5 R-SA-1
null
null
null
null
null
null
R-AM-3
null
null
null
null
null
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
null
null
R-GV-1
R-GV-2
null
R-GV-4
R-GV-5
null
null
null
null
null
null
null
R-SA-1
null
NT-2 NT-3 NT-4 NT-5 NT-6 NT-7 NT-8 NT-9 NT-10 NT-11 NT-12 NT-13 NT-14 MT-1 MT-2 MT-3 MT-4 MT-5 MT-6 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15
null
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Data Privacy
Reject Unauthorized Disclosure Requests
PRI-07.4
Mechanisms exist to reject unauthorized disclosure requests.
- Authorized Agent
null
Does the organization reject unauthorized disclosure requests?
5
Identify
null
X
null
There is no evidence of a capability to reject unauthorized disclosure requests.
SP-CMM1 is N/A, since a structured process is required to reject unauthorized disclosure requests.
SP-CMM2 is N/A, since a well-defined process is required to reject unauthorized disclosure requests.
Privacy (PRI) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • A Privacy program, run by a Chief Privacy Officer (CPO), or similar role, ensures that applicable statutory, regulatory and contractual data privacy obligations are properly identified and implemented to limit and secure Personal Data (PD) that the organization stores, transmits and processes. • A data privacy team oversees the centralized-management of physical security controls across the enterprise. • Data Protection Officers (DPOs) are assigned to work closely with business units and project teams to ensure data privacy principles are being implemented. • CPO and DPO determine and document the legal authority that permits the collection, use, maintenance and sharing of PD, either generally or in support of a specific program or system need. • As part of the organization’s data privacy program, the CPO publishes a clear set of “data privacy principles”, based on leading data privacy practices, that systems, applications, services, processes and third-parties must adhere to. • A Project Management Office (PMO), or project management function, ensures both cybersecurity & data privacy principles are identified and implemented within ongoing or planned projects. • The CPO and DPO establish criteria for when it is necessary to reject a disclosure requests (e.g., unauthorized / fraudulent request).
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to reject unauthorized disclosure requests.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to reject unauthorized disclosure requests.
null
P5.1-POF4 P5.2-POF1 P5.2-POF3
null
null
null
null
null
null
null
DSP-11 DSP-18
null
null
null
null
null
null
null
null
null
null
null
null
8.2.4 8.5.5
null
null
null
null
null
null
null
CT.DM-P1
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
P.5.5.6.10
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
7023(h)
null
6-1-1306(1)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
59.1-577.B.4
null
null
null
null
null
null
null
Principle 3.8.c.i Principle 3.8.c.ii Principle 3.8.e.i Principle 3.8.e.i.1 Principle 3.8.e.i.2 Principle 3.8.e.i.3 Principle 3.8.e.i.4 Principle 3.8.e.i.5 Principle 3.8.c.ii Principle 3.8.f.i Principle 3.8.f.ii Principle 3.8.f.iii Principle 3.8.g.i Principle 3.8.h.i
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Article 21.2 Article 22.2
null
null
null
null
null
null
null
null
null
null
null
null
Article 12(6)
null
null
null
null
null
null
null
null
null
null
null
Article 45 Article 46 Article 49
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
R-AC-4 R-AM-2 R-AM-3 R-BC-2 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-GV-1 R-GV-2 R-GV-4 R-GV-5 R-SA-1
null
null
null
R-AC-4
null
R-AM-2
R-AM-3
null
R-BC-2
null
null
null
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
null
null
R-GV-1
R-GV-2
null
R-GV-4
R-GV-5
null
null
null
null
null
null
null
R-SA-1
null
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Data Privacy
Testing, Training & Monitoring
PRI-08
Mechanisms exist to conduct cybersecurity & data privacy testing, training and monitoring activities
null
null
Does the organization conduct cybersecurity & data privacy testing, training and monitoring activities
8
Identify
X
X
null
There is no evidence of a capability to conduct cybersecurity & data privacy testing, training and monitoring activities
SP-CMM1 is N/A, since a structured process is required to conduct cybersecurity & data privacy testing, training and monitoring activities
SP-CMM2 is N/A, since a well-defined process is required to conduct cybersecurity & data privacy testing, training and monitoring activities
Privacy (PRI) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • A Privacy program, run by a Chief Privacy Officer (CPO), or similar role, ensures that applicable statutory, regulatory and contractual data privacy obligations are properly identified and implemented to limit and secure Personal Data (PD) that the organization stores, transmits and processes. • A data privacy team oversees the centralized-management of physical security controls across the enterprise. • Data Protection Officers (DPOs) are assigned to work closely with business units and project teams to ensure data privacy principles are being implemented. • CPO and DPO determine and document the legal authority that permits the collection, use, maintenance and sharing of PD, either generally or in support of a specific program or system need. • As part of the organization’s data privacy program, the CPO publishes a clear set of “data privacy principles”, based on leading data privacy practices, that systems, applications, services, processes and third-parties must adhere to. • A Project Management Office (PMO), or project management function, ensures both cybersecurity & data privacy principles are identified and implemented within ongoing or planned projects. • Administrative processes exist address the use of PD for internal testing, training and research that complies with applicable statutory, regulatory and contractual obligations.
Privacy (PRI) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to conduct cybersecurity & data privacy testing, training and monitoring activities
P6.5 P8.0
P8.1-POF6
null
null
null
null
null
null
null
null
null
null
1.2.6 10.2.3 10.2.4 10.2.5
null
null
null
null
null
18.2.2 18.2.3
5.36 8.8
18.2.2 18.2.3
A.10.3
6.15.2.2 6.15.2.3
null
null
null
null
null
null
null
null
null
null
null
AR-4
null
null
null
PM-14
PM-14
null
null
null
null
null
null
null
null
null
PM-14
null
null
PM-14
PM-14
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
E.1.6.1
null
null
null
null
null
null
COMP:SG3.SP1 COMP:SG3.SP3 EXD:SG4.SP1 IMC:SG2.SP1
null
null
null
null
null
null
null
null
AR-4
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
PM-14
null
null
null
null
null
null
null
null
Art 32.1 Art 32.2
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Sec 19
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
18.2.2 18.2.3
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
x
null
null
x
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-2 R-AM-3 R-BC-1 R-BC-2 R-BC-3 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1 R-SA-2
R-AC-1
R-AC-2
R-AC-3
R-AC-4
null
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
null
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
null
null
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
R-SA-2
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Data Privacy
Personal Data Lineage
PRI-09
Mechanisms exist to utilize a record of processing activities to maintain a record of Personal Data (PD) that is stored, transmitted and/or processed under the organization's responsibility.
The organization should determine and securely maintain the necessary records in support of its obligations for the processing of PD.
null
Does the organization utilize a record of processing activities to maintain a record of Personal Data (PD) that is stored, transmitted and/or processed under the organization's responsibility?
5
Identify
null
X
null
There is no evidence of a capability to utilize a record of processing activities to maintain a record of Personal Data (PD) that is stored, transmitted and/ or processed under the organization's responsibility.
SP-CMM1 is N/A, since a structured process is required to utilize a record of processing activities to maintain a record of Personal Data (PD) that is stored, transmitted and/ or processed under the organization's responsibility.
SP-CMM2 is N/A, since a well-defined process is required to utilize a record of processing activities to maintain a record of Personal Data (PD) that is stored, transmitted and/ or processed under the organization's responsibility.
Privacy (PRI) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • A Privacy program, run by a Chief Privacy Officer (CPO), or similar role, ensures that applicable statutory, regulatory and contractual data privacy obligations are properly identified and implemented to limit and secure Personal Data (PD) that the organization stores, transmits and processes. • A data privacy team oversees the centralized-management of physical security controls across the enterprise. • Data Protection Officers (DPOs) are assigned to work closely with business units and project teams to ensure data privacy principles are being implemented. • CPO and DPO determine and document the legal authority that permits the collection, use, maintenance and sharing of PD, either generally or in support of a specific program or system need. • As part of the organization’s data privacy program, the CPO publishes a clear set of “data privacy principles”, based on leading data privacy practices, that systems, applications, services, processes and third-parties must adhere to. • A Project Management Office (PMO), or project management function, ensures both cybersecurity & data privacy principles are identified and implemented within ongoing or planned projects.
Privacy (PRI) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to utilize a record of processing activities to maintain a record of Personal Data (PD) that is stored, transmitted and/ or processed under the organization's responsibility.
null
null
null
null
null
null
null
null
null
null
DAT-03
null
null
null
null
null
null
null
null
null
null
null
7.2.8 8.2.6 8.5.3
null
null
null
null
null
null
null
CM.AW-P4 CM.AW-P6
null
null
null
null
null
null
null
SA-4(12)
null
null
null
null
SA-4(12)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
P.5.2
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
SA-4(12)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Art 30.1 Art 30.2 Art 30.3 Art 30.4 Art 30.5
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Sec 17
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
x
null
null
null
R-AM-3 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-GV-1 R-GV-2 R-GV-4 R-GV-5
null
null
null
null
null
null
R-AM-3
null
null
null
null
null
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
null
null
R-GV-1
R-GV-2
null
R-GV-4
R-GV-5
null
null
null
null
null
null
null
null
null
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Data Privacy
Data Quality Management
PRI-10
Mechanisms exist to issue guidelines ensuring and maximizing the quality, utility, objectivity, integrity, impact determination and de-identification of Personal Data (PD) across the information lifecycle.
null
null
Does the organization issue guidelines ensuring and maximizing the quality, utility, objectivity, integrity, impact determination and de-identification of Personal Data (PD) across the information lifecycle?
5
Identify
X
X
null
There is no evidence of a capability to issue guidelines ensuring and maximizing the quality, utility, objectivity, integrity, impact determination and de-identification of Personal Data (PD) across the information lifecycle.
SP-CMM1 is N/A, since a structured process is required to issue guidelines ensuring and maximizing the quality, utility, objectivity, integrity, impact determination and de-identification of Personal Data (PD) across the information lifecycle.
SP-CMM2 is N/A, since a well-defined process is required to issue guidelines ensuring and maximizing the quality, utility, objectivity, integrity, impact determination and de-identification of Personal Data (PD) across the information lifecycle.
Privacy (PRI) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • A Privacy program, run by a Chief Privacy Officer (CPO), or similar role, ensures that applicable statutory, regulatory and contractual data privacy obligations are properly identified and implemented to limit and secure Personal Data (PD) that the organization stores, transmits and processes. • A data privacy team oversees the centralized-management of physical security controls across the enterprise. • Data Protection Officers (DPOs) are assigned to work closely with business units and project teams to ensure data privacy principles are being implemented. • CPO and DPO determine and document the legal authority that permits the collection, use, maintenance and sharing of PD, either generally or in support of a specific program or system need. • As part of the organization’s data privacy program, the CPO publishes a clear set of “data privacy principles”, based on leading data privacy practices, that systems, applications, services, processes and third-parties must adhere to. • A Project Management Office (PMO), or project management function, ensures both cybersecurity & data privacy principles are identified and implemented within ongoing or planned projects. • A Chief Data Officer (CDO), or similar function, oversees processes to ensure the quality, utility, objectivity, integrity, impact determination and de-identification of PD across the information lifecycle, including methods to identify and eliminate potential biases.
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to issue guidelines ensuring and maximizing the quality, utility, objectivity, integrity, impact determination and de-identification of Personal Data (PD) across the information lifecycle.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to issue guidelines ensuring and maximizing the quality, utility, objectivity, integrity, impact determination and de-identification of Personal Data (PD) across the information lifecycle.
P7.0 P7.1
P7.1-POF1 P7.1-POF2
null
null
null
null
null
null
null
null
null
null
9.2.1
null
null
null
null
null
null
null
null
null
7.4.3
5.7
null
null
null
null
null
null
CT.PO-P4 CT.DM-P8
null
null
null
null
null
null
null
PM-22 PM-23 PM-24
PM-24
null
null
null
PM-22 PM-23
null
null
null
null
null
PM-22 PM-23
null
null
PM-22 PM-23
PM-22
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
P.5.3.1
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Art 5.1
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Article 5.4 Article 11
null
Sec 4
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Article 8
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Art 6.5
null
null
null
null
null
null
null
null
Art 7
null
null
null
x
null
x
null
R-AM-2 R-AM-3 R-BC-1 R-BC-2 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-GV-1 R-GV-2 R-GV-4 R-GV-5
null
null
null
null
null
R-AM-2
R-AM-3
R-BC-1
R-BC-2
null
null
null
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
null
null
R-GV-1
R-GV-2
null
R-GV-4
R-GV-5
null
null
null
null
null
null
null
null
null
NT-2 NT-3 NT-4 NT-5 NT-6 NT-7 NT-8 NT-9 NT-10 NT-11 NT-12 NT-13 NT-14 MT-1 MT-2 MT-3 MT-4 MT-5 MT-6 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15
null
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Data Privacy
Automation
PRI-10.1
Automated mechanisms exist to support the evaluation of data quality across the information lifecycle.
null
null
Does the organization use automated mechanisms to support the evaluation of data quality across the information lifecycle?
1
Identify
null
X
X
There is no evidence of a capability to support the evaluation of data quality across the information lifecycle.
SP-CMM1 is N/A, since a structured process is required to support the evaluation of data quality across the information lifecycle.
SP-CMM2 is N/A, since a well-defined process is required to support the evaluation of data quality across the information lifecycle.
Privacy (PRI) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • A Privacy program, run by a Chief Privacy Officer (CPO), or similar role, ensures that applicable statutory, regulatory and contractual data privacy obligations are properly identified and implemented to limit and secure Personal Data (PD) that the organization stores, transmits and processes. • A data privacy team oversees the centralized-management of physical security controls across the enterprise. • Data Protection Officers (DPOs) are assigned to work closely with business units and project teams to ensure data privacy principles are being implemented. • CPO and DPO determine and document the legal authority that permits the collection, use, maintenance and sharing of PD, either generally or in support of a specific program or system need. • As part of the organization’s data privacy program, the CPO publishes a clear set of “data privacy principles”, based on leading data privacy practices, that systems, applications, services, processes and third-parties must adhere to. • A Project Management Office (PMO), or project management function, ensures both cybersecurity & data privacy principles are identified and implemented within ongoing or planned projects.
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to support the evaluation of data quality across the information lifecycle.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to support the evaluation of data quality across the information lifecycle.
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
PT-3(2)
null
null
null
null
PT-3(2)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
P.7.6
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Art 5.1 Art 21.5 Art 22
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
x
null
null
null
R-AM-2 R-AM-3 R-BC-1 R-BC-2 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-GV-1 R-GV-2 R-GV-4 R-GV-5
null
null
null
null
null
R-AM-2
R-AM-3
R-BC-1
R-BC-2
null
null
null
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
null
null
R-GV-1
R-GV-2
null
R-GV-4
R-GV-5
null
null
null
null
null
null
null
null
null
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
null
null
null
Data Privacy
Data Analytics Bias
PRI-10.2
Mechanisms exist to evaluate its analytical processes for potential bias.
null
null
Does the organization evaluate its analytical processes for potential bias?
5
Identify
null
X
null
There is no evidence of a capability to evaluate its analytical processes for potential bias.
SP-CMM1 is N/A, since a structured process is required to evaluate its analytical processes for potential bias.
SP-CMM2 is N/A, since a well-defined process is required to evaluate its analytical processes for potential bias.
Privacy (PRI) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • A Privacy program, run by a Chief Privacy Officer (CPO), or similar role, ensures that applicable statutory, regulatory and contractual data privacy obligations are properly identified and implemented to limit and secure Personal Data (PD) that the organization stores, transmits and processes. • A data privacy team oversees the centralized-management of physical security controls across the enterprise. • Data Protection Officers (DPOs) are assigned to work closely with business units and project teams to ensure data privacy principles are being implemented. • CPO and DPO determine and document the legal authority that permits the collection, use, maintenance and sharing of PD, either generally or in support of a specific program or system need. • As part of the organization’s data privacy program, the CPO publishes a clear set of “data privacy principles”, based on leading data privacy practices, that systems, applications, services, processes and third-parties must adhere to. • A Project Management Office (PMO), or project management function, ensures both cybersecurity & data privacy principles are identified and implemented within ongoing or planned projects.
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to evaluate its analytical processes for potential bias.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to evaluate its analytical processes for potential bias.
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
ID.RA-P2
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
P.7.6.4
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
R-AM-2 R-AM-3 R-BC-1 R-BC-2 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-GV-1 R-GV-2 R-GV-4 R-GV-5
null
null
null
null
null
R-AM-2
R-AM-3
R-BC-1
R-BC-2
null
null
null
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
null
null
R-GV-1
R-GV-2
null
R-GV-4
R-GV-5
null
null
null
null
null
null
null
null
null
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Data Privacy
Data Tagging
PRI-11
Mechanisms exist to issue data modeling guidelines to support tagging of sensitive/regulated data.
null
null
Does the organization issue data modeling guidelines to support tagging of sensitive/regulated data?
3
Identify
null
X
X
There is no evidence of a capability to issue data modeling guidelines to support tagging of sensitive/regulated data.
SP-CMM1 is N/A, since a structured process is required to issue data modeling guidelines to support tagging of sensitive/regulated data.
SP-CMM2 is N/A, since a well-defined process is required to issue data modeling guidelines to support tagging of sensitive/regulated data.
Privacy (PRI) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • A Privacy program, run by a Chief Privacy Officer (CPO), or similar role, ensures that applicable statutory, regulatory and contractual data privacy obligations are properly identified and implemented to limit and secure Personal Data (PD) that the organization stores, transmits and processes. • A data privacy team oversees the centralized-management of physical security controls across the enterprise. • Data Protection Officers (DPOs) are assigned to work closely with business units and project teams to ensure data privacy principles are being implemented. • CPO and DPO determine and document the legal authority that permits the collection, use, maintenance and sharing of PD, either generally or in support of a specific program or system need. • As part of the organization’s data privacy program, the CPO publishes a clear set of “data privacy principles”, based on leading data privacy practices, that systems, applications, services, processes and third-parties must adhere to. • A Project Management Office (PMO), or project management function, ensures both cybersecurity & data privacy principles are identified and implemented within ongoing or planned projects.
Privacy (PRI) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to issue data modeling guidelines to support tagging of sensitive/regulated data.
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
CT.DM-P7
null
null
null
null
null
null
null
PT-3(1)
null
null
null
null
PT-3(1)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
P.7.6
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
R-AM-2 R-AM-3 R-BC-1 R-BC-2 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-GV-1 R-GV-2 R-GV-4 R-GV-5
null
null
null
null
null
R-AM-2
R-AM-3
R-BC-1
R-BC-2
null
null
null
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
null
null
R-GV-1
R-GV-2
null
R-GV-4
R-GV-5
null
null
null
null
null
null
null
null
null
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Data Privacy
Updating Personal Data (PD)
PRI-12
Mechanisms exist to develop processes to identify and record the method under which Personal Data (PD) is updated and the frequency that such updates occur.
null
null
Does the organization develop processes to identify and record the method under which Personal Data (PD) is updated and the frequency that such updates occur?
9
Identify
null
X
X
There is no evidence of a capability to develop processes to identify and record the method under which Personal Data (PD) is updated and the frequency that such updates occur.
SP-CMM1 is N/A, since a structured process is required to develop processes to identify and record the method under which Personal Data (PD) is updated and the frequency that such updates occur.
Privacy (PRI) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Privacy management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • The data privacy program is developed to work with IT and cybersecurity staff to ensure that applicable statutory, regulatory and contractual data privacy obligations for Personal Data (PD) are properly identified and implemented across the enterprise. • IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for data privacy management. • A qualified individual is formally assigned as the Chief Privacy Officer (CPO), or similar role, to lead the organization’s data privacy program. This individual may be assigned to multiple duties, including that as a Data Protection Officer (DPO). • The CPO, or similar role, identifies “data privacy principles” that systems, applications, services, processes and third-parties must adhere to, based on leading data privacy practices. • IT/cybersecurity personnel develop and publish processes to identify and record the method under which PD is updated and the frequency that such updates occur.
Privacy (PRI) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • A Privacy program, run by a Chief Privacy Officer (CPO), or similar role, ensures that applicable statutory, regulatory and contractual data privacy obligations are properly identified and implemented to limit and secure Personal Data (PD) that the organization stores, transmits and processes. • A data privacy team oversees the centralized-management of physical security controls across the enterprise. • Data Protection Officers (DPOs) are assigned to work closely with business units and project teams to ensure data privacy principles are being implemented. • CPO and DPO determine and document the legal authority that permits the collection, use, maintenance and sharing of PD, either generally or in support of a specific program or system need. • As part of the organization’s data privacy program, the CPO publishes a clear set of “data privacy principles”, based on leading data privacy practices, that systems, applications, services, processes and third-parties must adhere to. • A Project Management Office (PMO), or project management function, ensures both cybersecurity & data privacy principles are identified and implemented within ongoing or planned projects. • The CPO and DPO develop and publish processes to identify and record the method under which PD is updated and the frequency that such updates occur.
Privacy (PRI) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to develop processes to identify and record the method under which Personal Data (PD) is updated and the frequency that such updates occur.
P5.2
P5.2-POF2
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
7.4.3
5.7
null
null
null
null
null
null
CT.DM-P3
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
P.2.3.1
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
164.526 164.526(a) 164.526(b) 164.526(c) 164.526(d) 164.526(e) 164.526(f)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Sec 2.3
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Art 5.1
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Sec 16
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
x
null
null
null
R-AM-2 R-AM-3 R-BC-1 R-BC-2 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-GV-1 R-GV-2 R-GV-4 R-GV-5
null
null
null
null
null
R-AM-2
R-AM-3
R-BC-1
R-BC-2
null
null
null
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
null
null
R-GV-1
R-GV-2
null
R-GV-4
R-GV-5
null
null
null
null
null
null
null
null
null
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Data Privacy
Data Management Board
PRI-13
Mechanisms exist to establish a written charter for a Data Management Board (DMB) and assigned organization-defined roles to the DMB.
- Data Management Board (DMB)
null
Does the organization establish a written charter for a Data Management Board (DMB) and assigned organization-defined roles to the DMB?
3
Identify
X
X
null
There is no evidence of a capability to establish a written charter for a Data Management Board (DMB) and assigned organization-defined roles to the DMB.
SP-CMM1 is N/A, since a structured process is required to establish a written charter for a Data Management Board (DMB) and assigned organization-defined roles to the DMB.
SP-CMM2 is N/A, since a well-defined process is required to establish a written charter for a Data Management Board (DMB) and assigned organization-defined roles to the DMB.
Privacy (PRI) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • A Privacy program, run by a Chief Privacy Officer (CPO), or similar role, ensures that applicable statutory, regulatory and contractual data privacy obligations are properly identified and implemented to limit and secure Personal Data (PD) that the organization stores, transmits and processes. • A data privacy team oversees the centralized-management of physical security controls across the enterprise. • Data Protection Officers (DPOs) are assigned to work closely with business units and project teams to ensure data privacy principles are being implemented. • CPO and DPO determine and document the legal authority that permits the collection, use, maintenance and sharing of PD, either generally or in support of a specific program or system need. • As part of the organization’s data privacy program, the CPO publishes a clear set of “data privacy principles”, based on leading data privacy practices, that systems, applications, services, processes and third-parties must adhere to. • A Project Management Office (PMO), or project management function, ensures both cybersecurity & data privacy principles are identified and implemented within ongoing or planned projects. • The CPO establishes a written charter for a Data Management Board (DMB) and assigns formal roles to selected stakeholders. • The CPO operates a reporting process to internal senior management, as well as external oversight bodies, as appropriate, to demonstrate accountability with specific statutory and regulatory data privacy program mandates.
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to establish a written charter for a Data Management Board (DMB) and assigned organization-defined roles to the DMB.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to establish a written charter for a Data Management Board (DMB) and assigned organization-defined roles to the DMB.
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
7.4.3
null
null
null
null
null
null
null
CT.DM-P8
null
null
null
null
null
null
null
PM-23 PM-24
PM-24
null
null
null
PM-23
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
P.7
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Art 5.1 Art 30.1 Art 30.2 Art 30.3 Art 30.4 Art 30.5
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
x
null
null
null
R-AM-2 R-AM-3 R-BC-1 R-BC-2 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-GV-1 R-GV-2 R-GV-4 R-GV-5
null
null
null
null
null
R-AM-2
R-AM-3
R-BC-1
R-BC-2
null
null
null
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
null
null
R-GV-1
R-GV-2
null
R-GV-4
R-GV-5
null
null
null
null
null
null
null
null
null
NT-2 NT-3 NT-4 NT-5 NT-6 NT-7 NT-8 NT-9 NT-10 NT-11 NT-12 NT-13 NT-14 MT-1 MT-2 MT-3 MT-4 MT-5 MT-6 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15
null
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Data Privacy
Data Privacy Records & Reporting
PRI-14
Mechanisms exist to maintain data privacy-related records and develop, disseminate and update reports to internal senior management, as well as external oversight bodies, as appropriate, to demonstrate accountability with specific statutory and regulatory data privacy program mandates.
null
null
Does the organization maintain data privacy-related records and develop, disseminate and update reports to internal senior management, as well as external oversight bodies, as appropriate, to demonstrate accountability with specific statutory and regulatory data privacy program mandates?
8
Identify
null
X
X
There is no evidence of a capability to maintain data privacy-related records and develop, disseminate and update reports to internal senior management, as well as external oversight bodies, as appropriate, to demonstrate accountability with specific statutory and regulatory data privacy program mandates.
SP-CMM1 is N/A, since a structured process is required to maintain data privacy-related records and develop, disseminate and update reports to internal senior management, as well as external oversight bodies, as appropriate, to demonstrate accountability with specific statutory and regulatory data privacy program mandates.
SP-CMM2 is N/A, since a well-defined process is required to maintain data privacy-related records and develop, disseminate and update reports to internal senior management, as well as external oversight bodies, as appropriate, to demonstrate accountability with specific statutory and regulatory data privacy program mandates.
Privacy (PRI) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • A Privacy program, run by a Chief Privacy Officer (CPO), or similar role, ensures that applicable statutory, regulatory and contractual data privacy obligations are properly identified and implemented to limit and secure Personal Data (PD) that the organization stores, transmits and processes. • A data privacy team oversees the centralized-management of physical security controls across the enterprise. • Data Protection Officers (DPOs) are assigned to work closely with business units and project teams to ensure data privacy principles are being implemented. • CPO and DPO determine and document the legal authority that permits the collection, use, maintenance and sharing of PD, either generally or in support of a specific program or system need. • As part of the organization’s data privacy program, the CPO publishes a clear set of “data privacy principles”, based on leading data privacy practices, that systems, applications, services, processes and third-parties must adhere to. • A Project Management Office (PMO), or project management function, ensures both cybersecurity & data privacy principles are identified and implemented within ongoing or planned projects. • Technologies are configured to support records management of for data subject authorizations.
Privacy (PRI) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to maintain data privacy-related records and develop, disseminate and update reports to internal senior management, as well as external oversight bodies, as appropriate, to demonstrate accountability with specific statutory and regulatory data privacy program mandates.
CC2.3
P8.1-POF4 P8.1-POF5
null
null
null
null
null
null
Principle 15
null
null
null
10.2.3 10.2.5
null
null
null
null
null
null
null
null
A.5.2
null
null
null
null
null
null
null
null
CM.AW-P4 CM.AW-P6 CM.AW-P7
null
M-5
null
AR-6
null
null
null
PM-27
PM-27
null
null
null
null
null
null
null
null
null
PM-27
null
null
null
PM-27
PM-27
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
L.1
null
null
null
null
null
null
COMP:SG3.SP2 MON:SG2.SP3 MON:SG2.SP4
null
null
null
null
null
null
null
null
AR-6
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
7101(a) 7101(b) 7101(c) 7101(d) 7101(e) 7102(a)(1)(A) 7102(a)(1)(B) 7102(a)(1)(C) 7102(a)(1)(D) 7102(a)(1)(E) 7102(a)(1)(F) 7102(a)(2) 7102(b)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Art 31
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Art 3
null
null
null
null
null
Article 6.2
null
null
null
null
null
null
Article 47 Article 47.x Article 48 Article 52 Article 52.1 Article 52.2 Article 52.3 Article 52.4
null
null
null
null
null
null
null
null
null
null
null
null
Article 30(1) Article 30(1)(a) Article 30(1)(b) Article 30(1)(c) Article 30(1)(d) Article 30(1)(e) Article 30(1)(f) Article 30(1)(g) Article 30(2) Article 30(2)(a) Article 30(2)(b) Article 30(2)(c) Article 30(2)(d) Article 30(3) Article 30(4) Article 30(5)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Art 38
null
null
null
null
null
null
null
null
null
null
null
null
x
null
null
null
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-2 R-AM-3 R-BC-1 R-BC-2 R-BC-3 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1 R-SA-2
R-AC-1
R-AC-2
R-AC-3
R-AC-4
null
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
null
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
null
null
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
R-SA-2
NT-2 NT-3 NT-4 NT-5 NT-6 NT-7 NT-8 NT-9 NT-10 NT-11 NT-12 NT-13 NT-14 MT-1 MT-2 MT-3 MT-4 MT-5 MT-6 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15
null
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Data Privacy
Accounting of Disclosures
PRI-14.1
Mechanisms exist to develop and maintain an accounting of disclosures of Personal Data (PD) held by the organization and make the accounting of disclosures available to the person named in the record, upon request.
null
E-PRI-01
Does the organization develop and maintain an accounting of disclosures of Personal Data (PD) held by the organization and make the accounting of disclosures available to the person named in the record, upon request?
8
Identify
X
X
null
There is no evidence of a capability to develop and maintain an accounting of disclosures of Personal Data (PD) held by the organization and make the accounting of disclosures available to the pers on named in the record, up on request.
SP-CMM1 is N/A, since a structured process is required to develop and maintain an accounting of disclosures of Personal Data (PD) held by the organization and make the accounting of disclosures available to the pers on named in the record, up on request.
SP-CMM2 is N/A, since a well-defined process is required to develop and maintain an accounting of disclosures of Personal Data (PD) held by the organization and make the accounting of disclosures available to the pers on named in the record, up on request.
Privacy (PRI) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • A Privacy program, run by a Chief Privacy Officer (CPO), or similar role, ensures that applicable statutory, regulatory and contractual data privacy obligations are properly identified and implemented to limit and secure Personal Data (PD) that the organization stores, transmits and processes. • A data privacy team oversees the centralized-management of physical security controls across the enterprise. • Data Protection Officers (DPOs) are assigned to work closely with business units and project teams to ensure data privacy principles are being implemented. • CPO and DPO determine and document the legal authority that permits the collection, use, maintenance and sharing of PD, either generally or in support of a specific program or system need. • As part of the organization’s data privacy program, the CPO publishes a clear set of “data privacy principles”, based on leading data privacy practices, that systems, applications, services, processes and third-parties must adhere to. • A Project Management Office (PMO), or project management function, ensures both cybersecurity & data privacy principles are identified and implemented within ongoing or planned projects. • The CPO and DPO develop a process for maintaining an accounting of disclosures of PD held by the organization and make the accounting of disclosures available to the pers on named in the record, up on request.
Privacy (PRI) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to develop and maintain an accounting of disclosures of Personal Data (PD) held by the organization and make the accounting of disclosures available to the pers on named in the record, up on request.
P6.2 P6.3
P6.2-POF1 P6.3-POF1
null
null
null
null
null
null
null
DSP-18
null
null
7.2.1 7.2.4
null
null
null
null
null
null
null
null
null
7.2.8 7.5.3 7.5.4
null
null
null
null
null
null
null
CM.AW-P4
null
null
null
AR-8
null
null
null
PM-21
PM-21
null
null
null
null
null
null
null
null
null
PM-21
null
null
PM-21
PM-21
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
P.5.5.6.12
null
null
null
null
null
null
COMP:SG3.SP1 KIM:SG4.SP2 KIM:SG4.SP3
null
null
null
null
null
null
null
null
AR-8
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
164.528 164.528(a) 164.528(b) 164.528(c) 164.528(d)
null
null
null
2.A.4 2.D.4 PM-21
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Art 30.1 Art 30.2 Art 30.3 Art 30.4 Art 30.5
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Article 6.2
null
null
null
null
null
null
Article 33
null
Sec 17
null
null
null
null
null
null
null
null
null
null
Article 15(2)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Article 25(1) Article 25(2)
null
null
null
null
null
Sec 20
null
null
null
null
null
null
null
null
null
Art 18.7 Art 37
null
null
null
null
null
null
null
null
null
null
null
null
x
null
null
null
R-AM-3 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-IR-3 R-SA-1
null
null
null
null
null
null
R-AM-3
null
null
null
null
null
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
null
null
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
null
null
null
null
null
R-IR-3
null
R-SA-1
null
NT-2 NT-3 NT-4 NT-5 NT-6 NT-7 NT-8 NT-9 NT-10 NT-11 NT-12 NT-13 NT-14 MT-1 MT-2 MT-3 MT-4 MT-5 MT-6 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15
null
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Data Privacy
Notification of Disclosure Request To Data Subject
PRI-14.2
Mechanisms exist to notify data subjects of applicable legal requests to disclose Personal Data (PD).
null
null
Does the organization notify data subjects of applicable legal requests to disclose Personal Data (PD)?
5
Identify
null
X
null
There is no evidence of a capability to notify data subjects of applicable legal requests to disclose Personal Data (PD).
SP-CMM1 is N/A, since a structured process is required to notify data subjects of applicable legal requests to disclose Personal Data (PD).
SP-CMM2 is N/A, since a well-defined process is required to notify data subjects of applicable legal requests to disclose Personal Data (PD).
Privacy (PRI) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • A Privacy program, run by a Chief Privacy Officer (CPO), or similar role, ensures that applicable statutory, regulatory and contractual data privacy obligations are properly identified and implemented to limit and secure Personal Data (PD) that the organization stores, transmits and processes. • A data privacy team oversees the centralized-management of physical security controls across the enterprise. • Data Protection Officers (DPOs) are assigned to work closely with business units and project teams to ensure data privacy principles are being implemented. • CPO and DPO determine and document the legal authority that permits the collection, use, maintenance and sharing of PD, either generally or in support of a specific program or system need. • As part of the organization’s data privacy program, the CPO publishes a clear set of “data privacy principles”, based on leading data privacy practices, that systems, applications, services, processes and third-parties must adhere to. • A Project Management Office (PMO), or project management function, ensures both cybersecurity & data privacy principles are identified and implemented within ongoing or planned projects.
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to notify data subjects of applicable legal requests to disclose Personal Data (PD).
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to notify data subjects of applicable legal requests to disclose Personal Data (PD).
null
null
null
null
null
null
null
null
null
DSP-18
null
null
null
null
null
null
null
null
null
null
null
null
8.5.4
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
P.9.7
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Article 6.2
null
null
null
null
null
null
Article 33 Article 35
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
R-AM-3 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-IR-3 R-SA-1
null
null
null
null
null
null
R-AM-3
null
null
null
null
null
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
null
null
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
null
null
null
null
null
R-IR-3
null
R-SA-1
null
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Data Privacy
Register As A Data Controller and/or Data Processor
PRI-15
Mechanisms exist to register as a data controller and/or data processor, including registering databases containing Personal Data (PD) with the appropriate Data Authority, when necessary.
null
E-PRI-03
Does the organization register as a data controller and/or data processor, including registering databases containing Personal Data (PD) with the appropriate Data Authority, when necessary?
3
Identify
null
X
null
There is no evidence of a capability to register databases containing Personal Data (PD) with the appropriate Data Authority, when necessary.
SP-CMM1 is N/A, since a structured process is required to register databases containing Personal Data (PD) with the appropriate Data Authority, when necessary.
SP-CMM2 is N/A, since a well-defined process is required to register databases containing Personal Data (PD) with the appropriate Data Authority, when necessary.
Privacy (PRI) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • A Privacy program, run by a Chief Privacy Officer (CPO), or similar role, ensures that applicable statutory, regulatory and contractual data privacy obligations are properly identified and implemented to limit and secure Personal Data (PD) that the organization stores, transmits and processes. • A data privacy team oversees the centralized-management of physical security controls across the enterprise. • Data Protection Officers (DPOs) are assigned to work closely with business units and project teams to ensure data privacy principles are being implemented. • CPO and DPO determine and document the legal authority that permits the collection, use, maintenance and sharing of PD, either generally or in support of a specific program or system need. • As part of the organization’s data privacy program, the CPO publishes a clear set of “data privacy principles”, based on leading data privacy practices, that systems, applications, services, processes and third-parties must adhere to. • A Project Management Office (PMO), or project management function, ensures both cybersecurity & data privacy principles are identified and implemented within ongoing or planned projects. • Administrative processes exist register databases containing PD with the appropriate Data Authority, when necessary.
Privacy (PRI) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to register databases containing Personal Data (PD) with the appropriate Data Authority, when necessary.
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
P.1.6.5
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
§ 2446(a) § 2446(a)(1) § 2446(a)(2) § 2446(a)(3) § 2446(a)(3)(A) § 2446(a)(3)(B) § 2446(a)(3)(B)(i) § 2446(a)(3)(B)(ii) § 2446(a)(3)(B)(iii) § 2446(a)(3)(C) § 2446(a)(3)(D) § 2446(a)(3)(E) § 2446(a)(3)(F) § 2446(a)(3)(G)
null
null
null
Art 30.4
null
null
null
Sec 16 Sec 17
Art 17
Art 16
Art 50
Sec 36
Art 25
Sec 4d Sec 4e
null
null
Art 6
Sec 65 Sec 66
Sec 17
null
Sec 8 Sec 9
Sec 26 Sec 37
18(1) 18(2) 18(2)(a) 18(2)(b) 18(2)(c) 18(2)(d) 19(1) 19(2) 19(2)(a) 19(2)(b) 19(2)(c) 19(2)(d) 19(2)(e) 19(2)(f) 19(2)(g) 19(3) 19(4) 19(5) 19(6) 19(7) 20
null
Sec 30
null
Sec 33
Art 40
null
null
Art 23
null
null
null
null
null
null
null
null
Art 60
null
Sec 36
Art 11
Art 16
Sec 19
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Sec 15
null
Art 5 Art 37
null
null
Sec 14 Sec 15
null
null
null
Sec 46 Sec 47 Sec 48
Sec 39
null
null
Art 32
null
Art 21
Art 21.1 Art 21.2 Art 21.3 Art 24
null
null
null
null
null
null
null
Art 25
Art 21
null
Art 29
Art 6 Art 29
null
null
null
x
null
null
null
R-AM-3 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-IR-3 R-SA-1
null
null
null
null
null
null
R-AM-3
null
null
null
null
null
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
null
null
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
null
null
null
null
null
R-IR-3
null
R-SA-1
null
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Data Privacy
Potential Human Rights Abuses
PRI-16
Mechanisms exist to constrain the supply of physical and/or digital activity logs to the host government that can directly lead to contravention of the Universal Declaration of Human Rights (UDHR), as well as other applicable statutory, regulatory and/or contractual obligations.
- Board of Directors (Bod) Ethics Committee
null
Does the organization constrain the supply of physical and/or digital activity logs to the host government that can directly lead to contravention of the Universal Declaration of Human Rights (UDHR), as well as other applicable statutory, regulatory and/or contractual obligations?
10
Protect
X
X
null
There is no evidence of a capability to constrain the supply of physical and/ or digital activity logs to the host government that can directly lead to contravention of the Universal Declaration of Human Rights (UDHR), as well as other applicable statutory, regulatory and/ or contractual obligations.
SP-CMM1 is N/A, since a structured process is required to constrain the supply of physical and/ or digital activity logs to the host government that can directly lead to contravention of the Universal Declaration of Human Rights (UDHR), as well as other applicable statutory, regulatory and/ or contractual obligations.
SP-CMM2 is N/A, since a well-defined process is required to constrain the supply of physical and/ or digital activity logs to the host government that can directly lead to contravention of the Universal Declaration of Human Rights (UDHR), as well as other applicable statutory, regulatory and/ or contractual obligations.
Privacy (PRI) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • A Privacy program, run by a Chief Privacy Officer (CPO), or similar role, ensures that applicable statutory, regulatory and contractual data privacy obligations are properly identified and implemented to limit and secure Personal Data (PD) that the organization stores, transmits and processes. • A data privacy team oversees the centralized-management of physical security controls across the enterprise. • Data Protection Officers (DPOs) are assigned to work closely with business units and project teams to ensure data privacy principles are being implemented. • CPO and DPO determine and document the legal authority that permits the collection, use, maintenance and sharing of PD, either generally or in support of a specific program or system need. • As part of the organization’s data privacy program, the CPO publishes a clear set of “data privacy principles”, based on leading data privacy practices, that systems, applications, services, processes and third-parties must adhere to. • A Project Management Office (PMO), or project management function, ensures both cybersecurity & data privacy principles are identified and implemented within ongoing or planned projects. • The Chief Information Officer (CIO), Chief Information Security Officer (CISO) and CPO collaborate on methods to constrain the supply of physical and/ or digital activity logs to the host government that can directly lead to contravention of the Universal Declaration of Human Rights (UDHR), as well as other applicable statutory, regulatory and/ or contractual obligations.
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to constrain the supply of physical and/ or digital activity logs to the host government that can directly lead to contravention of the Universal Declaration of Human Rights (UDHR), as well as other applicable statutory, regulatory and/ or contractual obligations.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to constrain the supply of physical and/ or digital activity logs to the host government that can directly lead to contravention of the Universal Declaration of Human Rights (UDHR), as well as other applicable statutory, regulatory and/ or contractual obligations.
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
O.12
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Article 7 Article 8 Article 9 Article 11 Article 14 Article 15 Article 16 Article 18 Article 19 Article 20 Article 28 Article 31 Article 32 Article 33 Article 36 Article 37 Article 38 Article 48 Article 53
null
Article 11 Article 12 Article 18 Article 26 Article 38(4) Article 40 Article 47(5)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
R-AM-3 R-EX-1 R-EX-2 R-EX-4 R-GV-4 R-GV-5 R-GV-6 R-GV-7
null
null
null
null
null
null
R-AM-3
null
null
null
null
null
R-EX-1
R-EX-2
null
R-EX-4
null
null
null
null
null
null
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
null
null
null
null
null
null
MT-1 MT-2 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
null
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
null
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Data Privacy
Data Subject Communications
PRI-17
Mechanisms exist to craft disclosures and communications to data subjects such that the material is readily accessible and written in a manner that is concise, unambiguous and understandable by a reasonable person.
null
null
Does the organization craft disclosures and communications to data subjects such that the material is readily accessible and written in a manner that is concise, unambiguous and understandable by a reasonable person?
6
Protect
null
X
X
There is no evidence of a capability to craft disclosures and communications to data subjects such that the material is readily accessible and written in a manner that is concise, unambiguous and understandable by a reasonable person.
SP-CMM1 is N/A, since a structured process is required to craft disclosures and communications to data subjects such that the material is readily accessible and written in a manner that is concise, unambiguous and understandable by a reasonable person.
Privacy (PRI) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Privacy management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • The data privacy program is developed to work with IT and cybersecurity staff to ensure that applicable statutory, regulatory and contractual data privacy obligations for Personal Data (PD) are properly identified and implemented across the enterprise. • IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for data privacy management. • A qualified individual is formally assigned as the Chief Privacy Officer (CPO), or similar role, to lead the organization’s data privacy program. This individual may be assigned to multiple duties, including that as a Data Protection Officer (DPO). • The CPO, or similar role, identifies “data privacy principles” that systems, applications, services, processes and third-parties must adhere to, based on leading data privacy practices. • Communications with data subjects is designed to be readily accessible and written in a manner that is concise, unambiguous and understandable by a reasonable person.
Privacy (PRI) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • A Privacy program, run by a Chief Privacy Officer (CPO), or similar role, ensures that applicable statutory, regulatory and contractual data privacy obligations are properly identified and implemented to limit and secure Personal Data (PD) that the organization stores, transmits and processes. • A data privacy team oversees the centralized-management of physical security controls across the enterprise. • Data Protection Officers (DPOs) are assigned to work closely with business units and project teams to ensure data privacy principles are being implemented. • CPO and DPO determine and document the legal authority that permits the collection, use, maintenance and sharing of PD, either generally or in support of a specific program or system need. • As part of the organization’s data privacy program, the CPO publishes a clear set of “data privacy principles”, based on leading data privacy practices, that systems, applications, services, processes and third-parties must adhere to. • A Project Management Office (PMO), or project management function, ensures both cybersecurity & data privacy principles are identified and implemented within ongoing or planned projects. • Communications with data subjects is designed to be readily accessible and written in a manner that is concise, unambiguous and understandable by a reasonable person.
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to craft disclosures and communications to data subjects such that the material is readily accessible and written in a manner that is concise, unambiguous and understandable by a reasonable person.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to craft disclosures and communications to data subjects such that the material is readily accessible and written in a manner that is concise, unambiguous and understandable by a reasonable person.
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
7003(a) 7003(b)(1) 7003(b)(2) 7003(b)(3) 7011(c) 7102(a)(2)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
R-AM-3 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-GV-1 R-GV-2 R-GV-4 R-GV-5
null
null
null
null
null
null
R-AM-3
null
null
null
null
null
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
null
null
R-GV-1
R-GV-2
null
R-GV-4
R-GV-5
null
null
null
null
null
null
null
null
null
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Data Privacy
Conspicuous Link To Data Privacy Notice
PRI-17.1
Mechanisms exist to include a conspicuous link to the organization's data privacy notice on all consumer-facing websites and mobile applications.
null
null
Does the organization include a conspicuous link to the organization's data privacy notice on all consumer-facing websites and mobile applications?
4
Protect
null
X
X
There is no evidence of a capability to include a conspicuous link to the organization's data privacy notice on all consumer-facing websites and mobile applications.
SP-CMM1 is N/A, since a structured process is required to include a conspicuous link to the organization's data privacy notice on all consumer-facing websites and mobile applications.
SP-CMM2 is N/A, since a well-defined process is required to include a conspicuous link to the organization's data privacy notice on all consumer-facing websites and mobile applications.
Privacy (PRI) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • A Privacy program, run by a Chief Privacy Officer (CPO), or similar role, ensures that applicable statutory, regulatory and contractual data privacy obligations are properly identified and implemented to limit and secure Personal Data (PD) that the organization stores, transmits and processes. • A data privacy team oversees the centralized-management of physical security controls across the enterprise. • Data Protection Officers (DPOs) are assigned to work closely with business units and project teams to ensure data privacy principles are being implemented. • CPO and DPO determine and document the legal authority that permits the collection, use, maintenance and sharing of PD, either generally or in support of a specific program or system need. • As part of the organization’s data privacy program, the CPO publishes a clear set of “data privacy principles”, based on leading data privacy practices, that systems, applications, services, processes and third-parties must adhere to. • A Project Management Office (PMO), or project management function, ensures both cybersecurity & data privacy principles are identified and implemented within ongoing or planned projects. • Communications with data subjects is designed to be readily accessible and written in a manner that is concise, unambiguous and understandable by a reasonable person.
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to include a conspicuous link to the organization's data privacy notice on all consumer-facing websites and mobile applications.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to include a conspicuous link to the organization's data privacy notice on all consumer-facing websites and mobile applications.
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
7003(c) 7003(d) 7010(d) 7010(e) 7011(d)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
R-AM-3 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-GV-1 R-GV-2 R-GV-4 R-GV-5
null
null
null
null
null
null
R-AM-3
null
null
null
null
null
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
null
null
R-GV-1
R-GV-2
null
R-GV-4
R-GV-5
null
null
null
null
null
null
null
null
null
NT-2 NT-3 NT-4 NT-5 NT-6 NT-7 NT-8 NT-9 NT-10 NT-11 NT-12 NT-13 NT-14 MT-1 MT-2 MT-3 MT-4 MT-5 MT-6 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15
null
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Data Privacy
Notice of Financial Incentive
PRI-17.2
Mechanisms exist to provide data subjects with a Notice of Financial Incentive that explains the material terms of a financial incentive, price or service difference so the data subject can make an informed decision about whether to participate.
null
null
Does the organization provide data subjects with a Notice of Financial Incentive that explains the material terms of a financial incentive, price or service difference so the data subject can make an informed decision about whether to participate?
2
Identify
null
null
X
There is no evidence of a capability to provide data subjects with a Notice of Financial Incentive that explains the material terms of a financial incentive, price or service difference so the data subject can make an informed decision about whether to participate.
SP-CMM1 is N/A, since a structured process is required to provide data subjects with a Notice of Financial Incentive that explains the material terms of a financial incentive, price or service difference so the data subject can make an informed decision about whether to participate.
SP-CMM2 is N/A, since a well-defined process is required to provide data subjects with a Notice of Financial Incentive that explains the material terms of a financial incentive, price or service difference so the data subject can make an informed decision about whether to participate.
Privacy (PRI) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • A Privacy program, run by a Chief Privacy Officer (CPO), or similar role, ensures that applicable statutory, regulatory and contractual data privacy obligations are properly identified and implemented to limit and secure Personal Data (PD) that the organization stores, transmits and processes. • A data privacy team oversees the centralized-management of physical security controls across the enterprise. • Data Protection Officers (DPOs) are assigned to work closely with business units and project teams to ensure data privacy principles are being implemented. • CPO and DPO determine and document the legal authority that permits the collection, use, maintenance and sharing of PD, either generally or in support of a specific program or system need. • As part of the organization’s data privacy program, the CPO publishes a clear set of “data privacy principles”, based on leading data privacy practices, that systems, applications, services, processes and third-parties must adhere to. • A Project Management Office (PMO), or project management function, ensures both cybersecurity & data privacy principles are identified and implemented within ongoing or planned projects.
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to provide data subjects with a Notice of Financial Incentive that explains the material terms of a financial incentive, price or service difference so the data subject can make an informed decision about whether to participate.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to provide data subjects with a Notice of Financial Incentive that explains the material terms of a financial incentive, price or service difference so the data subject can make an informed decision about whether to participate.
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
7010(d) 7013(a) 7013(b) 7013(c) 7013(d) 7013(e) 7013(e)(1) 7013(e)(2) 7013(e)(3) 7013(e)(3)(A) 7013(e)(3)(B) 7013(f)(1) 7013(f)(2) 7013(g)(1) 7013(g)(1) 7013(h) 7080(a) 7080(b) 7080(c) 7080(d)(1) 7080(d)(2) 7080(d)(3) 7080(d)(4) 7080(e) 7080(f) 7080(g) 7081(a) 7081(a)(1) 7081(a)(2) 7081(a)(3) 7081(a)(4) 7081(a)(5) 7081(a)(6) 7081(a)(7) 7081(a)(8) 7081(b)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
R-AM-3 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-GV-1 R-GV-2 R-GV-4 R-GV-5
null
null
null
null
null
null
R-AM-3
null
null
null
null
null
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
null
null
R-GV-1
R-GV-2
null
R-GV-4
R-GV-5
null
null
null
null
null
null
null
null
null
NT-2 NT-3 NT-4 NT-5 NT-6 NT-7 NT-8 NT-9 NT-10 NT-11 NT-12 NT-13 NT-14 MT-1 MT-2 MT-3 MT-4 MT-5 MT-6 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15
null
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Project & Resource Management
Cybersecurity & Data Privacy Portfolio Management
PRM-01
Mechanisms exist to facilitate the implementation of cybersecurity & data privacy-related resource planning controls that define a viable plan for achieving cybersecurity & data privacy objectives.
null
E-PRM-02
Does the organization facilitate the implementation of cybersecurity & data privacy-related resource planning controls that define a viable plan for achieving cybersecurity & data privacy objectives?
8
Identify
X
X
null
There is no evidence of a capability to facilitate the implementation of cybersecurity & data privacy-related resource planning controls that define a viable plan for achieving cybersecurity & data privacy objectives.
Project & Resource Management (PRM) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Program/project management is decentralized. • IT personnel work with data/process owners to help ensure secure practices are implemented throughout the System Development Lifecycle (SDLC) for all high-value projects.
Project & Resource Management (PRM) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Program/project management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for Project Management (PM). • The PM function facilitates the implementation of cybersecurity & data privacy-related resource planning controls across the System Development Lifecycle (SDLC) for all projects. • The responsibility for enforcing cybersecurity & data privacy control implementation is assigned to business / process owners and asset custodians. • The Chief Information Officer (CIO), or similar function, analyzes the organization’s business strategy and prioritizes the objectives and resourcing of the security function, based on broader business requirements.
Project & Resource Management (PRM) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • The Chief Information Security Officer (CISO), or similar function, analyzes the organization’s business strategy to determine prioritized and authoritative guidance for program/project management practices. • The CISO, or similar function, develops a security-focused Concept of Operations (CONOPS) that documents management, operational and technical measures to apply defense-in-depth techniques across the enterprise with regards to program/project management. • A Governance, Risk & Compliance (GRC) function, or similar function, provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data for program/project management. • A steering committee is formally established to provide executive oversight of the cybersecurity & data privacy program, including program/project management. • A Project Management Office (PMO), or project management function, enables the centralized-implementation of cybersecurity & data privacy-related resource planning controls across the System Development Lifecycle (SDLC) for all projects. • The PMO determines the identification and allocation of resources for cybersecurity & data privacy requirements within business process planning for projects and other initiatives. • Project Management (PM) is centrally-managed across the enterprise to implement cybersecurity & data privacy controls as part of the project management lifecycle, with the responsibility for enforcing cybersecurity & data privacy control implementation assigned to business / process owners and asset custodians. • The Chief Information Security Officer (CISO), or similar function, analyzes the organization’s business strategy and prioritizes the objectives of the security function, based on business requirements. • The CISO, or similar function, leverages a capability maturity model to define and identify targeted capability maturity levels for each of the functions that make up the cybersecurity & data privacy program. • Subordinate staff and stakeholders are educated on the capability maturity expectations and those targets are used to task individual contributor work activities in an effort to achieve the targeted maturity levels.
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to facilitate the implementation of cybersecurity & data privacy-related resource planning controls that define a viable plan for achieving cybersecurity & data privacy objectives.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to facilitate the implementation of cybersecurity & data privacy-related resource planning controls that define a viable plan for achieving cybersecurity & data privacy objectives.
CC2.2 CC3.1 CC3.4 CC5.2 P5.0
CC3.1-POF4
8.2
null
null
null
null
EDM02.01 EDM02.02 EDM02.03 EDM02.04 EDM04.01 EDM04.02 EDM04.03 APO05.01 APO05.02 APO05.03 APO05.04 APO05.05
Principle 6 Principle 9 Principle 11 Principle 14
null
null
null
null
null
RQ-05-04 RQ-05-05.a RQ-05-05.b
8.3.4
6.1.1
5.1(e)
6.1.5
5.4 5.8
6.1.5
null
6.3.1.5
null
null
4.3.1 4.3.2
null
null
null
MANAGE 2.0 MANAGE 2.1 MANAGE 2.2
null
PO.2.3
null
null
PL-1
PL-1
PL-1
PL-1
PL-1
PL-1
PL-1
PL-1
PL-1
null
null
PL-1
PL-1
PL-1
3.2 3.2.1 3.2.2 3.2.3 3.2.4 3.2.5 3.2.6 3.3 3.3.1 3.3.2
PL-1
PL-1
null
null
PL-1
null
NFO - PL-1
3.16.1
null
A.03.16.01
null
null
null
GV.RM-07 GV.RR-03
null
null
null
null
null
null
null
null
null
null
null
null
K.1.4.1
null
null
11.1
null
null
null
EF:SG3.SP3 EF:SG4.SP1 FRM:SG1.SP2 FRM:SG2.SP1 FRM:SG2.SP2 FRM:SG2.SP3 FRM:SG4.SP2 FRM:SG5.SP1 FRM:SG5.SP2 FRM:SG5.SP3 GG2.GP3
null
null
null
null
null
null
null
null
PL-1
null
null
null
null
null
null
null
PL-1
PL-1
PL-1
PL-1
PL-1
PL-1
PL-1
PL-1
PL-1
PL-1
null
null
null
null
null
null
null
null
null
PL-1
null
null
8-101 8-311
null
null
null
null
null
null
PL-1
PL-1
PL-1
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Sec 12
PL-1
PL-1
PL-1
null
null
null
3.2.1(6) 3.6.1(61) 3.6.1(62) 3.6.1(64) 3.6.1(65) 3.6.1(66)
Art 7(a) Art 7(b) Art 7(c) Art 7(d)
null
Art 32.1 Art 32.2
null
null
null
Sec 14 Sec 15
Art 16
null
null
null
null
null
2.3 7.4 7.5 8.3
null
null
null
null
17.5
null
null
null
null
null
null
null
null
null
null
null
1-1
null
null
1-1-3 1-2-3
null
null
null
Sec 19
null
9
null
null
null
null
null
null
null
null
null
null
null
null
null
null
0720 0732
null
25
13 15
null
null
null
null
null
null
null
4.1 6.1.5
null
11.1
3.2.15.C.01
null
null
null
null
5.1.1 5.1.2 5.1.3 5.1.4
null
null
null
null
null
null
null
1.1 6.22
1.2.1 2.3.1
null
null
null
null
null
null
null
null
null
null
x
null
null
null
R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-6 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-IR-1 R-IR-4
null
null
null
null
null
null
null
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
null
null
null
null
null
R-EX-6
null
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
R-IR-1
null
null
R-IR-4
null
null
NT-2 NT-3 NT-4 NT-5 NT-6 NT-7 NT-8 NT-9 NT-10 NT-11 NT-12 NT-13 NT-14 MT-1 MT-2 MT-3 MT-4 MT-5 MT-6 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15 MT-16
null
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
MT-16
null
Project & Resource Management
Strategic Plan & Objectives
PRM-01.1
Mechanisms exist to establish a strategic cybersecurity & data privacy-specific business plan and set of objectives to achieve that plan.
null
E-PRM-01
Does the organization establish a strategic cybersecurity & data privacy-specific business plan and set of objectives to achieve that plan?
5
Identify
X
null
null
There is no evidence of a capability to establish a strategic cybersecurity & data privacy-specific business plan and set of objectives to achieve that plan.
SP-CMM1 is N/A, since a structured process is required to establish a strategic cybersecurity & data privacy-specific business plan and set of objectives to achieve that plan.
Project & Resource Management (PRM) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Program/project management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for Project Management (PM). • The PM function facilitates the implementation of cybersecurity & data privacy-related resource planning controls across the System Development Lifecycle (SDLC) for all projects. • The responsibility for enforcing cybersecurity & data privacy control implementation is assigned to business / process owners and asset custodians. • The Chief Information Officer (CIO), or similar function, analyzes the organization’s business strategy and prioritizes the objectives and resourcing of the security function, based on broader business requirements.
Project & Resource Management (PRM) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • A Project Management Office (PMO), or project management function, enables the centralized-implementation of cybersecurity & data privacy-related resource planning controls across the System Development Lifecycle (SDLC) for all projects. • The PMO determines the identification and allocation of resources for cybersecurity & data privacy requirements within business process planning for projects and other initiatives. • Project Management (PM) is centrally-managed across the enterprise to implement cybersecurity & data privacy controls as part of the project management lifecycle, with the responsibility for enforcing cybersecurity & data privacy control implementation assigned to business / process owners and asset custodians. • The Chief Information Security Officer (CISO), or similar function, analyzes the organization’s business strategy and prioritizes the objectives of the security function, based on business requirements. • The CISO, or similar function, leverages a capability maturity model to define and identify targeted capability maturity levels for each of the functions that make up the cybersecurity & data privacy program. • Subordinate staff and stakeholders are educated on the capability maturity expectations and those targets are used to task individual contributor work activities in an effort to achieve the targeted maturity levels.
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to establish a strategic cybersecurity & data privacy-specific business plan and set of objectives to achieve that plan.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to establish a strategic cybersecurity & data privacy-specific business plan and set of objectives to achieve that plan.
null
null
8.1
null
null
null
null
APO01.01 APO01.02 APO01.03 APO02.02 APO02.05 APO02.06
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Sec 4(D)(2)(b)
MAP 1.3 MAP 1.4
null
PO.2.3
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
GV.RM-04 GV.RM-07
null
null
null
null
null
null
null
null
null
null
null
null
C.5.6
null
null
null
null
null
PROGRAM-1.A.MIL1 PROGRAM-1.B.MIL2 PROGRAM-1.C.MIL2 PROGRAM-1.D.MIL2 PROGRAM-1.E.MIL2 PROGRAM-1.F.MIL2 PROGRAM-1.G.MIL2 PROGRAM-1.H.MIL3
EF:SG1.SP1
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
38-99-20(D)(2)(b)
null
null
null
null
null
null
null
null
3.2.1(4) 3.2.1(5)(a) 3.2.1(5)(b) 3.2.1(5)(c)
Art 6.8 Art 6.8(a) Art 6.8(b) Art 6.8(c) Art 6.8(d) Art 6.8(e) Art 6.8(f) Art 6.8(g) Art 6.8(h)
null
null
null
null
null
null
null
null
null
null
null
null
1.1 1.2 1.2(a) 1.2(b) 1.2(c) 1.2(d) 1.2(e) 1.2(f)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
1-1 1-1-1
null
3.1.2
1-1-1 1-1-2
null
null
null
null
null
null
null
null
null
null
A1.a
null
null
null
null
null
null
null
null
null
0039 0720
null
null
13 15
null
null
null
null
null
null
null
4.1 5.1 5.1.1 5.1.2
null
null
2.3.25.C.01 2.3.25.C.02 2.3.29.C.01
null
null
null
null
3.1.4 3.1.5
null
null
null
null
null
null
null
1.1 6.7
1.2 1.2.1
null
null
null
null
null
null
null
null
null
null
null
NAIC
null
null
R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-6 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-IR-1 R-IR-4
null
null
null
null
null
null
null
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
null
null
null
null
null
R-EX-6
null
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
R-IR-1
null
null
R-IR-4
null
null
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15 MT-16
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
MT-16
null
Project & Resource Management
Targeted Capability Maturity Levels
PRM-01.2
Mechanisms exist to define and identify targeted capability maturity levels.
null
E-PRM-04
Does the organization define and identify targeted capability maturity levels?
5
Identify
X
X
null
There is no evidence of a capability to define and identify targeted capability maturity levels.
SP-CMM1 is N/A, since a structured process is required to define and identify targeted capability maturity levels.
Project & Resource Management (PRM) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Program/project management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for Project Management (PM). • The PM function facilitates the implementation of cybersecurity & data privacy-related resource planning controls across the System Development Lifecycle (SDLC) for all projects. • The responsibility for enforcing cybersecurity & data privacy control implementation is assigned to business / process owners and asset custodians. • The Chief Information Officer (CIO), or similar function, analyzes the organization’s business strategy and prioritizes the objectives and resourcing of the security function, based on broader business requirements. • IT/cybersecurity personnel develop plans to implement security-related objectives, based on defined capability maturity levels (e.g., SCF SP-CMM).
Project & Resource Management (PRM) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • A Project Management Office (PMO), or project management function, enables the centralized-implementation of cybersecurity & data privacy-related resource planning controls across the System Development Lifecycle (SDLC) for all projects. • The PMO determines the identification and allocation of resources for cybersecurity & data privacy requirements within business process planning for projects and other initiatives. • Project Management (PM) is centrally-managed across the enterprise to implement cybersecurity & data privacy controls as part of the project management lifecycle, with the responsibility for enforcing cybersecurity & data privacy control implementation assigned to business / process owners and asset custodians. • The Chief Information Security Officer (CISO), or similar function, analyzes the organization’s business strategy and prioritizes the objectives of the security function, based on business requirements. • The CISO, or similar function, leverages a capability maturity model to define and identify targeted capability maturity levels for each of the functions that make up the cybersecurity & data privacy program. • Subordinate staff and stakeholders are educated on the capability maturity expectations and those targets are used to task individual contributor work activities in an effort to achieve the targeted maturity levels.
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to define and identify targeted capability maturity levels.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to define and identify targeted capability maturity levels.
null
CC5.1-POF5
8.2
null
null
null
null
APO02.03 APO02.05
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
MAP 1.4
null
PO.2.3
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
G.2.18
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
15
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
6.7
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-6 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-IR-1 R-IR-4
null
null
null
null
null
null
null
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
null
null
null
null
null
R-EX-6
null
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
R-IR-1
null
null
R-IR-4
null
null
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15 MT-16
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
MT-16
null
Project & Resource Management
Cybersecurity & Data Privacy Resource Management
PRM-02
Mechanisms exist to address all capital planning and investment requests, including the resources needed to implement the cybersecurity & data privacy programs and document all exceptions to this requirement.
null
E-PRM-02
Does the organization address all capital planning and investment requests, including the resources needed to implement the cybersecurity & data privacy programs and document all exceptions to this requirement?
8
Identify
X
X
X
There is no evidence of a capability to address all capital planning and investment requests, including the resources needed to implement the cybersecurity & data privacy programs and document all exceptions to this requirement.
Project & Resource Management (PRM) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Program/project management is decentralized. • IT personnel work with data/process owners to help ensure secure practices are implemented throughout the System Development Lifecycle (SDLC) for all high-value projects.
Project & Resource Management (PRM) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Program/project management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for Project Management (PM). • The PM function facilitates the implementation of cybersecurity & data privacy-related resource planning controls across the System Development Lifecycle (SDLC) for all projects. • The responsibility for enforcing cybersecurity & data privacy control implementation is assigned to business / process owners and asset custodians.
Project & Resource Management (PRM) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • A Project Management Office (PMO), or project management function, enables the centralized-implementation of cybersecurity & data privacy-related resource planning controls across the System Development Lifecycle (SDLC) for all projects. • The PMO determines the identification and allocation of resources for cybersecurity & data privacy requirements within business process planning for projects and other initiatives. • Project Management (PM) is centrally-managed across the enterprise to implement cybersecurity & data privacy controls as part of the project management lifecycle, with the responsibility for enforcing cybersecurity & data privacy control implementation assigned to business / process owners and asset custodians. • The Chief Information Security Officer (CISO), or similar function, analyzes the organization’s business strategy and prioritizes the objectives of the security function, based on business requirements. • The CISO, or similar function, leverages a capability maturity model to define and identify targeted capability maturity levels for each of the functions that make up the cybersecurity & data privacy program. • Subordinate staff and stakeholders are educated on the capability maturity expectations and those targets are used to task individual contributor work activities in an effort to achieve the targeted maturity levels.
Project & Resource Management (PRM) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to address all capital planning and investment requests, including the resources needed to implement the cybersecurity & data privacy programs and document all exceptions to this requirement.
CC1.4
null
5
null
null
null
null
EDM02.01 EDM02.02 EDM02.03 EDM02.04 EDM04.01 EDM04.02 EDM04.03
Principle 4
null
null
null
null
null
null
8.3.4
6.2
5.1(c) 7.1
null
5.4
null
null
null
null
null
4.3.1 4.3.2
null
null
null
MANAGE 2.1
null
PO.2.3
null
null
PM-3
null
null
null
PM-3
null
null
null
null
PM-3
null
null
null
null
3.3.2 3.3.3
PM-3
null
null
PM-3
PM-3
null
null
null
null
null
null
null
ID.BE-2
GV.RR-03
null
null
null
null
null
null
null
null
null
null
null
null
C.6.2
null
1.2.3
null
null
null
ASSET-5.B.MIL2 THREAT-3.A.MIL2 RISK-5.B.MIL2 ACCESS-4.B.MIL2 SITUATION-4.B.MIL2 RESPONSE-5.B.MIL2 THIRD-PARTIES-3.B.MIL2 WORKFORCE-4.B.MIL2 ARCHITECTURE-5.B.MIL2 PROGRAM-3.B.MIL2
EF:SG3.SP1 FRM:SG1.SP2 FRM:SG2.SP2
null
null
null
null
null
null
null
null
PM-3
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
PM-3
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Sec 12
PM-3
null
null
null
null
null
3.6.1(61) 3.6.1(62)
Art 7(a) Art 7(b) Art 7(c) Art 7(d)
null
null
null
null
null
null
null
null
null
null
null
null
2.3
null
null
null
null
17.5 17.8 17.9
null
null
null
null
null
null
null
null
null
null
null
1-1
null
null
1-1-3
1-4 1-4-1 1-4-1-1
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
0732
null
25
13 15
null
null
null
null
null
null
null
4.4.5 4.5.1 4.5.1.1 4.5.1.2
null
null
3.2.15.C.01
null
null
null
null
5.1.1 5.1.2 5.1.3 5.1.4 5.2.1 5.2.2 5.5.1 5.5.2
null
null
null
null
null
null
null
1.1 6.22
1.1.2
null
null
null
null
null
null
null
null
null
null
x
null
null
x
R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-6 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-IR-1 R-IR-4
null
null
null
null
null
null
null
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
null
null
null
null
null
R-EX-6
null
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
R-IR-1
null
null
R-IR-4
null
null
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15 MT-16
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
MT-16
null
Project & Resource Management
Allocation of Resources
PRM-03
Mechanisms exist to identify and allocate resources for management, operational, technical and data privacy requirements within business process planning for projects / initiatives.
null
E-PRM-01 E-PRM-02
Does the organization identify and allocate resources for management, operational, technical and data privacy requirements within business process planning for projects / initiatives?
8
Identify
X
X
null
There is no evidence of a capability to identify and allocate resources for management, operational, technical and data privacy requirements within business process planning for projects / initiatives.
Project & Resource Management (PRM) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Program/project management is decentralized. • IT personnel work with data/process owners to help ensure secure practices are implemented throughout the System Development Lifecycle (SDLC) for all high-value projects.
Project & Resource Management (PRM) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Program/project management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for Project Management (PM). • The PM function facilitates the implementation of cybersecurity & data privacy-related resource planning controls across the System Development Lifecycle (SDLC) for all projects. • The responsibility for enforcing cybersecurity & data privacy control implementation is assigned to business / process owners and asset custodians.
Project & Resource Management (PRM) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • A Project Management Office (PMO), or project management function, enables the centralized-implementation of cybersecurity & data privacy-related resource planning controls across the System Development Lifecycle (SDLC) for all projects. • The PMO determines the identification and allocation of resources for cybersecurity & data privacy requirements within business process planning for projects and other initiatives. • Project Management (PM) is centrally-managed across the enterprise to implement cybersecurity & data privacy controls as part of the project management lifecycle, with the responsibility for enforcing cybersecurity & data privacy control implementation assigned to business / process owners and asset custodians. • The Chief Information Security Officer (CISO), or similar function, analyzes the organization’s business strategy and prioritizes the objectives of the security function, based on business requirements. • The CISO, or similar function, leverages a capability maturity model to define and identify targeted capability maturity levels for each of the functions that make up the cybersecurity & data privacy program. • Subordinate staff and stakeholders are educated on the capability maturity expectations and those targets are used to task individual contributor work activities in an effort to achieve the targeted maturity levels.
Project & Resource Management (PRM) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to identify and allocate resources for management, operational, technical and data privacy requirements within business process planning for projects / initiatives.
CC1.4 CC4.1
CC3.1-POF4
8.2
null
null
null
null
EDM02.01 EDM02.02 EDM02.03 EDM02.04 EDM04.01 EDM04.02 EDM04.03 APO06.01 APO06.02 APO06.03 APO06.04 APO06.05
Principle 4 Principle 16
null
null
null
null
null
RQ-05-04
7.1 8.3.4
7.1
null
null
null
null
null
null
null
null
4.3.1 4.3.2
null
null
null
MANAGE 2.1
null
PO.2.3
null
null
SA-2
SA-2
SA-2
SA-2
SA-2
SA-2
SA-2
SA-2
SA-2
null
null
SA-2
SA-2
SA-2
3.2 3.2.1 3.2.2 3.2.3 3.2.4 3.2.5 3.2.6 3.3 3.3.1 3.3.2
SA-2
SA-2
null
SA-2
SA-2
null
NFO - SA-2
null
null
null
null
null
ID.BE-3
GV.RR-03
null
null
null
null
null
null
null
null
null
null
null
null
K.1.4.1
null
null
11.1
null
null
ASSET-5.B.MIL2 THREAT-3.A.MIL2 RISK-5.B.MIL2 ACCESS-4.B.MIL2 SITUATION-4.B.MIL2 RESPONSE-5.B.MIL2 THIRD-PARTIES-3.B.MIL2 WORKFORCE-4.B.MIL2 ARCHITECTURE-5.B.MIL2 PROGRAM-3.B.MIL2
EXD:SG3.SP1 EXD:SG3.SP3 FRM:SG1.SP1 FRM:SG1.SP2 FRM:SG3.SP1 RRD:SG2.SP1 RRM:SG1.SP2 FRM:SG4.SP1 GG2.GP3
null
null
null
null
null
null
null
null
SA-2
null
null
null
null
null
null
null
SA-2
SA-2
SA-2
SA-2
SA-2
SA-2
SA-2
SA-2
SA-2
SA-2
null
D1.G.SP.E.2 D1.G.Ov.Int.5 D1.G.SP.Int.3
null
null
null
null
null
null
null
SA-2
null
null
8-100 8-200
null
null
null
null
null
null
SA-2
SA-2
SA-2
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Sec 12
SA-2
SA-2
SA-2
null
null
null
3.2.1(3)
Art 7(a) Art 7(b) Art 7(c) Art 7(d)
null
null
null
null
null
null
null
null
null
null
null
null
2.3
null
null
null
null
17.5
null
null
null
null
null
null
null
null
null
null
null
1-1
null
null
1-6-4
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
0732
null
25
15
null
null
null
null
null
null
null
4.5.1 4.5.1.1 4.5.1.2
null
null
null
null
null
null
null
5.2.1 5.2.2
null
null
null
null
null
null
null
6.22
null
null
null
null
null
null
null
null
null
null
null
x
null
null
x
R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-6 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-IR-1 R-IR-4
null
null
null
null
null
null
null
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
null
null
null
null
null
R-EX-6
null
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
R-IR-1
null
null
R-IR-4
null
null
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15 MT-16
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
MT-16
null
Project & Resource Management
Cybersecurity & Data Privacy In Project Management
PRM-04
Mechanisms exist to assess cybersecurity & data privacy controls in system project development to determine the extent to which the controls are implemented correctly, operating as intended and producing the desired outcome with respect to meeting the requirements.
null
E-PRM-03
Does the organization assess cybersecurity & data privacy controls in system project development to determine the extent to which the controls are implemented correctly, operating as intended and producing the desired outcome with respect to meeting the requirements?
10
Identify
null
X
X
There is no evidence of a capability to assess cybersecurity & data privacy controls in system project development to determine the extent to which the controls are implemented correctly, operating as intended and producing the desired outcome with respect to meeting the requirements.
Project & Resource Management (PRM) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Program/project management is decentralized. • IT personnel work with data/process owners to help ensure secure practices are implemented throughout the System Development Lifecycle (SDLC) for all high-value projects.
Project & Resource Management (PRM) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Program/project management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for Project Management (PM). • The PM function facilitates the implementation of cybersecurity & data privacy-related resource planning controls across the System Development Lifecycle (SDLC) for all projects. • The responsibility for enforcing cybersecurity & data privacy control implementation is assigned to business / process owners and asset custodians. • The PM function enables project involvement for Information Assurance Program (IAP) as part of the organization’s established project management processes to ensure both cybersecurity & data privacy principles are identified and implemented.
Project & Resource Management (PRM) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • A Project Management Office (PMO), or project management function, enables the centralized-implementation of cybersecurity & data privacy-related resource planning controls across the System Development Lifecycle (SDLC) for all projects. • The PMO determines the identification and allocation of resources for cybersecurity & data privacy requirements within business process planning for projects and other initiatives. • Project Management (PM) is centrally-managed across the enterprise to implement cybersecurity & data privacy controls as part of the project management lifecycle, with the responsibility for enforcing cybersecurity & data privacy control implementation assigned to business / process owners and asset custodians. • The Chief Information Security Officer (CISO), or similar function, analyzes the organization’s business strategy and prioritizes the objectives of the security function, based on business requirements. • The CISO, or similar function, leverages a capability maturity model to define and identify targeted capability maturity levels for each of the functions that make up the cybersecurity & data privacy program. • Subordinate staff and stakeholders are educated on the capability maturity expectations and those targets are used to task individual contributor work activities in an effort to achieve the targeted maturity levels. • The PM function enables project involvement for Information Assurance Program (IAP) as part of the organization’s established project management processes to ensure both cybersecurity & data privacy principles are identified and implemented. • A Governance, Risk & Compliance (GRC), or security engineering function, conducts functional testing of all applicable administrative, physical and technical controls as part of “business as usual” pre-production testing to determine the extent to which the controls are implemented correctly, operating as intended and producing the desired outcome with respect to meeting the defined business requirements.
Project & Resource Management (PRM) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to assess cybersecurity & data privacy controls in system project development to determine the extent to which the controls are implemented correctly, operating as intended and producing the desired outcome with respect to meeting the requirements.
CC3.1 CC4.1 CC5.2
null
8.2
null
null
null
null
EDM03.01 BAI01.01 BAI01.02 BAI01.03 BAI01.04 BAI01.05 BAI01.06 BAI01.07 BAI01.08 BAI01.09 BAI02.01 BAI02.02 BAI02.03 BAI02.04 BAI03.01 BAI03.02 BAI03.03 BAI03.04 BAI03.05 BAI03.06 BAI03.07 BAI03.08 BAI03.09 BAI03.10 BAI03.11 BAI03.12 BAI04.01 BAI04.02 BAI04.03 BAI04.04 BAI04.05 BAI11.01 BAI11.02 BAI11.03 BAI11.04 BAI11.05 BAI11.06 BAI11.07 BAI11.08 BAI11.09
Principle 6 Principle 11 Principle 16
null
LGL-02 SET-05
null
null
null
RQ-05-05.a RQ-05-05.b RC-05-10 RC-05-15 RC-05-16 RQ-06-01 RQ-06-05.a RQ-06-05.b RQ-06-11 RQ-06-12
null
7.1 7.2 7.3 7.4 7.5.1 7.5.2 7.5.3
null
6.1.5
5.8
6.1.5
null
6.3.1.5
null
null
4.3.1 4.3.2
T1190, T1195, T1195.001, T1195.002, T1210
TS-1.12
null
null
CM.AW-P3 CT.PO-P1 CT.DM-P1 CT.DM-P2 CT.DM-P3 CT.DM-P4 CT.DM-P5 CT.DM-P6 CT.DM-P7 CT.DM-P8 CT.DM-P9 CT.DM-P10 CT.PO-P4
PO.1 PO.2 RV.3 RV.3.1 RV.3.2
null
null
CA-2
CA-2
CA-2
CA-2
CA-2
CA-2
CA-2
CA-2
CA-2
null
null
CA-2
CA-2
CA-2
3.4 3.4.1 3.4.2 3.4.3 3.4.4 3.4.5 3.4.6 3.4.7 3.4.8 3.4.9 3.4.10 3.4.11 3.4.12 3.4.13 3.4.14
CA-2
CA-2
null
null
CA-2
CA-2
null
null
null
null
null
PO.2.3
null
null
null
null
1.1
null
null
null
null
null
null
null
null
null
C.6.3
null
1.2.3 8.2.2 8.2.3 8.4.3 8.5.1 8.5.2 9.2
11.1
7.2.2.1(a) 7.2.2.1(b) 7.2.2.1(c) 7.2.2.2(a) 7.2.2.2(b) 7.2.2.2(c) 7.2.2.2(d) 7.2.2.2(e) 7.2.2.2(f) 7.2.2.2(g) 7.2.2.2(h) 7.2.2.3 7.2.2.4(a) 7.2.2.4(b) 7.2.2.5 7.3.4
7.2.2.1(a) 7.2.2.1(b) 7.2.2.1(c) 7.2.2.2(a) 7.2.2.2(b) 7.2.2.2(c) 7.2.2.2(d) 7.2.2.2(e) 7.2.2.2(f) 7.2.2.2(g) 7.2.2.2(h) 7.2.2.3 7.2.2.4(a) 7.2.2.4(b) 7.2.2.5 7.3.4
ASSET-5.B.MIL2 THREAT-3.A.MIL2 RISK-5.B.MIL2 ACCESS-4.B.MIL2 SITUATION-4.B.MIL2 RESPONSE-5.B.MIL2 THIRD-PARTIES-3.B.MIL2 WORKFORCE-4.B.MIL2 ARCHITECTURE-5.B.MIL2 PROGRAM-3.B.MIL2
EC:SG4.SP5 FRM:SG1.SP2 RISK:SG3.SP1
null
null
null
null
null
null
null
null
CA-2
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
5.S.B
5.M.B
5.M.B
CA-2
null
null
8-610
12.1
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
17.03(2)(h)
null
null
null
622(2)(B)(i) 622(2)(B)(ii) 622(2)(B)(iii) 622(2)(B)(iv)
null
null
Sec 12
CA-2
null
null
null
null
null
3.3.1(10) 3.3.1(13)(f) 3.6.1(62) 3.6.1(61) 3.6.1(63)(a) 3.6.1(63)(b) 3.6.1(63)(c) 3.6.1(63)(d) 3.6.1(63)(e) 3.6.1(63)(f) 3.6.1(64) 3.6.1(65) 3.6.1(66)
Art 7(a) Art 7(b) Art 7(c) Art 7(d)
null
null
Article 21.3
null
null
null
null
null
null
null
null
null
7.1 7.2 7.3
null
null
null
null
17.5 17.8 17.9
null
null
null
null
null
null
null
null
null
null
null
1-3 2-13-1 2-13-2 2-13-3-1 2-13-3-2 2-13-3-3 2-13-3-4
TPC-74
3.1.5
1-6-1 1-6-4
1-4-1-2
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
1739
null
null
null
null
null
null
null
null
null
null
4.4.1 4.4.5 4.5.1 4.5.1.1 4.5.1.2 4.5.2 4.5.3 4.6 4.6.1 4.8.1 4.8.2 6.1.5
null
null
null
null
null
null
null
5.1.1 5.1.2 5.1.3 5.1.4 5.2.1 5.2.2 5.4.1 5.4.2 5.4.3 5.4.4 5.8.1 5.8.2
null
null
null
null
null
null
Art 6.8
6.7
2.3.1 2.4.3
null
null
null
null
null
null
null
null
null
null
x
MA 201 CMR 17 OR 6464A
null
x
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-2 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-IR-1 R-IR-4 R-SA-1
R-AC-1
R-AC-2
R-AC-3
R-AC-4
null
R-AM-2
null
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
null
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
R-IR-1
null
null
R-IR-4
R-SA-1
null
NT-1 NT-2 NT-3 NT-4 NT-5 NT-6 NT-7 NT-8 NT-9 NT-10 NT-11 NT-12 NT-13 NT-14 MT-1 MT-2 MT-3 MT-4 MT-5 MT-6 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15 MT-16
NT-1
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
MT-16
null
Project & Resource Management
Cybersecurity & Data Privacy Requirements Definition
PRM-05
Mechanisms exist to identify critical system components and functions by performing a criticality analysis for critical systems, system components or services at pre-defined decision points in the Secure Development Life Cycle (SDLC).
- Secure Development Life Cycle (SDLC)
E-PRM-03
Does the organization identify critical system components and functions by performing a criticality analysis for critical systems, system components or services at pre-defined decision points in the Secure Development Life Cycle (SDLC)?
9
Identify
X
X
X
There is no evidence of a capability to identify critical system components and functions by performing a criticality analysis for critical systems, system components or services at pre-defined decision points in the Secure Development Life Cycle (SDLC).
Project & Resource Management (PRM) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Program/project management is decentralized. • IT personnel work with data/process owners to help ensure secure practices are implemented throughout the System Development Lifecycle (SDLC) for all high-value projects.
Project & Resource Management (PRM) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Program/project management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for Project Management (PM). • The PM function facilitates the implementation of cybersecurity & data privacy-related resource planning controls across the System Development Lifecycle (SDLC) for all projects. • The responsibility for enforcing cybersecurity & data privacy control implementation is assigned to business / process owners and asset custodians.
Project & Resource Management (PRM) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • A Project Management Office (PMO), or project management function, enables the centralized-implementation of cybersecurity & data privacy-related resource planning controls across the System Development Lifecycle (SDLC) for all projects. • The PMO determines the identification and allocation of resources for cybersecurity & data privacy requirements within business process planning for projects and other initiatives. • Project Management (PM) is centrally-managed across the enterprise to implement cybersecurity & data privacy controls as part of the project management lifecycle, with the responsibility for enforcing cybersecurity & data privacy control implementation assigned to business / process owners and asset custodians. • The Chief Information Security Officer (CISO), or similar function, analyzes the organization’s business strategy and prioritizes the objectives of the security function, based on business requirements. • The CISO, or similar function, leverages a capability maturity model to define and identify targeted capability maturity levels for each of the functions that make up the cybersecurity & data privacy program. • Subordinate staff and stakeholders are educated on the capability maturity expectations and those targets are used to task individual contributor work activities in an effort to achieve the targeted maturity levels. • A Governance, Risk & Compliance (GRC), or security engineering function, conducts functional testing of all applicable administrative, physical and technical controls as part of “business as usual” pre-production testing to determine the extent to which the controls are implemented correctly, operating as intended and producing the desired outcome with respect to meeting the defined business requirements.
Project & Resource Management (PRM) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to identify critical system components and functions by performing a criticality analysis for critical systems, system components or services at pre-defined decision points in the Secure Development Life Cycle (SDLC).
CC2.2 CC4.1 CC5.2
PI1.1-POF1 PI1.1-POF2 PI1.1-POF3
8.2
15.7
null
null
15.7
APO01.10 APO08.01 BAI02.01
Principle 11 Principle 14 Principle 16
null
LGL-01 LGL-02 LGL-03 LGL-04 LGL-05 LGL-06 LGL-07 LGL-08
null
null
null
RC-05-10 RQ-06-01 RQ-06-02.a RQ-06-02.b RQ-06-02.c RQ-06-06 RQ-09-09 RQ-10-01.a RQ-10-01.b RQ-10-01.c RQ-10-02
6.2.1 6.2.2
null
null
14.1.1
5.8 5.9 8.26
14.1.1
null
6.11 6.11.1
null
null
4.3.1 4.3.2
T1195.003, T1495, T1542, T1542.001, T1542.003, T1542.004, T1542.005, T1553, T1553.006, T1601, T1601.001, T1601.002
null
Sec 3
MAP 1.6
CT.PO-P1 CT.DM-P9 CT.DM-P10
PO.1 PO.1.1
null
null
SA-14
null
null
null
RA-9
null
null
RA-9
RA-9
null
null
null
RA-9
RA-9
3.4 3.4.3 3.4.4 3.4.5 3.4.6
RA-9
null
RA-9
RA-9
RA-9
RA-9
null
3.16.1
null
A.03.16.01 A.03.16.01.ODP[01] A.03.16.03.ODP[01] A.03.17.03.b
null
PO.1 PO.1.1 PO.1.2 PO.1.3
ID.BE-4 ID.BE-5
null
null
null
1.1
null
null
null
null
null
null
null
null
null
I.1.7.7
null
1.2.3 8.2.2 8.2.3 8.4.3 8.5.1 8.5.2 9.2
null
7.2.2.1(a) 7.2.2.1(b) 7.2.2.1(c) 7.2.2.2(a) 7.2.2.2(b) 7.2.2.2(c) 7.2.2.2(d) 7.2.2.2(e) 7.2.2.2(f) 7.2.2.2(g) 7.2.2.2(h) 7.2.2.3 7.2.2.4(a) 7.2.2.4(b) 7.2.2.5 7.3.4
7.2.2.1(a) 7.2.2.1(b) 7.2.2.1(c) 7.2.2.2(a) 7.2.2.2(b) 7.2.2.2(c) 7.2.2.2(d) 7.2.2.2(e) 7.2.2.2(f) 7.2.2.2(g) 7.2.2.2(h) 7.2.2.3 7.2.2.4(a) 7.2.2.4(b) 7.2.2.5 7.3.4
ASSET-5.B.MIL2 THREAT-3.A.MIL2 RISK-5.B.MIL2 ACCESS-4.B.MIL2 SITUATION-4.B.MIL2 RESPONSE-5.B.MIL2 THIRD-PARTIES-3.B.MIL2 WORKFORCE-4.B.MIL2 ARCHITECTURE-5.B.MIL2 PROGRAM-3.B.MIL2
COMM:SG1.SP2 COMM:SG3.SP1 RRD:SG3.SP1 RTSE:SG2.SP1 RTSE:SG2.SP2 RTSE:SG3.SP1 RTSE:SG3.SP2 TM:SG1.SP1
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
RA-9
null
RA-9
RA-9
null
null
D4.C.Co.B.1 D1.G.IT.B.2 D5.IR.Pl.B.5 D5.IR.Pl.E.3
null
null
null
null
5.S.B
5.M.B
5.M.B
null
null
null
null
12.1
null
null
null
null
null
null
null
null
null
null
null
null
null
6-1-1308(1)(c)(I) 6-1-1308(1)(c)(II)
null
null
null
null
null
null
null
null
38-99-10
null
Sec 12
null
null
null
null
null
null
3.5(51) 3.6.1(64) 3.6.1(65) 3.6.2(68)
Art 7(a) Art 7(b) Art 7(c) Art 7(d)
null
null
Article 21.3
null
Principle 2.4.a
null
null
null
null
null
null
null
null
null
null
null
null
17.5 17.6
null
null
null
null
null
null
null
null
null
Article 11.1 Article 11.2 Article 11.3 Article 11.4 Article 11.5 Article 11.6 Article 11.7 Article 11.8
null
1-3-1-2 2-13-1 2-13-2 2-13-3-1 2-13-3-2 2-13-3-3 2-13-3-4
TPC-43
null
1-6-1
1-4-1 1-4-1-1 1-4-2
null
null
null
null
7.1.3 [OP.PL.3]
null
null
null
null
null
null
null
null
null
null
null
null
null
null
0720 1739
null
null
null
null
null
null
null
null
null
null
4.4.3 4.4.3.1 14.1.1
null
null
12.1.30.C.01 12.1.30.C.02 12.1.30.C.03 12.1.32.C.01 12.1.32.C.02 12.1.32.C.03
null
null
null
null
5.1.1 5.1.2 5.1.3 5.1.4 5.3.3 5.5.1 5.5.2 5.6.1 5.6.2 5.6.3
null
Art 27
null
null
null
null
null
6.7
2.4.2
null
null
null
null
null
null
null
null
null
null
x
NAIC
null
x
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-2 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-IR-1 R-IR-4 R-SA-1
R-AC-1
R-AC-2
R-AC-3
R-AC-4
null
R-AM-2
null
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
null
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
R-IR-1
null
null
R-IR-4
R-SA-1
null
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15 MT-16
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
MT-16
null
Project & Resource Management
Business Process Definition
PRM-06
Mechanisms exist to define business processes with consideration for cybersecurity & data privacy that determines: ▪ The resulting risk to organizational operations, assets, individuals and other organizations; and ▪ Information protection needs arising from the defined business processes and revises the processes as necessary, until an achievable set of protection needs is obtained.
null
E-PRM-03
Does the organization define business processes with consideration for cybersecurity & data privacy that determines: ▪ The resulting risk to organizational operations, assets, individuals and other organizations; and ▪ Information protection needs arising from the defined business processes and revises the processes as necessary, until an achievable set of protection needs is obtained?
7
Identify
X
X
X
There is no evidence of a capability to define business processes with consideration for cybersecurity & data privacy that determines: ▪ The resulting risk to organizational operations, assets, individuals and other organizations; and ▪ Information protection needs arising from the defined business processes and revises the processes as necessary, until an achievable set of protection needs is obtained.
Project & Resource Management (PRM) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Program/project management is decentralized. • IT personnel work with data/process owners to help ensure secure practices are implemented throughout the System Development Lifecycle (SDLC) for all high-value projects.
Project & Resource Management (PRM) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Program/project management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for Project Management (PM). • The PM function facilitates the implementation of cybersecurity & data privacy-related resource planning controls across the System Development Lifecycle (SDLC) for all projects. • The responsibility for enforcing cybersecurity & data privacy control implementation is assigned to business / process owners and asset custodians.
Project & Resource Management (PRM) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • A Project Management Office (PMO), or project management function, enables the centralized-implementation of cybersecurity & data privacy-related resource planning controls across the System Development Lifecycle (SDLC) for all projects. • The PMO determines the identification and allocation of resources for cybersecurity & data privacy requirements within business process planning for projects and other initiatives. • Project Management (PM) is centrally-managed across the enterprise to implement cybersecurity & data privacy controls as part of the project management lifecycle, with the responsibility for enforcing cybersecurity & data privacy control implementation assigned to business / process owners and asset custodians. • The Chief Information Security Officer (CISO), or similar function, analyzes the organization’s business strategy and prioritizes the objectives of the security function, based on business requirements. • The CISO, or similar function, leverages a capability maturity model to define and identify targeted capability maturity levels for each of the functions that make up the cybersecurity & data privacy program. • Subordinate staff and stakeholders are educated on the capability maturity expectations and those targets are used to task individual contributor work activities in an effort to achieve the targeted maturity levels.
Project & Resource Management (PRM) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to define business processes with consideration for cybersecurity & data privacy that determines: ▪ The resulting risk to organizational operations, assets, individuals and other organizations; and ▪ Information protection needs arising from the defined business processes and revises the processes as necessary, until an achievable set of protection needs is obtained.
CC1.3 CC3.1 CC3.4 CC4.1 CC5.1 CC5.2 PI1.1
CC3.1-POF7 CC3.1-POF8 CC3.1-POF9 CC3.1-POF10 CC3.1-POF11 CC3.1-POF12 CC3.1-POF13 CC3.1-POF14 CC3.1-POF15 CC3.1-POF16 PI1.1-POF1 PI1.3-POF1 PI1.3-POF2 PI1.3-POF3 PI1.3-POF4 PI1.3-POF5 PI1.4-POF1 PI1.4-POF2 PI1.4-POF3 PI1.4-POF4 PI1.5-POF1 PI1.5-POF2 PI1.5-POF3 PI1.5-POF4 P6.7-POF1
null
15.7
null
null
15.7
APO01.10 APO08.01 BAI02.01
Principle 3 Principle 6 Principle 9 Principle 10 Principle 11 Principle 16
null
LGL-01 LGL-02 LGL-03 LGL-04 LGL-05 LGL-06 LGL-07 LGL-08
null
null
null
RC-05-10 RQ-06-01 RQ-06-11 RQ-06-12
6.2.1 6.2.2
null
null
null
null
null
null
null
null
null
4.3.1 4.3.2
null
null
null
MAP 1.0 MAP 1.1 MAP 1.4 MAP 2.1
ID.IM-P5 CT.PO-P1 CT.DM-P9 CT.DM-P10
PO.1
null
null
PM-11
null
null
null
PM-11
null
null
null
null
PM-11
null
null
null
null
3.4 3.4.1 3.4.2
PM-11
null
null
PM-11
PM-11
PM-11
null
null
null
null
null
null
ID.BE-4
null
null
null
null
null
null
null
null
null
null
null
null
null
A.1.3.1
null
null
null
null
null
null
ADM:SG2.SP1 COMM:SG1.SP2 COMM:SG3.SP1 EC:SG4.SP1 EF:SG1.SP3 OPD:SG1.SP1 PM:SG3.SP2 PM:SG3.SP4 PM:SG3.SP5 RRD:SG3.SP1 SC:SG1.SP1 SC:SG3.SP1 TM:SG5.SP1
null
null
null
null
null
null
null
null
PM-11
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
8-303
null
null
null
null
null
null
null
null
null
null
null
null
null
null
6-1-1308(1)(c)(I) 6-1-1308(1)(c)(II)
null
null
null
null
null
null
null
null
null
null
Sec 12
null
null
null
null
null
null
3.5(51) 3.6.1(64) 3.6.1(65) 3.6.2(68)
Art 8.1
null
null
null
null
Principle 2.4.a
null
null
null
null
null
null
null
null
null
null
null
null
17.5 17.6
null
null
null
null
null
null
null
null
null
Article 11.4 Article 11.5 Article 11.6
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
4.4.3 4.4.3.1 4.4.4 4.4.4.1
null
null
12.1.32.C.01 12.1.32.C.02 12.1.32.C.03
null
null
null
null
5.5.1 5.5.2
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
x
null
null
x
R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-6 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-IR-1 R-IR-4
null
null
null
null
null
null
null
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
null
null
null
null
null
R-EX-6
null
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
R-IR-1
null
null
R-IR-4
null
null
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15 MT-16
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
MT-16
null
Project & Resource Management
Secure Development Life Cycle (SDLC) Management
PRM-07
Mechanisms exist to ensure changes to systems within the Secure Development Life Cycle (SDLC) are controlled through formal change control procedures.
- CimTrak Integrity Suite (https://www.cimcor.com/cimtrak/)
E-PRM-03
Does the organization ensure changes to systems within the Secure Development Life Cycle (SDLC) are controlled through formal change control procedures?
10
Protect
X
X
X
There is no evidence of a capability to ensure changes to systems within the Secure Development Life Cycle (SDLC) are controlled through formal change control procedures.
Project & Resource Management (PRM) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Program/project management is decentralized. • IT personnel work with data/process owners to help ensure secure practices are implemented throughout the System Development Lifecycle (SDLC) for all high-value projects.
Project & Resource Management (PRM) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Program/project management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for Project Management (PM). • The PM function facilitates the implementation of cybersecurity & data privacy-related resource planning controls across the System Development Lifecycle (SDLC) for all projects. • Administrative processes exist to ensure changes to systems within the SDLC are controlled through formal change control procedures. • The responsibility for enforcing cybersecurity & data privacy control implementation is assigned to business / process owners and asset custodians.
Project & Resource Management (PRM) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • A Project Management Office (PMO), or project management function, enables the centralized-implementation of cybersecurity & data privacy-related resource planning controls across the System Development Lifecycle (SDLC) for all projects. • Administrative processes exist to ensure changes to systems within the SDLC are controlled through formal change control procedures. • The PMO determines the identification and allocation of resources for cybersecurity & data privacy requirements within business process planning for projects and other initiatives. • Project Management (PM) is centrally-managed across the enterprise to implement cybersecurity & data privacy controls as part of the project management lifecycle, with the responsibility for enforcing cybersecurity & data privacy control implementation assigned to business / process owners and asset custodians. • The Chief Information Security Officer (CISO), or similar function, analyzes the organization’s business strategy and prioritizes the objectives of the security function, based on business requirements. • The CISO, or similar function, leverages a capability maturity model to define and identify targeted capability maturity levels for each of the functions that make up the cybersecurity & data privacy program. • Subordinate staff and stakeholders are educated on the capability maturity expectations and those targets are used to task individual contributor work activities in an effort to achieve the targeted maturity levels. • A Governance, Risk & Compliance (GRC), or security engineering function, conducts functional testing of all applicable administrative, physical and technical controls as part of “business as usual” pre-production testing to determine the extent to which the controls are implemented correctly, operating as intended and producing the desired outcome with respect to meeting the defined business requirements.
Project & Resource Management (PRM) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to ensure changes to systems within the Secure Development Life Cycle (SDLC) are controlled through formal change control procedures.
CC5.2 CC8.1
CC8.1-POF1
null
15.7
null
null
15.7
BAI01.01 BAI01.02 BAI01.03 BAI01.04 BAI01.05 BAI01.06 BAI01.07 BAI01.08 BAI01.09
Principle 11
AIS-04
LGL-01 LGL-02 LGL-03 LGL-04 LGL-05 LGL-06 LGL-07 LGL-08 POL-04 SET-05
null
null
null
RC-05-10 RC-05-13 RC-05-15 RC-05-16 RQ-06-01 RQ-12-01 RQ-14-02
null
7.1 7.2 7.3 7.4
null
14.2.2
5.8 8.25 8.32
14.2.2
null
6.11.2.2
null
null
4.3.1 4.3.2 6.1 6.2 6.3 6.4 6.5
T1078, T1078.001, T1078.003, T1078.004, T1213.003, T1574.002
TS-1.12
null
GOVERN 1.7 MANAGE 2.2 MANAGE 2.3
CM.AW-P3 CT.PO-P1 CT.DM-P7 CT.DM-P8 CT.PO-P4
PO.1 RV.3.4
P-13
null
SA-3
SA-3
SA-3
SA-3
SA-3 SA-3(1) SA-8(30)
SA-3
SA-3
SA-3
SA-3
SA-3(1) SA-8(30)
null
SA-3
SA-3
SA-3
3.2.1
SA-3
SA-3
null
SA-3
SA-3
SA-3
NFO - SA-3
null
null
null
null
PO.2 PO.2.1 PO.2.2 PO.2.3 RV.3 RV.3.1 RV.3.2 RV.3.3 RV.3.4
PR.IP-2
ID.AM-08
null
null
null
null
null
null
null
null
null
null
null
null
I.2.5
null
null
null
7.2.2.1(a) 7.2.2.1(b) 7.2.2.1(c) 7.2.2.2(a) 7.2.2.2(b) 7.2.2.2(c) 7.2.2.2(d) 7.2.2.2(e) 7.2.2.2(f) 7.2.2.2(g) 7.2.2.2(h) 7.2.2.3 7.2.2.4(a) 7.2.2.4(b) 7.2.2.5 7.3.4
7.2.2.1(a) 7.2.2.1(b) 7.2.2.1(c) 7.2.2.2(a) 7.2.2.2(b) 7.2.2.2(c) 7.2.2.2(d) 7.2.2.2(e) 7.2.2.2(f) 7.2.2.2(g) 7.2.2.2(h) 7.2.2.3 7.2.2.4(a) 7.2.2.4(b) 7.2.2.5 7.3.4
ASSET-3.E.MIL3
EXD:SG3.SP3 EXD:SG3.SP4 EXD:SG4.SP1 EXD:SG4.SP2 RTSE:SG2.SP2
null
null
null
null
null
null
null
null
SA-3
null
null
null
null
null
null
null
SA-3
SA-3
SA-3
SA-3
SA-3
SA-3
SA-3
SA-3
SA-3
SA-3
null
D3.PC.Se.B.1 D3.PC.Se.E.1
null
null
null
null
1.S.A
1.M.A
1.M.A
SA-3
null
null
8-311 8-610
12.1
null
null
null
null
null
SA-3
SA-3
SA-3
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Sec 12
SA-3
SA-3
SA-3
null
null
null
3.3.1(13)(f) 3.5(55) 3.6.1(63)(a) 3.6.1(63)(b) 3.6.1(63)(c) 3.6.1(63)(d) 3.6.1(63)(e) 3.6.1(63)(f)
Art 7(a) Art 7(b) Art 7(c) Art 7(d)
null
null
Article 21.3
null
Principle 2.4.a
null
null
null
null
null
null
null
7.1 7.2 7.3
null
null
null
null
17.4 17.5 17.8
null
null
null
null
null
null
null
null
null
Article 11.4 Article 11.5 Article 11.6
null
2-13-4
TPC-74
null
null
null
null
null
null
null
null
null
null
null
null
A3.a
null
null
null
null
null
null
null
null
null
1526 1739
null
null
21(c)
null
null
null
null
null
null
null
4.5.1 4.5.2 4.5.3 14.2.2
null
null
null
null
null
null
null
5.1.2 5.1.3 5.1.4 5.4.1 5.4.2 5.4.3 5.4.4
null
null
null
null
null
null
null
null
2.4.1 2.4.2
null
null
null
null
null
null
null
null
null
null
x
null
null
x
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-1 R-AM-2 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1
R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
null
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
null
NT-1 NT-2 NT-3 NT-4 NT-5 NT-6 NT-7 NT-8 NT-9 NT-10 NT-11 NT-12 NT-13 NT-14 MT-1 MT-2 MT-3 MT-4 MT-5 MT-6 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15 MT-16
NT-1
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
MT-16
null
Project & Resource Management
Manage Organizational Knowledge
PRM-08
Mechanisms exist to manage the organizational knowledge of the cybersecurity & data privacy staff.
null
null
Does the organization manage the organizational knowledge of the cybersecurity & data privacy staff?
5
Protect
X
X
null
There is no evidence of a capability to manage the organizational knowledge of the cybersecurity & data privacy staff.
SP-CMM1 is N/A, since a structured process is required to manage the organizational knowledge of the cybersecurity & data privacy staff.
Project & Resource Management (PRM) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Program/project management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • IT/cybersecurity personnel identify cybersecurity & data privacy controls that are appropriate to address applicable statutory, regulatory and contractual requirements for Project Management (PM). • The PM function facilitates the implementation of cybersecurity & data privacy-related resource planning controls across the System Development Lifecycle (SDLC) for all projects. • The responsibility for enforcing cybersecurity & data privacy control implementation is assigned to business / process owners and asset custodians. • Critical business functions are documented in “run books” or Standardized Operating Procedures (SOPs) to capture the knowledge in documentation form.
Project & Resource Management (PRM) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • A Project Management Office (PMO), or project management function, enables the centralized-implementation of cybersecurity & data privacy-related resource planning controls across the System Development Lifecycle (SDLC) for all projects. • The PMO determines the identification and allocation of resources for cybersecurity & data privacy requirements within business process planning for projects and other initiatives. • Project Management (PM) is centrally-managed across the enterprise to implement cybersecurity & data privacy controls as part of the project management lifecycle, with the responsibility for enforcing cybersecurity & data privacy control implementation assigned to business / process owners and asset custodians. • The Chief Information Security Officer (CISO), or similar function, analyzes the organization’s business strategy and prioritizes the objectives of the security function, based on business requirements. • The CISO, or similar function, leverages a capability maturity model to define and identify targeted capability maturity levels for each of the functions that make up the cybersecurity & data privacy program. • Subordinate staff and stakeholders are educated on the capability maturity expectations and those targets are used to task individual contributor work activities in an effort to achieve the targeted maturity levels. • Line of Business (LOB) stakeholders are identified and tasked with documenting business-critical functions in “run books” or Standardized Operating Procedures (SOPs) to capture the knowledge in documentation form from both a business and technology perspective.
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to manage the organizational knowledge of the cybersecurity & data privacy staff.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to manage the organizational knowledge of the cybersecurity & data privacy staff.
null
null
null
null
null
null
null
APO01.08
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
CT.PO-P1 CT.DM-P7 CT.DM-P8
RV.3 RV.3.1 RV.3.2
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
P.3.1.1
null
null
null
null
null
null
KIM:SG6.SP2
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
B4.c
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
3.2.19.C.01
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-6 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-IR-1 R-IR-4 R-SA-2
null
null
null
null
null
null
null
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
null
null
null
null
null
R-EX-6
null
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
R-IR-1
null
null
R-IR-4
null
R-SA-2
NT-2 NT-3 NT-4 NT-5 NT-6 NT-7 NT-8 NT-9 NT-10 NT-11 NT-12 NT-13 NT-14 MT-1 MT-2 MT-3 MT-4 MT-5 MT-6 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15 MT-16
null
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
MT-16
null
Risk Management
Risk Management Program
RSK-01
Mechanisms exist to facilitate the implementation of risk management controls.
- Risk Management Program (RMP)
E-RSK-01
Does the organization facilitate the implementation of risk management controls?
10
Identify
X
X
X
There is no evidence of a capability to facilitate the implementation of risk management controls.
Risk Management efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist: • IT personnel use an informal process to identify, assess, remediate and report on risk. • Data/process owners are expected to self-manage risks associated with their systems, applications, services and data, based on the organization’s published policies and standards, including the identification, remediation and reporting of risks. • Risk management processes (e.g., risk assessments) focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
Risk Management efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Risk management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • Data/process owners are expected to self-manage risks associated with their systems, applications, services and data, based on the organization’s published policies and standards, including the identification, remediation and reporting of risks. • Data/process owners work with IT/cybersecurity personnel and Data Protection Officers (DPOs) to ensure applicable statutory, regulatory and contractual obligations are properly addressed, including the storage, transmission and processing of sensitive/regulated data. • IT/cybersecurity personnel: o Identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for risk management. o Implement and maintain a form of Risk Management Program (RMP) that provides operational guidance on how risk is identified, assessed, remediated and reported. • Risk management processes (e.g., risk assessments) and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
Risk Management efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • The Chief Information Security Officer (CISO), or similar function, o Analyzes the organization’s business strategy to determine prioritized and authoritative guidance for Risk Management (RM) practices. o Develops a security-focused Concept of Operations (CONOPS) that documents management, operational and technical measures to apply defense-in-depth techniques across the enterprise for RM. • A Governance, Risk & Compliance (GRC) function, or similar function; o Provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data with regards to RM. o Maintains a common taxonomy of risk-relevant terminology to minimize assumptions and misunderstandings. o Enables data/process owners to conduct annual risk assessment of their operations that includes the likelihood and magnitude of harm, from unauthorized access, use, disclosure, disruption, modification or destruction of the organization's systems and data. o Assists users in making informed risk decisions to ensure data and processes are appropriately protected. o Enables the documentation of risk assessments, risk response and risk monitoring to support statutory, regulatory and contractual obligations for risk management practices. o Maintains a centralized risk register to reflect an active recording and disposition of identified risks. The risk register identifies and assigns a risk ranking to vulnerabilities and risks that is based on industry-recognized practices and facilitates monitoring and reporting of those risks. o Governs supply chain risks associated with the development, acquisition, maintenance and disposal of systems, system components and services. • A steering committee is formally established to provide executive oversight of the cybersecurity & data privacy program, including appropriately resourcing risk management operations. • A formal Risk Management Program (RMP) provides enterprise-wide guidance on how risk is to be identified, framed (e.g., risk appetite, risk tolerance, risk thresholds, etc.). assessed, mitigated/remediated and reported. • An IT Asset Management (ITAM) function, or similar function, categorizes assets according to the data the asset stores, transmits and/ or processes, applying the appropriate technology controls to protect the asset and data.
Risk Management efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to facilitate the implementation of risk management controls.
CC1.3 CC3.1 CC4.1 CC5.1
CC3.1-POF3 CC3.2-POF3 CC3.2-POF5 CC3.4-POF1 CC3.4-POF2 CC3.4-POF3 CC3.4-POF4 CC3.4-POF5
10.2.1
16.6
null
16.6
16.6
EDM03.01 EDM03.02 EDM03.03 APO12.01 APO12.02 APO12.03 APO12.04 APO12.05 APO12.06
Principle 3 Principle 6 Principle 10 Principle 16 Principle 20
CEK-07 GRC-02
RSM-01 RSM-02
SO2
null
null
RQ-06-23 RQ-06-24 RQ-06-25 RQ-06-26 RQ-06-27 RQ-06-28.a RQ-06-28.b RQ-06-29 RQ-06-30.a RQ-06-30.b RQ-06-30.c RQ-06-30.d RQ-06-31 RQ-06-32
8.2 8.2.1
6.1 6.1.2
6.1 6.1.1 6.1.1(a) 6.1.1(b) 6.1.1(c) 6.1.1(d) 6.1.1(e)(1) 6.1.1(e)(2) 6.1.2 6.1.2(a) 6.1.2(a)(1) 6.1.2(a)(2) 6.1.2(b) 6.1.2(c) 6.1.2(c)(1) 6.1.2(c)(2) 6.1.2(d) 6.1.2(d)(1) 6.1.2(d)(2) 6.1.2(d)(3) 6.1.2(e) 6.1.2(e)(1) 6.1.2(e)(2) 8.2
11.1.4
7.5
11.1.4
null
6.8.1.4
5.10 5.11 5.12
4.1 4.2 4.3 4.4 4.5 4.6
4.1 4.2 4.3.1 4.3.2 5.1
null
OR-2.0
Sec 4(D)(3)
GOVERN 1.0 GOVERN 1.3 GOVERN 1.4 GOVERN 1.5 MANAGE 1.0
ID.DE-P1 GV.PO-P6 GV.RM-P1
null
P-2
2.1 2.2 2.3 2.4 2.5 2.6 2.7 2.8
PM-9 RA-1
RA-1
RA-1
RA-1
PM-9 PM-29 RA-1
RA-1
RA-1
RA-1
RA-1
PM-9 PM-29
null
RA-1
RA-1
RA-1
3.3.4
PM-9 PM-29 RA-1
RA-1
null
PM-9 PM-29 RA-1
RA-1
RA-1
NFO - RA-1
3.11.1.a 3.11.1.b 3.17.1.a
null
null
null
null
ID.GV-4 ID.RM-1 ID.RM-2 ID.RM-3
GV.RM GV.RM-01 GV.RM-03 GV.RM-06 GV.RM-07 GV.SC-03 GV.SC-09 ID.RA
null
12.2
12.3
null
null
null
null
null
null
null
null
null
A.1
7.4A
1.4 1.4.1
null
null
null
RISK-1.A.MIL1 RISK-1.B.MIL2 RISK-1.C.MIL2 RISK-1.D.MIL2 RISK-1.E.MIL2 RISK-1.F.MIL2 RISK-1.G.MIL3 RISK-1.H.MIL3 RISK-5.A.MIL2
RISK:SG1.SP2 RISK:SG2.SP1 RISK:SG2.SP2 RISK:SG3.SP1 RISK:SG3.SP2 RISK:SG4.SP1 RISK:SG4.SP2 RISK:SG4.SP3 RISK:SG5.SP1 RISK:SG5.SP2 RISK:SG6.SP1 RISK:SG6.SP2
null
null
null
null
null
null
null
null
PM-9 RA-1
null
null
null
null
null
null
null
RA-1
RA-1
RA-1
RA-1
RA-1
RA-1
RA-1
RA-1
RA-1
RA-1
null
D1.G.Ov.B.1 D1.G.Ov.B.3 D1.G.Ov.E.1 D1.G.SP.E.1 D1.G.Ov.Int.1 D1.G.Ov.Int.3 D1.G.SP.A.4
null
null
314.4(b)
null
null
null
null
PM-9 RA-1
null
null
8-103 8-610
14.1
null
null
17 CFR 229.106(B)(1) 17 CFR 229.106(B)(1)(i) 17 CFR 229.106(B)(1)(ii) 17 CFR 229.106(B)(1)(iii) 17 CFR 229.106(B)(2)
Sec 404
5.6
RA-1
RA-1
RA-1
null
null
null
null
null
null
null
null
null
17.03(2)(b)
null
500.09
Sec 4(2)(b)(ii)(A)(2) Sec 4(2)(b)(ii)(A)(3) Sec 4(2)(b)(ii)(B)(1) Sec 4(2)(b)(ii)(B)(2) Sec 4(2)(b)(ii)(C)(1)
622(2)(d)(A)(ii)
38-99-20(D)(3)
null
Sec 7
PM-9 RA-1
RA-1
RA-1
null
null
§ 2447(b)(2)
3.2.3(7) 3.3.1(10) 3.3.1(13)(a) 3.3.1(13)(b) 3.3.1(13)(c) 3.3.1(13)(d) 3.3.1(13)(e) 3.3.1(13)(f) 3.3.1(14)
Art 6.1 Art 6.2 Art 6.3 Art 6.4 Art 6.5 Art 6.6 Art 6.7 Art 6.8 Art 6.8(a) Art 6.8(b) Art 6.8(c) Art 6.8(d) Art 6.8(e) Art 6.8(f) Art 6.8(g) Art 6.8(h) Art 6.9 Art 6.10
Art 17
Art 32.1 Art 32.2
Article 21.1 Article 21.2(a) Article 21.2(d) Article 21.2(f)
null
null
Sec 14 Sec 15
Art 16
null
null
null
null
null
3.1 3.2 3.3 3.4 3.5 3.6 3.7 3.8 3.9 3.10 3.11 12.3
OIS-06
null
null
null
1.2 2.1 2.2
null
null
null
null
null
null
null
null
null
null
null
1-2
TPC-31
3.2.1
1-5-1 1-5-2 1-5-4
1-3 1-3-1 1-3-1-1
null
null
Sec 19
null
null
null
null
null
null
A2.a
A2
null
null
null
null
null
null
null
null
0726
null
12(a) 12(c) 13 16(a) 16(b) 16(c) 16(d) 16(e) 16(f) 17 18 19(a) 19(b) 19(c) 19(d) 19(e)
null
null
null
null
null
null
Art 13
null
4.4.6 4.4.6.1 4.4.7 11.1.4
null
1.4 1.4.1 1.4.2 1.4.3
5.1.9.C.01 5.3.6.C.01 5.3.7.C.01 5.3.8.C.01 5.3.9.C.01
null
null
null
null
4.1.1 4.1.2 4.1.5
null
null
null
null
null
5.3 5.8
null
1.3 6.4 6.8 6.16 6.24
1.3 1.3.1 1.3.2 3.1
null
null
null
null
null
null
null
null
null
null
x
NAIC MA 201 CMR 17 OR 6464A
null
x
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-1 R-AM-2 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-GV-8 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1 R-SA-2
R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
null
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
R-SA-2
NT-1 NT-2 NT-3 NT-4 NT-5 NT-6 NT-7 NT-8 NT-9 NT-10 NT-11 NT-12 NT-13 NT-14 MT-1 MT-2 MT-3 MT-4 MT-5 MT-6 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15 MT-16
NT-1
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
MT-16
null
Risk Management
Risk Framing
RSK-01.1
Mechanisms exist to identify: ▪ Assumptions affecting risk assessments, risk response and risk monitoring; ▪ Constraints affecting risk assessments, risk response and risk monitoring; ▪ The organizational risk tolerance; and ▪ Priorities and trade-offs considered by the organization for managing risk.
- Risk Management Program (RMP)
null
Does the organization identify: ▪ Assumptions affecting risk assessments, risk response and risk monitoring; ▪ Constraints affecting risk assessments, risk response and risk monitoring; ▪ The organizational risk tolerance; and ▪ Priorities and trade-offs considered by the organization for managing risk?
9
Identify
X
X
null
There is no evidence of a capability to identify: ▪ Assumptions affecting risk assessments, risk response and risk monitoring; ▪ Constraints affecting risk assessments, risk response and risk monitoring; ▪ The organizational risk tolerance; and ▪ Priorities and trade-offs considered by the organization for managing risk.
Risk Management efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist: • IT personnel use an informal process to identify, assess, remediate and report on risk. • Data/process owners are expected to self-manage risks associated with their systems, applications, services and data, based on the organization’s published policies and standards, including the identification, remediation and reporting of risks. • Risk management processes (e.g., risk assessments) focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
Risk Management efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Risk management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • Data/process owners are expected to self-manage risks associated with their systems, applications, services and data, based on the organization’s published policies and standards, including the identification, remediation and reporting of risks. • Data/process owners work with IT/cybersecurity personnel and Data Protection Officers (DPOs) to ensure applicable statutory, regulatory and contractual obligations are properly addressed, including the storage, transmission and processing of sensitive/regulated data. • IT/cybersecurity personnel: o Identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for risk management. o Implement and maintain a form of Risk Management Program (RMP) that provides operational guidance on how risk is identified, assessed, remediated and reported. • Risk management processes (e.g., risk assessments) and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
Risk Management efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • A steering committee is formally established to provide executive oversight of the cybersecurity & data privacy program, including appropriately resourcing risk management operations. • A formal Risk Management Program (RMP) provides enterprise-wide guidance on how risk is to be identified, framed (e.g., risk appetite, risk tolerance, risk thresholds, etc.). assessed, mitigated/remediated and reported. • An IT Asset Management (ITAM) function, or similar function, categorizes assets according to the data the asset stores, transmits and/ or processes, applying the appropriate technology controls to protect the asset and data. • A Governance, Risk & Compliance (GRC) function, or similar function: o Maintains a common taxonomy of risk-relevant terminology to minimize assumptions and misunderstandings. o Enables data/process owners to conduct annual risk assessment of their operations that includes the likelihood and magnitude of harm, from unauthorized access, use, disclosure, disruption, modification or destruction of the organization's systems and data. o Assists users in making informed risk decisions to ensure data and processes are appropriately protected. o Enables the documentation of risk assessments, risk response and risk monitoring to support statutory, regulatory and contractual obligations for risk management practices. o Maintains a centralized risk register to reflect an active recording and disposition of identified risks. The risk register identifies and assigns a risk ranking to vulnerabilities and risks that is based on industry-recognized practices and facilitates monitoring and reporting of those risks. o Governs supply chain risks associated with the development, acquisition, maintenance and disposal of systems, system components and services
Risk Management efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to identify: ▪ Assumptions affecting risk assessments, risk response and risk monitoring; ▪ Constraints affecting risk assessments, risk response and risk monitoring; ▪ The organizational risk tolerance; and ▪ Priorities and trade-offs considered by the organization for managing risk.
CC3.2
CC3.1-POF1 CC3.1-POF6 CC3.2-POF2 CC3.2-POF8
null
16.6
null
16.6
16.6
APO12.04
Principle 7
A&A-06 CEK-07 TVM-08
RSM-01 RSM-02
null
null
null
RQ-06-30.a RQ-06-30.b RQ-06-30.c RQ-06-30.d
null
null
6.1.2 6.1.2(a) 6.1.2(a)(1) 6.1.2(a)(2) 6.1.2(b) 6.1.2(c) 6.1.2(c)(1) 6.1.2(c)(2) 6.1.2(d) 6.1.2(d)(1) 6.1.2(d)(2) 6.1.2(d)(3) 6.1.2(e) 6.1.2(e)(1) 6.1.2(e)(2)
null
5.8
null
null
null
null
5.1 5.2 5.3
4.3.3
null
OR-2.0
Sec 4(D)(3)
GOVERN 1.3 GOVERN 1.4 MANAGE 1
ID.DE-P1 GV.RM-P1 GV.RM-P2 GV.RM-P3
null
null
3.1
null
null
null
null
PM-28
PM-28
null
null
null
null
null
null
null
null
null
PM-28
null
null
PM-28
null
null
null
null
null
null
null
null
ID.RM-2 ID.RM-3
GV.RM-06
null
null
12.3.1 12.3.2
null
12.3.1
null
null
12.3.1
null
12.3.1 12.3.2
12.3.1
null
A.1.13
7.4A
1.4.1
null
null
null
RISK-2.C.MIL2
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
17 CFR 229.106(B)(1) 17 CFR 229.106(B)(1)(i) 17 CFR 229.106(B)(1)(ii) 17 CFR 229.106(B)(1)(iii) 17 CFR 229.106(B)(2)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
38-99-20(D)(3)
null
null
null
null
null
null
null
null
3.3.1(10) 3.6.1(66) 3.7.2(82)
Art 8.2
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
2.2
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
1-3-1-4 1-3-1-5
null
null
null
null
null
null
null
null
null
A2.a
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
4.4.7.1 4.4.7.2 4.4.7.3 4.4.7.4
null
null
23.2.16.C.01 23.2.17.C.01
null
null
null
null
4.2.1 4.3.2
null
null
null
null
null
5.5
null
6.15 6.24
null
null
null
null
null
null
null
null
null
null
null
x
NAIC
null
x
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-1 R-AM-2 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-GV-8 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1 R-SA-2
R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
null
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
R-SA-2
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Risk Management
Risk Management Resourcing
RSK-01.2
Mechanisms exist to reduce the magnitude or likelihood of potential impacts by resourcing the capability required to manage technology-related risks.
null
null
Does the organization reduce the magnitude or likelihood of potential impacts by resourcing the capability required to manage technology-related risks?
8
Protect
X
X
null
There is no evidence of a capability to reduce the magnitude or likelihood of potential impacts by resourcing the capability required to manage technology-related risks.
SP-CMM1 is N/A, since a structured process is required to reduce the magnitude or likelihood of potential impacts by resourcing the capability required to manage technology-related risks.
SP-CMM2 is N/A, since a well-defined process is required to reduce the magnitude or likelihood of potential impacts by resourcing the capability required to manage technology-related risks.
Risk Management efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • A steering committee is formally established to provide executive oversight of the cybersecurity & data privacy program, including appropriately resourcing risk management operations. • A formal Risk Management Program (RMP) provides enterprise-wide guidance on how risk is to be identified, framed (e.g., risk appetite, risk tolerance, risk thresholds, etc.). assessed, mitigated/remediated and reported. • An IT Asset Management (ITAM) function, or similar function, categorizes assets according to the data the asset stores, transmits and/ or processes, applying the appropriate technology controls to protect the asset and data. • A Governance, Risk & Compliance (GRC) function, or similar function: o Maintains a common taxonomy of risk-relevant terminology to minimize assumptions and misunderstandings. o Enables data/process owners to conduct annual risk assessment of their operations that includes the likelihood and magnitude of harm, from unauthorized access, use, disclosure, disruption, modification or destruction of the organization's systems and data. o Assists users in making informed risk decisions to ensure data and processes are appropriately protected. o Enables the documentation of risk assessments, risk response and risk monitoring to support statutory, regulatory and contractual obligations for risk management practices. o Maintains a centralized risk register to reflect an active recording and disposition of identified risks. The risk register identifies and assigns a risk ranking to vulnerabilities and risks that is based on industry-recognized practices and facilitates monitoring and reporting of those risks. o Governs supply chain risks associated with the development, acquisition, maintenance and disposal of systems, system components and services
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to reduce the magnitude or likelihood of potential impacts by resourcing the capability required to manage technology-related risks.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to reduce the magnitude or likelihood of potential impacts by resourcing the capability required to manage technology-related risks.
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
GOVERN 1.3 GOVERN 1.4 MANAGE 2.1
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-1 R-AM-2 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-GV-8 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1 R-SA-2
R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
null
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
R-SA-2
NT-2 NT-3 NT-4 NT-5 NT-6 NT-7 NT-8 NT-9 NT-10 NT-11 NT-12 NT-13 NT-14 MT-1 MT-2 MT-3 MT-4 MT-5 MT-6 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15
null
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
null
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Risk Management
Risk Tolerance
RSK-01.3
Mechanisms exist to define organizational risk tolerance, the specified range of acceptable results.
- Defined risk tolerance
E-RSK-06
Does the organization define organizational risk tolerance, the specified range of acceptable results?
9
Identify
X
X
X
There is no evidence of a capability to define organizational risk tolerance(s).
SP-CMM1 is N/A, since a structured process is required to define organizational risk tolerance(s).
SP-CMM2 is N/A, since a well-defined process is required to define organizational risk tolerance(s).
Risk Management efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • A steering committee is formally established to provide executive oversight of the cybersecurity & data privacy program, including appropriately resourcing risk management operations. • A formal Risk Management Program (RMP) provides enterprise-wide guidance on how risk is to be identified, framed (e.g., risk appetite, risk tolerance, risk thresholds, etc.). assessed, mitigated/remediated and reported. • An IT Asset Management (ITAM) function, or similar function, categorizes assets according to the data the asset stores, transmits and/ or processes, applying the appropriate technology controls to protect the asset and data. • A Governance, Risk & Compliance (GRC) function, or similar function: o Maintains a common taxonomy of risk-relevant terminology to minimize assumptions and misunderstandings. o Enables data/process owners to conduct annual risk assessment of their operations that includes the likelihood and magnitude of harm, from unauthorized access, use, disclosure, disruption, modification or destruction of the organization's systems and data. o Assists users in making informed risk decisions to ensure data and processes are appropriately protected. o Enables the documentation of risk assessments, risk response and risk monitoring to support statutory, regulatory and contractual obligations for risk management practices. o Maintains a centralized risk register to reflect an active recording and disposition of identified risks. The risk register identifies and assigns a risk ranking to vulnerabilities and risks that is based on industry-recognized practices and facilitates monitoring and reporting of those risks. o Governs supply chain risks associated with the development, acquisition, maintenance and disposal of systems, system components and services
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to define organizational risk tolerance(s).
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to define organizational risk tolerance(s).
null
CC3.1-POF2 CC3.1-POF15
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
GOVERN 1.3 MAP 1.5
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
GV.RM-02
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
17 CFR 229.106(B)(1) 17 CFR 229.106(B)(1)(i)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
3.3.1(10)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
A2.a
null
null
null
null
null
null
null
null
null
null
null
26
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-1 R-AM-2 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-GV-8 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1 R-SA-2
R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
null
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
R-SA-2
NT-2 NT-3 NT-4 NT-5 NT-6 NT-7 NT-8 NT-9 NT-10 NT-11 NT-12 NT-13 NT-14 MT-1 MT-2 MT-3 MT-4 MT-5 MT-6 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15
null
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
null
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Risk Management
Risk Threshold
RSK-01.4
Mechanisms exist to define organizational risk threshold, the level of risk exposure above which risks are addressed and below which risks may be accepted.
- Defined risk threshold
E-RSK-07
Does the organization define organizational risk threshold, the level of risk exposure above which risks are addressed and below which risks may be accepted?
9
Identify
X
X
X
There is no evidence of a capability to define organizational risk threshold.
SP-CMM1 is N/A, since a structured process is required to define organizational risk threshold.
SP-CMM2 is N/A, since a well-defined process is required to define organizational risk threshold.
Risk Management efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • A steering committee is formally established to provide executive oversight of the cybersecurity & data privacy program, including appropriately resourcing risk management operations. • A formal Risk Management Program (RMP) provides enterprise-wide guidance on how risk is to be identified, framed (e.g., risk appetite, risk tolerance, risk thresholds, etc.). assessed, mitigated/remediated and reported. • An IT Asset Management (ITAM) function, or similar function, categorizes assets according to the data the asset stores, transmits and/ or processes, applying the appropriate technology controls to protect the asset and data. • A Governance, Risk & Compliance (GRC) function, or similar function: o Maintains a common taxonomy of risk-relevant terminology to minimize assumptions and misunderstandings. o Enables data/process owners to conduct annual risk assessment of their operations that includes the likelihood and magnitude of harm, from unauthorized access, use, disclosure, disruption, modification or destruction of the organization's systems and data. o Assists users in making informed risk decisions to ensure data and processes are appropriately protected. o Enables the documentation of risk assessments, risk response and risk monitoring to support statutory, regulatory and contractual obligations for risk management practices. o Maintains a centralized risk register to reflect an active recording and disposition of identified risks. The risk register identifies and assigns a risk ranking to vulnerabilities and risks that is based on industry-recognized practices and facilitates monitoring and reporting of those risks. o Governs supply chain risks associated with the development, acquisition, maintenance and disposal of systems, system components and services
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to define organizational risk threshold.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to define organizational risk threshold.
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
MAP 1.5 MAP 3.2
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
GV.RM-06
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
17 CFR 229.106(B)(1) 17 CFR 229.106(B)(1)(i)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
3.3.1(10)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
A2.a
null
null
null
null
null
null
null
null
null
null
null
26
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-1 R-AM-2 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-GV-8 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1 R-SA-2
R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
null
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
R-SA-2
NT-2 NT-3 NT-4 NT-5 NT-6 NT-7 NT-8 NT-9 NT-10 NT-11 NT-12 NT-13 NT-14 MT-1 MT-2 MT-3 MT-4 MT-5 MT-6 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15
null
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
null
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Risk Management
Risk Appetite
RSK-01.5
Mechanisms exist to define organizational risk appetite, the degree of uncertainty the organization is willing to accept in anticipation of a reward.
- Defined risk tolerance
E-RSK-08
Does the organization define organizational risk appetite, the degree of uncertainty the organization is willing to accept in anticipation of a reward?
9
Identify
X
X
X
There is no evidence of a capability to define organizational risk appetite.
SP-CMM1 is N/A, since a structured process is required to define organizational risk appetite.
SP-CMM2 is N/A, since a well-defined process is required to define organizational risk appetite.
Risk Management efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • A steering committee is formally established to provide executive oversight of the cybersecurity & data privacy program, including appropriately resourcing risk management operations. • A formal Risk Management Program (RMP) provides enterprise-wide guidance on how risk is to be identified, framed (e.g., risk appetite, risk tolerance, risk thresholds, etc.). assessed, mitigated/remediated and reported. • An IT Asset Management (ITAM) function, or similar function, categorizes assets according to the data the asset stores, transmits and/ or processes, applying the appropriate technology controls to protect the asset and data. • A Governance, Risk & Compliance (GRC) function, or similar function: o Maintains a common taxonomy of risk-relevant terminology to minimize assumptions and misunderstandings. o Enables data/process owners to conduct annual risk assessment of their operations that includes the likelihood and magnitude of harm, from unauthorized access, use, disclosure, disruption, modification or destruction of the organization's systems and data. o Assists users in making informed risk decisions to ensure data and processes are appropriately protected. o Enables the documentation of risk assessments, risk response and risk monitoring to support statutory, regulatory and contractual obligations for risk management practices. o Maintains a centralized risk register to reflect an active recording and disposition of identified risks. The risk register identifies and assigns a risk ranking to vulnerabilities and risks that is based on industry-recognized practices and facilitates monitoring and reporting of those risks. o Governs supply chain risks associated with the development, acquisition, maintenance and disposal of systems, system components and services
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to define organizational risk appetite.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to define organizational risk appetite.
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
GV.RM-02
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
17 CFR 229.106(B)(1) 17 CFR 229.106(B)(1)(i)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
3.3.1(10) 3.3.1(13)(a)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
26
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-1 R-AM-2 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-GV-8 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1 R-SA-2
R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
null
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
R-SA-2
NT-2 NT-3 NT-4 NT-5 NT-6 NT-7 NT-8 NT-9 NT-10 NT-11 NT-12 NT-13 NT-14 MT-1 MT-2 MT-3 MT-4 MT-5 MT-6 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15
null
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
null
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Risk Management
Risk-Based Security Categorization
RSK-02
Mechanisms exist to categorize systems and data in accordance with applicable local, state and Federal laws that: ▪ Document the security categorization results (including supporting rationale) in the security plan for systems; and ▪ Ensure the security categorization decision is reviewed and approved by the asset owner.
- Risk Management Program (RMP)
null
Does the organization categorize systems and data in accordance with applicable local, state and Federal laws that: ▪ Document the security categorization results (including supporting rationale) in the security plan for systems; and ▪ Ensure the security categorization decision is reviewed and approved by the asset owner?
9
Identify
X
X
X
There is no evidence of a capability to categorize systems and data in accordance with applicable local, state and Federal laws that: ▪ Document the security categorization results (including supporting rationale) in the security plan for systems; and ▪ Ensure the security categorization decision is reviewed and approved by the asset owner.
Risk Management efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist: • IT personnel use an informal process to identify, assess, remediate and report on risk. • Data/process owners are expected to self-manage risks associated with their systems, applications, services and data, based on the organization’s published policies and standards, including the identification, remediation and reporting of risks. • Risk management processes (e.g., risk assessments) focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
Risk Management efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Risk management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • Data/process owners are expected to self-manage risks associated with their systems, applications, services and data, based on the organization’s published policies and standards, including the identification, remediation and reporting of risks. • Data/process owners work with IT/cybersecurity personnel and Data Protection Officers (DPOs) to ensure applicable statutory, regulatory and contractual obligations are properly addressed, including the storage, transmission and processing of sensitive/regulated data. • IT/cybersecurity personnel: o Identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for risk management. o Implement and maintain a form of Risk Management Program (RMP) that provides operational guidance on how risk is identified, assessed, remediated and reported. • Risk management processes (e.g., risk assessments) and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
Risk Management efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • A steering committee is formally established to provide executive oversight of the cybersecurity & data privacy program, including appropriately resourcing risk management operations. • A formal Risk Management Program (RMP) provides enterprise-wide guidance on how risk is to be identified, framed (e.g., risk appetite, risk tolerance, risk thresholds, etc.). assessed, mitigated/remediated and reported. • An IT Asset Management (ITAM) function, or similar function, categorizes assets according to the data the asset stores, transmits and/ or processes, applying the appropriate technology controls to protect the asset and data. • A Governance, Risk & Compliance (GRC) function, or similar function: o Maintains a common taxonomy of risk-relevant terminology to minimize assumptions and misunderstandings. o Enables data/process owners to conduct annual risk assessment of their operations that includes the likelihood and magnitude of harm, from unauthorized access, use, disclosure, disruption, modification or destruction of the organization's systems and data. o Assists users in making informed risk decisions to ensure data and processes are appropriately protected. o Enables the documentation of risk assessments, risk response and risk monitoring to support statutory, regulatory and contractual obligations for risk management practices. o Maintains a centralized risk register to reflect an active recording and disposition of identified risks. The risk register identifies and assigns a risk ranking to vulnerabilities and risks that is based on industry-recognized practices and facilitates monitoring and reporting of those risks. o Governs supply chain risks associated with the development, acquisition, maintenance and disposal of systems, system components and services
Risk Management efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to categorize systems and data in accordance with applicable local, state and Federal laws that: ▪ Document the security categorization results (including supporting rationale) in the security plan for systems; and ▪ Ensure the security categorization decision is reviewed and approved by the asset owner.
CC3.2
null
null
16.6
null
16.6
16.6
null
Principle 7
BCR-02
RSM-01 RSM-02
null
null
null
RQ-15-06
null
null
6.1.2(d)(3)
null
null
null
null
null
null
5.1 5.2 5.3
null
null
OR-2.0
Sec 4(D)(3)
null
null
null
null
3.1
RA-2
RA-2
RA-2
RA-2
RA-2
null
RA-2
RA-2
RA-2
null
null
RA-2
RA-2
RA-2
null
RA-2
RA-2
null
RA-2
RA-2
RA-2
null
null
null
null
null
null
ID.RA-6
GV.RM-06
null
9.6.1
9.4.2
9.4.2
9.4.2
9.4.2
9.4.2
9.4.2
9.4.2
9.4.2
9.4.2
null
D.7
7.4A
null
null
null
null
RISK-2.C.MIL2 RISK-3.A.MIL1 RISK-3.B.MIL2 RISK-3.C.MIL2 RISK-3.D.MIL2 RISK-3.E.MIL2
ADM:SG1.SP1 ADM:SG2.SP1 RISK:SG1.SP1
null
null
null
null
null
null
null
null
RA-2
null
null
null
null
null
null
null
RA-2
RA-2
RA-2
RA-2
RA-2
RA-2
RA-2
RA-2
RA-2
RA-2
null
null
null
null
null
null
null
null
null
null
null
null
8-402
null
null
null
null
null
null
RA-2
RA-2
RA-2
null
null
null
null
null
null
null
null
null
null
null
null
null
null
38-99-20(D)(3)
null
null
RA-2
RA-2
RA-2
null
null
null
null
null
Art 17
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
2.2
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
1-3-1-4 1-3-1-5
null
null
null
null
null
null
null
null
null
A2.a
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
4.4.7.1 4.4.7.2 4.4.7.3 4.4.7.4
null
null
null
null
null
null
null
4.2.1
null
null
null
null
null
null
null
6.24
null
null
null
null
null
null
null
null
null
null
null
x
NAIC
null
x
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-1 R-AM-2 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-GV-8 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1 R-SA-2
R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
null
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
R-SA-2
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Risk Management
Impact-Level Prioritization
RSK-02.1
Mechanisms exist to prioritize the impact level for systems, applications and/or services to prevent potential disruptions.
null
null
Does the organization prioritize the impact level for systems, applications and/or services to prevent potential disruptions?
9
Identify
X
X
null
There is no evidence of a capability to prioritize the impact level for systems, applications and/ or services to prevent potential disruptions.
SP-CMM1 is N/A, since a structured process is required to prioritize the impact level for systems, applications and/ or services to prevent potential disruptions.
Risk Management efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Risk management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • Data/process owners are expected to self-manage risks associated with their systems, applications, services and data, based on the organization’s published policies and standards, including the identification, remediation and reporting of risks. • Data/process owners work with IT/cybersecurity personnel and Data Protection Officers (DPOs) to ensure applicable statutory, regulatory and contractual obligations are properly addressed, including the storage, transmission and processing of sensitive/regulated data. • IT/cybersecurity personnel: o Identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for risk management. o Implement and maintain a form of Risk Management Program (RMP) that provides operational guidance on how risk is identified, assessed, remediated and reported. • Risk management processes (e.g., risk assessments) and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
Risk Management efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • A steering committee is formally established to provide executive oversight of the cybersecurity & data privacy program, including appropriately resourcing risk management operations. • A formal Risk Management Program (RMP) provides enterprise-wide guidance on how risk is to be identified, framed (e.g., risk appetite, risk tolerance, risk thresholds, etc.). assessed, mitigated/remediated and reported. • An IT Asset Management (ITAM) function, or similar function, categorizes assets according to the data the asset stores, transmits and/ or processes, applying the appropriate technology controls to protect the asset and data. • A Governance, Risk & Compliance (GRC) function, or similar function: o Maintains a common taxonomy of risk-relevant terminology to minimize assumptions and misunderstandings. o Enables data/process owners to conduct annual risk assessment of their operations that includes the likelihood and magnitude of harm, from unauthorized access, use, disclosure, disruption, modification or destruction of the organization's systems and data. o Assists users in making informed risk decisions to ensure data and processes are appropriately protected. o Enables the documentation of risk assessments, risk response and risk monitoring to support statutory, regulatory and contractual obligations for risk management practices. o Maintains a centralized risk register to reflect an active recording and disposition of identified risks. The risk register identifies and assigns a risk ranking to vulnerabilities and risks that is based on industry-recognized practices and facilitates monitoring and reporting of those risks. o Governs supply chain risks associated with the development, acquisition, maintenance and disposal of systems, system components and services
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to prioritize the impact level for systems, applications and/ or services to prevent potential disruptions.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to prioritize the impact level for systems, applications and/ or services to prevent potential disruptions.
null
CC3.2-POF4
null
16.6
null
16.6
16.6
null
null
A&A-06 BCR-02 CEK-07 TVM-08
RSM-01 RSM-02
null
null
FR 2 (6.1)
null
null
null
null
null
null
null
null
null
null
null
null
null
OR-2.0
null
MANAGE 1 MANAGE 1.2
null
null
null
null
null
null
null
null
RA-2(1)
null
null
null
null
RA-2(1)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
ID.RA-6
GV.RM-06
null
null
null
null
null
null
null
null
null
null
null
null
A.1.13
7.4A
1.4.1
null
null
null
RISK-2.C.MIL2 RISK-3.A.MIL1 RISK-3.B.MIL2 RISK-3.C.MIL2 RISK-3.D.MIL2 RISK-3.E.MIL2
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
17 CFR 229.106(B)(1)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
1-3-1-4 1-3-1-5
null
null
null
null
null
null
null
null
null
A2.a
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
4.4.7.1 4.4.7.2 4.4.7.3 4.4.7.4
null
null
23.2.16.C.01 23.2.17.C.01
null
null
null
null
4.2.1 4.3.1 4.3.2
null
null
null
null
null
5.5
null
6.24
null
null
null
null
null
null
null
null
null
null
null
null
null
null
x
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-1 R-AM-2 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-GV-8 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1 R-SA-2
R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
null
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
R-SA-2
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Risk Management
Risk Identification
RSK-03
Mechanisms exist to identify and document risks, both internal and external.
- Risk Management Program (RMP)
null
Does the organization identify and document risks, both internal and external?
9
Identify
null
X
null
There is no evidence of a capability to identify and document risks, both internal and external.
Risk Management efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist: • IT personnel use an informal process to identify, assess, remediate and report on risk. • Data/process owners are expected to self-manage risks associated with their systems, applications, services and data, based on the organization’s published policies and standards, including the identification, remediation and reporting of risks. • Risk management processes (e.g., risk assessments) focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
Risk Management efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Risk management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • Data/process owners are expected to self-manage risks associated with their systems, applications, services and data, based on the organization’s published policies and standards, including the identification, remediation and reporting of risks. • Data/process owners work with IT/cybersecurity personnel and Data Protection Officers (DPOs) to ensure applicable statutory, regulatory and contractual obligations are properly addressed, including the storage, transmission and processing of sensitive/regulated data. • IT/cybersecurity personnel: o Identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for risk management. o Implement and maintain a form of Risk Management Program (RMP) that provides operational guidance on how risk is identified, assessed, remediated and reported. • Risk management processes (e.g., risk assessments) and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
Risk Management efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • A steering committee is formally established to provide executive oversight of the cybersecurity & data privacy program, including appropriately resourcing risk management operations. • A formal Risk Management Program (RMP) provides enterprise-wide guidance on how risk is to be identified, framed (e.g., risk appetite, risk tolerance, risk thresholds, etc.). assessed, mitigated/remediated and reported. • An IT Asset Management (ITAM) function, or similar function, categorizes assets according to the data the asset stores, transmits and/ or processes, applying the appropriate technology controls to protect the asset and data. • A Governance, Risk & Compliance (GRC) function, or similar function: o Maintains a common taxonomy of risk-relevant terminology to minimize assumptions and misunderstandings. o Enables data/process owners to conduct annual risk assessment of their operations that includes the likelihood and magnitude of harm, from unauthorized access, use, disclosure, disruption, modification or destruction of the organization's systems and data. o Assists users in making informed risk decisions to ensure data and processes are appropriately protected. o Enables the documentation of risk assessments, risk response and risk monitoring to support statutory, regulatory and contractual obligations for risk management practices. o Maintains a centralized risk register to reflect an active recording and disposition of identified risks. The risk register identifies and assigns a risk ranking to vulnerabilities and risks that is based on industry-recognized practices and facilitates monitoring and reporting of those risks. o Governs supply chain risks associated with the development, acquisition, maintenance and disposal of systems, system components and services
Risk Management efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to identify and document risks, both internal and external.
CC3.2 CC7.2 A1.2
CC3.2-POF6 CC3.4-POF1 CC3.4-POF2 CC3.4-POF3 CC3.4-POF4 CC3.4-POF5
null
null
null
null
null
APO12.01
Principle 7 Principle 10
CEK-07 TVM-07
RSM-01
null
null
null
null
null
6.1.2
6.1.2(c) 6.1.2(c)(1) 6.1.2(c)(2)
null
5.8
null
null
5.4.1.2
null
5.1 5.2 5.3
5.2
null
OR-2.0
Sec 4(C)(2)
MANAGE 1.0 MANAGE 2.3
ID.DE-P1
null
P-3 P-14 R-2
3.1 3.2
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
RV.3 RV.3.1 RV.3.2 RV.3.3 RV.3.4
ID.RA-3
GV.RM-07
null
null
12.3 12.3.1 12.3.2
null
12.3.1
null
null
12.3.1
null
12.3.1 12.3.2
12.3.1
null
A.1.3
7.4A
1.4.1
null
7.3.3
7.3.3
RISK-2.A.MIL1 RISK-2.B.MIL2 RISK-2.G.MIL2 RISK-2.H.MIL3 RISK-2.I.MIL3 RISK-2.J.MIL3 RISK-2.K.MIL3 RISK-2.M.MIL3
null
8.2
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
D3.DC.An.B.1 D2.MA.Ma.E.1 D2.MA.Ma.E.4 D2.MA.Ma.Int.2
null
null
314.4(c)(2)
null
null
null
null
null
null
null
null
14.1
null
null
17 CFR 229.106(B)(1)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Sec 4(2)(b)(ii)(A)(2) Sec 4(2)(b)(ii)(A)(3) Sec 4(2)(b)(ii)(B)(1) Sec 4(2)(b)(ii)(B)(2) Sec 4(2)(b)(ii)(C)(1)
null
38-99-20(C)(2)
null
Sec 7
null
null
null
null
null
null
3.3.1(10) 3.3.1(13)(b) 3.7.2(82)
Art 8.2
Art 17
null
null
null
null
null
null
null
null
null
null
null
null
SP-03
null
null
null
1.2 2.2
null
null
null
null
null
null
null
null
null
null
null
null
TPC-31
3.2.1.1
null
null
null
null
Sec 19
null
null
null
null
null
null
A2.a
A2
null
null
null
null
null
null
null
null
1526
null
null
null
null
null
null
null
null
null
null
4.4.7 4.4.7.2
null
null
2.4.13.C.01 2.4.13.C.02 2.4.13.C.03 2.4.13.C.04 2.4.13.C.05 2.4.13.C.06 2.4.13.C.07
null
null
null
null
4.1.3 4.1.4(a)
null
null
null
null
null
5.5
null
6.24
3.1 3.1.1
null
null
null
null
null
null
null
null
null
null
x
NAIC
null
x
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-1 R-AM-2 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-GV-8 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1 R-SA-2
R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
null
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
R-SA-2
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Risk Management
Risk Catalog
RSK-03.1
Mechanisms exist to develop and keep current a catalog of applicable risks associated with the organization's business operations and technologies in use.
null
null
Does the organization develop and keep current a catalog of applicable risks associated with the organization's business operations and technologies in use?
5
Protect
X
X
X
There is no evidence of a capability to develop and keep current a catalog of applicable risks associated with the organization's business operations and technologies in use.
Risk Management efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist: • IT personnel use an informal process to identify, assess, remediate and report on risk. • Data/process owners are expected to self-manage risks associated with their systems, applications, services and data, based on the organization’s published policies and standards, including the identification, remediation and reporting of risks. • Risk management processes (e.g., risk assessments) focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
Risk Management efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Risk management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • Data/process owners are expected to self-manage risks associated with their systems, applications, services and data, based on the organization’s published policies and standards, including the identification, remediation and reporting of risks. • Data/process owners work with IT/cybersecurity personnel and Data Protection Officers (DPOs) to ensure applicable statutory, regulatory and contractual obligations are properly addressed, including the storage, transmission and processing of sensitive/regulated data. • IT/cybersecurity personnel: o Identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for risk management. o Implement and maintain a form of Risk Management Program (RMP) that provides operational guidance on how risk is identified, assessed, remediated and reported. • Risk management processes (e.g., risk assessments) and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
Risk Management efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • A steering committee is formally established to provide executive oversight of the cybersecurity & data privacy program, including appropriately resourcing risk management operations. • A formal Risk Management Program (RMP) provides enterprise-wide guidance on how risk is to be identified, framed (e.g., risk appetite, risk tolerance, risk thresholds, etc.). assessed, mitigated/remediated and reported. • An IT Asset Management (ITAM) function, or similar function, categorizes assets according to the data the asset stores, transmits and/ or processes, applying the appropriate technology controls to protect the asset and data. • A Governance, Risk & Compliance (GRC) function, or similar function: o Maintains a common taxonomy of risk-relevant terminology to minimize assumptions and misunderstandings. o Enables data/process owners to conduct annual risk assessment of their operations that includes the likelihood and magnitude of harm, from unauthorized access, use, disclosure, disruption, modification or destruction of the organization's systems and data. o Assists users in making informed risk decisions to ensure data and processes are appropriately protected. o Enables the documentation of risk assessments, risk response and risk monitoring to support statutory, regulatory and contractual obligations for risk management practices. o Maintains a centralized risk register to reflect an active recording and disposition of identified risks. The risk register identifies and assigns a risk ranking to vulnerabilities and risks that is based on industry-recognized practices and facilitates monitoring and reporting of those risks. o Governs supply chain risks associated with the development, acquisition, maintenance and disposal of systems, system components and services
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to develop and keep current a catalog of applicable risks associated with the organization's business operations and technologies in use.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to develop and keep current a catalog of applicable risks associated with the organization's business operations and technologies in use.
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
ID.RA-04
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
3.3
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
R-BC-1 R-BC-2 R-EX-5 R-GV-1 R-GV-2 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-IR-4 R-SA-1 R-SA-2
null
null
null
null
null
null
null
R-BC-1
R-BC-2
null
null
null
null
null
null
null
R-EX-5
null
null
R-GV-1
R-GV-2
null
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
null
null
null
R-IR-4
R-SA-1
R-SA-2
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Risk Management
Risk Assessment
RSK-04
Mechanisms exist to conduct recurring assessments of risk that includes the likelihood and magnitude of harm, from unauthorized access, use, disclosure, disruption, modification or destruction of the organization's systems and data.
- Risk Management Program (RMP) - Risk assessment - Business Impact Analysis (BIA) - Data Protection Impact Assessment (DPIA)
E-RSK-04
Does the organization conduct recurring assessments of risk that includes the likelihood and magnitude of harm, from unauthorized access, use, disclosure, disruption, modification or destruction of the organization's systems and data?
10
Identify
X
X
X
There is no evidence of a capability to conduct recurring assessments of risk that includes the likelihood and magnitude of harm, from unauthorized access, use, disclosure, disruption, modification or destruction of the organization's systems and data.
Risk Management efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist: • IT personnel use an informal process to identify, assess, remediate and report on risk. • Data/process owners are expected to self-manage risks associated with their systems, applications, services and data, based on the organization’s published policies and standards, including the identification, remediation and reporting of risks. • Risk management processes (e.g., risk assessments) focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
Risk Management efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Risk management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • Data/process owners are expected to self-manage risks associated with their systems, applications, services and data, based on the organization’s published policies and standards, including the identification, remediation and reporting of risks. • Data/process owners work with IT/cybersecurity personnel and Data Protection Officers (DPOs) to ensure applicable statutory, regulatory and contractual obligations are properly addressed, including the storage, transmission and processing of sensitive/regulated data. • IT/cybersecurity personnel: o Identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for risk management. o Implement and maintain a form of Risk Management Program (RMP) that provides operational guidance on how risk is identified, assessed, remediated and reported. • Risk management processes (e.g., risk assessments) and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
Risk Management efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • A steering committee is formally established to provide executive oversight of the cybersecurity & data privacy program, including appropriately resourcing risk management operations. • A formal Risk Management Program (RMP) provides enterprise-wide guidance on how risk is to be identified, framed (e.g., risk appetite, risk tolerance, risk thresholds, etc.). assessed, mitigated/remediated and reported. • An IT Asset Management (ITAM) function, or similar function, categorizes assets according to the data the asset stores, transmits and/ or processes, applying the appropriate technology controls to protect the asset and data. • A Governance, Risk & Compliance (GRC) function, or similar function: o Maintains a common taxonomy of risk-relevant terminology to minimize assumptions and misunderstandings. o Enables data/process owners to conduct annual risk assessment of their operations that includes the likelihood and magnitude of harm, from unauthorized access, use, disclosure, disruption, modification or destruction of the organization's systems and data. o Assists users in making informed risk decisions to ensure data and processes are appropriately protected. o Enables the documentation of risk assessments, risk response and risk monitoring to support statutory, regulatory and contractual obligations for risk management practices. o Maintains a centralized risk register to reflect an active recording and disposition of identified risks. The risk register identifies and assigns a risk ranking to vulnerabilities and risks that is based on industry-recognized practices and facilitates monitoring and reporting of those risks. o Governs supply chain risks associated with the development, acquisition, maintenance and disposal of systems, system components and services
Risk Management efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to conduct recurring assessments of risk that includes the likelihood and magnitude of harm, from unauthorized access, use, disclosure, disruption, modification or destruction of the organization's systems and data.
CC3.2 CC7.3 A1.2
CC3.2-POF1 CC3.2-POF6 CC3.4-POF1 CC3.4-POF2 CC3.4-POF3 CC3.4-POF4 CC3.4-POF5
null
null
null
null
null
APO12.02
Principle 7 Principle 11
CEK-07
RSM-01
SO2
1.2.4
null
RQ-06-23 RQ-06-24 RQ-06-25 RQ-06-26 RQ-06-27 RQ-06-28.a RQ-06-28.b RQ-06-29 RQ-06-30.a RQ-06-30.b RQ-06-30.c RQ-06-30.d RQ-06-31 RQ-06-32
8.2.3
6.1.2 8.2
6.1.2(d) 6.1.2(d)(1) 6.1.2(d)(2) 6.1.2(d)(3) 6.1.2(e) 6.1.2(e)(1) 6.1.2(e)(2) 8.2
11.1.4
5.8 7.5
11.1.4
null
5.4.1.2 6.8.1.2
5.12
5.4
4.3.4 5.3.1 5.3.4 5.3.5 5.3.6 5.4 5.5 6.7
null
OR-2.0
Sec 4(C)(3) Sec 4(C)(4)
GOVERN 1.5 MANAGE 1.0 MAP 5.1
ID.DE-P1 ID.DE-P5 GV.MT-P1
null
P-3 P-14 R-2
3.2
RA-3
RA-3
RA-3
RA-3
RA-3
RA-3
RA-3
RA-3
RA-3
null
null
RA-3
RA-3
RA-3
null
RA-3
RA-3
null
RA-3
RA-3
RA-3
3.11.1
3.11.1.a
3.11.1[a] 3.11.1[b]
A.03.11.01.a A.03.11.01.b
3.11.5e 3.11.6e
RV.3 RV.3.1 RV.3.2 RV.3.3 RV.3.4
ID.RA-5
GV.RM-06
null
12.2
12.3 12.3.1 12.3.2
null
12.3.1
null
null
12.3.1
null
12.3.1 12.3.2
12.3.1
null
A.3.2
7.4A
1.4.1
5.1
7.3.3
7.3.3
RISK-2.G.MIL2 RISK-3.A.MIL1
RISK:SG2.SP1 RISK:SG2.SP2 RISK:SG3.SP1 RISK:SG3.SP2 RISK:SG4.SP1 RISK:SG4.SP2 RISK:SG4.SP3 RISK:SG5.SP1 RISK:SG5.SP2
null
null
null
RA.L2-3.11.1
RA.L2-3.11.1 TBD - 3.11.5e TBD - 3.11.6e
null
RA.L2-3.11.1
RA.L2-3.11.1 RA.L3-3.11.5e RA.L3-3.11.6e
RA-3
null
null
null
null
null
null
null
RA-3
RA-3
RA-3
RA-3
RA-3
RA-3
RA-3
RA-3
RA-3
RA-3
null
D1.RM.RA.B.1 D1.RM.RA.E.2 D1.RM.RA.E.1
null
null
314.4(b) 314.4(b)(1) 314.4(b)(1)(i) 314.4(b)(1)(ii) 314.4(b)(1)(iii)
164.308(a)(1)(ii)(A) 164.308(a)(1)(ii)(B) 164.308(a)(1)(ii)(D)
null
7.M.C
7.M.C 9.L.A
RA-3
null
CIP-014-2 R1
8-402
14.1
null
null
17 CFR 229.106(B)(1) 17 CFR 229.106(B)(1)(i) 17 CFR 229.106(B)(1)(ii) 17 CFR 229.106(B)(1)(iii) 17 CFR 229.106(B)(2)
null
5.6
RA-3
RA-3
RA-3
null
null
null
null
null
null
null
null
null
17.03(2)(b)
null
null
Sec 4(2)(b)(ii)(A)(2) Sec 4(2)(b)(ii)(A)(3) Sec 4(2)(b)(ii)(B)(1) Sec 4(2)(b)(ii)(B)(2) Sec 4(2)(b)(ii)(C)(1)
622(b)(A)(ii)
38-99-20(C)(3) 38-99-20(C)(4)
null
Sec 7 Sec 11
RA-3
RA-3
RA-3
null
null
null
3.3.1(10) 3.3.1(13)(b) 3.3.3(20) 3.7.2(82)
Art 8.3 Art 8.7
Art 17
Art 35.1 Art 35.2 Art 35.3 Art 35.7 Art 35.8 Art 35.9 Art 35.11
Article 21.1
null
null
null
null
null
null
null
null
null
3.10
OIS-07 SP-03
null
null
null
1.2 2.2
null
null
null
null
null
null
null
null
null
null
null
1-2-1-1
TPC-31
3.2.1.2
1-5-3
1-3-1-2
null
null
Sec 19
null
7.1.1 [OP.PL.1]
null
null
null
null
A2.a
A2
null
null
null
null
null
null
null
null
1587
null
27(a) 27(b) 27(c) 28
null
null
null
null
null
null
null
null
4.4.7 4.4.7.1 4.4.7.3 4.4.7.4 4.5.5 4.5.5.1 4.6 4.6.1 11.1.4
null
1.4.1
2.3.27.C.01 2.3.27.C.02 5.9.23.C.01 23.2.16.C.02
null
null
null
null
4.1.4(b) 4.3.2
null
null
null
null
null
5.5
null
2.1 6.8
null
null
null
null
null
null
null
null
null
null
null
x
NAIC MA 201 CMR 17 OR 6464A
null
x
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-1 R-AM-2 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-GV-8 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1 R-SA-2
R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
null
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
R-SA-2
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Risk Management
Risk Register
RSK-04.1
Mechanisms exist to maintain a risk register that facilitates monitoring and reporting of risks.
- Risk Management Program (RMP) - Risk register - Governance, Risk and Compliance Solution (GRC) tool (SCFConnect, SureCloud,Ostendio, ZenGRC, Archer, RSAM, MetricStream, etc.)
E-RSK-03
Does the organization maintain a risk register that facilitates monitoring and reporting of risks?
10
Identify
null
X
null
There is no evidence of a capability to maintain a risk register that facilitates monitoring and reporting of risks.
Risk Management efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist: • IT personnel use an informal process to identify, assess, remediate and report on risk. • Data/process owners are expected to self-manage risks associated with their systems, applications, services and data, based on the organization’s published policies and standards, including the identification, remediation and reporting of risks. • Risk management processes (e.g., risk assessments) focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
Risk Management efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Risk management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • Data/process owners are expected to self-manage risks associated with their systems, applications, services and data, based on the organization’s published policies and standards, including the identification, remediation and reporting of risks. • Data/process owners work with IT/cybersecurity personnel and Data Protection Officers (DPOs) to ensure applicable statutory, regulatory and contractual obligations are properly addressed, including the storage, transmission and processing of sensitive/regulated data. • IT/cybersecurity personnel: o Identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for risk management. o Implement and maintain a form of Risk Management Program (RMP) that provides operational guidance on how risk is identified, assessed, remediated and reported. • Risk management processes (e.g., risk assessments) and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
Risk Management efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • A steering committee is formally established to provide executive oversight of the cybersecurity & data privacy program, including appropriately resourcing risk management operations. • A formal Risk Management Program (RMP) provides enterprise-wide guidance on how risk is to be identified, framed (e.g., risk appetite, risk tolerance, risk thresholds, etc.). assessed, mitigated/remediated and reported. • An IT Asset Management (ITAM) function, or similar function, categorizes assets according to the data the asset stores, transmits and/ or processes, applying the appropriate technology controls to protect the asset and data. • A Governance, Risk & Compliance (GRC) function, or similar function: o Maintains a common taxonomy of risk-relevant terminology to minimize assumptions and misunderstandings. o Enables data/process owners to conduct annual risk assessment of their operations that includes the likelihood and magnitude of harm, from unauthorized access, use, disclosure, disruption, modification or destruction of the organization's systems and data. o Assists users in making informed risk decisions to ensure data and processes are appropriately protected. o Enables the documentation of risk assessments, risk response and risk monitoring to support statutory, regulatory and contractual obligations for risk management practices. o Maintains a centralized risk register to reflect an active recording and disposition of identified risks. The risk register identifies and assigns a risk ranking to vulnerabilities and risks that is based on industry-recognized practices and facilitates monitoring and reporting of those risks. o Governs supply chain risks associated with the development, acquisition, maintenance and disposal of systems, system components and services
Risk Management efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
Risk Management efforts are “world-class” capabilities that leverage predictive analysis (e.g., machine learning, AI, etc.). In addition to CMM Level 4 criteria, CMM Level 5 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Stakeholders make time-sensitive decisions to support operational efficiency, which may include automated remediation actions. ▪ Based on predictive analysis, process improvements are implemented according to “continuous improvement” practices that affect process changes.
CC3.2
CC4.2-POF3
null
null
null
null
null
APO12.03 APO12.05
Principle 7
A&A-06 CEK-07 TVM-09
GVN-08
null
null
null
RQ-09-05 RQ-09-06.a RQ-09-06.b
null
8.3
null
null
null
null
null
null
5.12
5.6 5.7
4.3.6 5.5
null
OR-2.0
Sec 4(D)(3)
GOVERN 1.5 MANAGE 1.4 MANAGE 2.0 MEASURE 3.0
ID.DE-P1
null
null
3.4
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
3.12.2.a 3.12.2.a.1 3.12.2.a.2 3.12.2.b
null
null
null
null
null
null
null
null
12.3.1 12.3.2
null
12.3.1
null
null
12.3.1
null
12.3.1 12.3.2
12.3.1
null
A.3.8
7.4A
1.4.1
7.1.2
7.3.3
7.3.3
RISK-2.E.MIL2 RISK-2.F.MIL2 RISK-3.F.MIL2
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
314.4(c)(2)
null
null
null
null
2.E.5
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
38-99-20(D)(3)
null
Sec 7
null
null
null
null
null
null
3.3.1(10) 3.3.1(13)(d)
null
Art 17
Art 35.1
null
null
null
null
null
null
null
null
null
null
null
SP-03
null
null
null
2.2 6.8
null
null
null
null
null
null
null
null
null
null
null
1-2-1-2
TPC-31
3.2.1.4
null
1-3-1-3 1-3-1-6
null
null
Sec 19
null
null
null
null
null
null
A2.a
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
4.4.7.2 4.5.5
null
null
null
null
null
null
null
4.1.3 4.1.4(d) 4.5.2 4.5.3
null
null
null
null
null
5.5
null
6.24
null
null
null
null
null
null
null
null
null
null
null
x
NAIC
null
x
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-1 R-AM-2 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-GV-8 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1 R-SA-2
R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
null
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
R-SA-2
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Risk Management
Risk Ranking
RSK-05
Mechanisms exist to identify and assign a risk ranking to newly discovered security vulnerabilities that is based on industry-recognized practices.
- Risk Management Program (RMP)
null
Does the organization identify and assign a risk ranking to newly discovered security vulnerabilities that is based on industry-recognized practices?
9
Identify
null
X
null
There is no evidence of a capability to identify and assign a risk ranking to newly discovered security vulnerabilities that is based on industry-recognized practices.
Risk Management efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist: • IT personnel use an informal process to identify, assess, remediate and report on risk. • Data/process owners are expected to self-manage risks associated with their systems, applications, services and data, based on the organization’s published policies and standards, including the identification, remediation and reporting of risks. • Risk management processes (e.g., risk assessments) focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
Risk Management efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Risk management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • Data/process owners are expected to self-manage risks associated with their systems, applications, services and data, based on the organization’s published policies and standards, including the identification, remediation and reporting of risks. • Data/process owners work with IT/cybersecurity personnel and Data Protection Officers (DPOs) to ensure applicable statutory, regulatory and contractual obligations are properly addressed, including the storage, transmission and processing of sensitive/regulated data. • IT/cybersecurity personnel: o Identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for risk management. o Implement and maintain a form of Risk Management Program (RMP) that provides operational guidance on how risk is identified, assessed, remediated and reported. • Risk management processes (e.g., risk assessments) and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
Risk Management efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • A steering committee is formally established to provide executive oversight of the cybersecurity & data privacy program, including appropriately resourcing risk management operations. • A formal Risk Management Program (RMP) provides enterprise-wide guidance on how risk is to be identified, framed (e.g., risk appetite, risk tolerance, risk thresholds, etc.). assessed, mitigated/remediated and reported. • An IT Asset Management (ITAM) function, or similar function, categorizes assets according to the data the asset stores, transmits and/ or processes, applying the appropriate technology controls to protect the asset and data. • A Governance, Risk & Compliance (GRC) function, or similar function: o Maintains a common taxonomy of risk-relevant terminology to minimize assumptions and misunderstandings. o Enables data/process owners to conduct annual risk assessment of their operations that includes the likelihood and magnitude of harm, from unauthorized access, use, disclosure, disruption, modification or destruction of the organization's systems and data. o Assists users in making informed risk decisions to ensure data and processes are appropriately protected. o Enables the documentation of risk assessments, risk response and risk monitoring to support statutory, regulatory and contractual obligations for risk management practices. o Maintains a centralized risk register to reflect an active recording and disposition of identified risks. The risk register identifies and assigns a risk ranking to vulnerabilities and risks that is based on industry-recognized practices and facilitates monitoring and reporting of those risks. o Governs supply chain risks associated with the development, acquisition, maintenance and disposal of systems, system components and services
Risk Management efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to identify and assign a risk ranking to newly discovered security vulnerabilities that is based on industry-recognized practices.
CC3.2
CC3.1-POF6 CC3.2-POF4 CC3.2-POF8
null
null
null
null
null
APO12.03
Principle 7 Principle 12
BCR-02 CEK-07
RSM-01 RSM-02
null
null
null
null
null
8.3
null
null
null
null
null
null
null
5.5
4.3.5
null
OR-2.0
Sec 4(D)(3)
MANAGE 1.2
ID.DE-P1
RV.3 RV.3.1 RV.3.2
R-2
3.3
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
GV.RM-06
null
6.1
12.3
null
null
null
null
null
null
null
null
null
I.1.7.2
7.4A
1.4.1
7.1.3
null
null
RISK-2.C.MIL2 RISK-3.C.MIL2 RISK-3.D.MIL2 RISK-3.E.MIL2
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
314.4(c)(2)
null
null
null
null
null
null
null
null
null
null
null
17 CFR 229.106(B)(1) 17 CFR 229.106(B)(2)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
38-99-20(D)(3)
null
null
null
null
null
null
null
null
3.3.1(10)
null
Art 17
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
2.2
null
null
null
null
null
null
null
null
null
null
null
null
TPC-31
3.2.1.2
null
null
null
null
Sec 19
null
null
null
null
null
null
A2.a
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
4.4.7.3 4.4.7.4 4.5.5
null
null
null
null
null
null
null
4.2.1
null
null
null
null
null
5.5
null
2.2
null
null
null
null
null
null
null
null
null
null
null
x
NAIC
null
x
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-1 R-AM-2 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-GV-8 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1 R-SA-2
R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
null
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
R-SA-2
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Risk Management
Risk Remediation
RSK-06
Mechanisms exist to remediate risks to an acceptable level.
- Risk Management Program (RMP) - CimTrak Integrity Suite (https://www.cimcor.com/cimtrak/)
null
Does the organization remediate risks to an acceptable level?
10
Identify
X
X
X
There is no evidence of a capability to remediate risks to an acceptable level.
Risk Management efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist: • IT personnel use an informal process to identify, assess, remediate and report on risk. • Data/process owners are expected to self-manage risks associated with their systems, applications, services and data, based on the organization’s published policies and standards, including the identification, remediation and reporting of risks. • Risk management processes (e.g., risk assessments) focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
Risk Management efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Risk management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • Data/process owners are expected to self-manage risks associated with their systems, applications, services and data, based on the organization’s published policies and standards, including the identification, remediation and reporting of risks. • Data/process owners work with IT/cybersecurity personnel and Data Protection Officers (DPOs) to ensure applicable statutory, regulatory and contractual obligations are properly addressed, including the storage, transmission and processing of sensitive/regulated data. • IT/cybersecurity personnel: o Identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for risk management. o Implement and maintain a form of Risk Management Program (RMP) that provides operational guidance on how risk is identified, assessed, remediated and reported. • Risk management processes (e.g., risk assessments) and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
Risk Management efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • A steering committee is formally established to provide executive oversight of the cybersecurity & data privacy program, including appropriately resourcing risk management operations. • A formal Risk Management Program (RMP) provides enterprise-wide guidance on how risk is to be identified, framed (e.g., risk appetite, risk tolerance, risk thresholds, etc.). assessed, mitigated/remediated and reported. • An IT Asset Management (ITAM) function, or similar function, categorizes assets according to the data the asset stores, transmits and/ or processes, applying the appropriate technology controls to protect the asset and data. • A Governance, Risk & Compliance (GRC) function, or similar function: o Maintains a common taxonomy of risk-relevant terminology to minimize assumptions and misunderstandings. o Enables data/process owners to conduct annual risk assessment of their operations that includes the likelihood and magnitude of harm, from unauthorized access, use, disclosure, disruption, modification or destruction of the organization's systems and data. o Assists users in making informed risk decisions to ensure data and processes are appropriately protected. o Enables the documentation of risk assessments, risk response and risk monitoring to support statutory, regulatory and contractual obligations for risk management practices. o Maintains a centralized risk register to reflect an active recording and disposition of identified risks. The risk register identifies and assigns a risk ranking to vulnerabilities and risks that is based on industry-recognized practices and facilitates monitoring and reporting of those risks. o Governs supply chain risks associated with the development, acquisition, maintenance and disposal of systems, system components and services
Risk Management efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to remediate risks to an acceptable level.
CC3.2 CC4.2 CC7.4
CC1.1-POF4 CC5.3-POF4
null
18.3
null
18.3
18.3
APO12.06
Principle 7 Principle 13 Principle 17
CEK-07
RSM-01 RSM-02
null
null
null
RQ-08-08 RQ-09-05 RQ-09-06.a RQ-09-06.b RQ-09-07.a RQ-09-07.b RQ-09-07.c RQ-09-07.d RQ-15-17.a RQ-15-17.b RQ-15-17.c RQ-15-17.d
null
6.1.3 8.3 10.1
6.1.3 6.1.3(a) 6.1.3(b) 6.1.3(c) 6.1.3(d) 6.1.3(e) 6.1.3(f) 8.3
null
5.8
null
null
5.4.1.3
null
5.5
4.3.5
null
OR-2.0
Sec 4(D)(3)
MANAGE 1.2 MANAGE 2.0 MANAGE 4.0
ID.DE-P1 ID.RA-P5
null
A-5
3.3
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
3.11.3
null
null
null
null
null
ID.RA-6
ID.RA-06
null
null
10.7 10.7.1 10.7.2 10.7.3 12.3 A3.3.1.2
null
null
null
null
null
null
10.7.2 10.7.3
10.7.1 10.7.2 10.7.3
null
P.4.4
null
1.4.1
7.1.1
7.3.3 7.3.4
7.3.3 7.3.4
RISK-4.A.MIL1 RISK-4.B.MIL2 RISK-4.C.MIL3 RISK-4.D.MIL3 RISK-4.E.MIL3
null
null
null
null
RA.L2-3.11.3
RA.L2-3.11.3
null
RA.L2-3.11.3
RA.L2-3.11.3
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
D5.IR.Pl.B.1 D5.DR.Re.E.1 D5.IR.Pl.E.1
null
null
314.4(c)(2)
null
null
null
null
null
null
null
null
null
6.11
null
null
null
5.6
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
38-99-20(D)(3)
null
null
null
null
null
null
null
null
3.3.1(13)(c)
null
Art 17
null
Article 21.4
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
TPC-31
null
null
null
null
null
Sec 19
null
null
null
null
null
null
A2.a
null
null
null
null
null
null
null
null
null
null
null
31
null
null
null
null
null
null
null
null
4.4.8 4.4.8.1 4.4.8.2 4.4.8.3 4.4.8.4 4.4.8.5 4.5.5 4.5.5.2 4.5.5.3 4.7.1 4.7.1.1 4.7.1.2 4.7.1.3 4.7.1.4 4.7.1.5 4.7.1.6 4.7.1.7
null
null
null
null
null
null
null
4.1.3 4.1.4(c) 4.4.1 4.4.2 4.4.3 13.6.1 13.6.1(a) 13.6.1(b) 13.6.1(c)
null
null
null
null
null
5.5
null
2.2 2.7 6.8
null
null
null
null
null
null
null
null
null
null
null
x
NAIC
null
x
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-1 R-AM-2 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-GV-8 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1 R-SA-2
R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
null
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
R-SA-2
NT-1 NT-2 NT-3 NT-4 NT-5 NT-6 NT-7 NT-8 NT-9 NT-10 NT-11 NT-12 NT-13 NT-14 MT-1 MT-2 MT-3 MT-4 MT-5 MT-6 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15
NT-1
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Risk Management
Risk Response
RSK-06.1
Mechanisms exist to respond to findings from cybersecurity & data privacy assessments, incidents and audits to ensure proper remediation has been performed.
- Risk Management Program (RMP)
null
Does the organization respond to findings from cybersecurity & data privacy assessments, incidents and audits to ensure proper remediation has been performed?
9
Identify
X
X
X
There is no evidence of a capability to respond to findings from cybersecurity & data privacy assessments, incidents and audits to ensure proper remediation has been performed.
Risk Management efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist: • IT personnel use an informal process to identify, assess, remediate and report on risk. • Data/process owners are expected to self-manage risks associated with their systems, applications, services and data, based on the organization’s published policies and standards, including the identification, remediation and reporting of risks. • Risk management processes (e.g., risk assessments) focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
Risk Management efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Risk management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • Data/process owners are expected to self-manage risks associated with their systems, applications, services and data, based on the organization’s published policies and standards, including the identification, remediation and reporting of risks. • Data/process owners work with IT/cybersecurity personnel and Data Protection Officers (DPOs) to ensure applicable statutory, regulatory and contractual obligations are properly addressed, including the storage, transmission and processing of sensitive/regulated data. • IT/cybersecurity personnel: o Identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for risk management. o Implement and maintain a form of Risk Management Program (RMP) that provides operational guidance on how risk is identified, assessed, remediated and reported. • Risk management processes (e.g., risk assessments) and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
Risk Management efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • A steering committee is formally established to provide executive oversight of the cybersecurity & data privacy program, including appropriately resourcing risk management operations. • A formal Risk Management Program (RMP) provides enterprise-wide guidance on how risk is to be identified, framed (e.g., risk appetite, risk tolerance, risk thresholds, etc.). assessed, mitigated/remediated and reported. • An IT Asset Management (ITAM) function, or similar function, categorizes assets according to the data the asset stores, transmits and/ or processes, applying the appropriate technology controls to protect the asset and data. • A Governance, Risk & Compliance (GRC) function, or similar function: o Maintains a common taxonomy of risk-relevant terminology to minimize assumptions and misunderstandings. o Enables data/process owners to conduct annual risk assessment of their operations that includes the likelihood and magnitude of harm, from unauthorized access, use, disclosure, disruption, modification or destruction of the organization's systems and data. o Assists users in making informed risk decisions to ensure data and processes are appropriately protected. o Enables the documentation of risk assessments, risk response and risk monitoring to support statutory, regulatory and contractual obligations for risk management practices. o Maintains a centralized risk register to reflect an active recording and disposition of identified risks. The risk register identifies and assigns a risk ranking to vulnerabilities and risks that is based on industry-recognized practices and facilitates monitoring and reporting of those risks. o Governs supply chain risks associated with the development, acquisition, maintenance and disposal of systems, system components and services
Risk Management efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to respond to findings from cybersecurity & data privacy assessments, incidents and audits to ensure proper remediation has been performed.
CC3.2 CC3.3
CC3.2-POF5
null
null
null
null
null
APO12.06
Principle 7 Principle 8
A&A-06 CEK-07
RSM-01 RSM-02
null
null
null
RQ-08-08 RQ-09-05 RQ-09-06.a RQ-09-06.b RQ-09-07.a RQ-09-07.b RQ-09-07.c RQ-09-07.d RQ-15-17.a RQ-15-17.b RQ-15-17.c RQ-15-17.d
null
8.3
6.1.3 6.1.3(a) 6.1.3(b) 6.1.3(c) 6.1.3(d) 6.1.3(e) 6.1.3(f) 8.3
null
5.8
null
null
null
null
5.5
4.3.5
null
OR-2.0
Sec 4(D)(3)
MANAGE 1.3 MANAGE 2.0 MANAGE 2.3 MANAGE 2.4 MANAGE 4.0
ID.DE-P1 ID.RA-P5
null
M-3 R-3
3.3
null
null
null
null
RA-7
RA-7
RA-7
RA-7
RA-7
null
null
RA-7
RA-7
RA-7
null
RA-7
RA-7
null
RA-7
RA-7
RA-7
null
null
null
null
null
null
null
GV.RM-04
null
null
10.7 10.7.1 10.7.2 10.7.3
null
null
null
null
null
null
10.7.2 10.7.3
10.7.1 10.7.2 10.7.3
null
A.3.4
null
1.4.1
null
7.3.3 7.3.4
7.3.3 7.3.4
RISK-4.A.MIL1 RISK-4.B.MIL2 RISK-4.C.MIL3 RISK-4.D.MIL3 RISK-4.E.MIL3 SITUATION-3.G.MIL3
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
RA-7
RA-7
RA-7
RA-7
RA-7
null
null
null
null
314.4(c)(2)
null
null
null
null
RA-7
null
null
null
null
null
null
17 CFR 229.106(B)(1)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
38-99-20(D)(3)
null
null
RA-7
null
null
null
null
null
3.3.1(13)(c)
null
Art 17
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
TPC-31
3.2.1.3
null
null
null
null
Sec 19
null
null
null
null
null
null
A2.a
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
4.4.8 4.4.8.1 4.4.8.2 4.4.8.3 4.4.8.4 4.4.8.5 4.5.5 4.5.5.2 4.5.5.3
null
null
null
null
null
null
null
4.1.5 4.5.3
null
null
null
null
null
5.5
null
6.24
null
null
null
null
null
null
null
null
null
null
null
x
NAIC
null
x
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-1 R-AM-2 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-GV-8 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1 R-SA-2
R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
null
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
R-SA-2
NT-1 NT-2 NT-3 NT-4 NT-5 NT-6 NT-7 NT-8 NT-9 NT-10 NT-11 NT-12 NT-13 NT-14 MT-1 MT-2 MT-3 MT-4 MT-5 MT-6 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15
NT-1
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Risk Management
Compensating Countermeasures
RSK-06.2
Mechanisms exist to identify and implement compensating countermeasures to reduce risk and exposure to threats.
null
null
Does the organization identify and implement compensating countermeasures to reduce risk and exposure to threats?
9
Respond
null
X
null
There is no evidence of a capability to identify and implement compensating countermeasures to reduce risk and exposure to threats.
SP-CMM1 is N/A, since a structured process is required to identify and implement compensating countermeasures to reduce risk and exposure to threats.
Risk Management efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Risk management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • Data/process owners are expected to self-manage risks associated with their systems, applications, services and data, based on the organization’s published policies and standards, including the identification, remediation and reporting of risks. • Data/process owners work with IT/cybersecurity personnel and Data Protection Officers (DPOs) to ensure applicable statutory, regulatory and contractual obligations are properly addressed, including the storage, transmission and processing of sensitive/regulated data. • IT/cybersecurity personnel: o Identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for risk management. o Implement and maintain a form of Risk Management Program (RMP) that provides operational guidance on how risk is identified, assessed, remediated and reported. • Risk management processes (e.g., risk assessments) and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
Risk Management efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • A steering committee is formally established to provide executive oversight of the cybersecurity & data privacy program, including appropriately resourcing risk management operations. • A formal Risk Management Program (RMP) provides enterprise-wide guidance on how risk is to be identified, framed (e.g., risk appetite, risk tolerance, risk thresholds, etc.). assessed, mitigated/remediated and reported. • An IT Asset Management (ITAM) function, or similar function, categorizes assets according to the data the asset stores, transmits and/ or processes, applying the appropriate technology controls to protect the asset and data. • A Governance, Risk & Compliance (GRC) function, or similar function: o Maintains a common taxonomy of risk-relevant terminology to minimize assumptions and misunderstandings. o Enables data/process owners to conduct annual risk assessment of their operations that includes the likelihood and magnitude of harm, from unauthorized access, use, disclosure, disruption, modification or destruction of the organization's systems and data. o Assists users in making informed risk decisions to ensure data and processes are appropriately protected. o Enables the documentation of risk assessments, risk response and risk monitoring to support statutory, regulatory and contractual obligations for risk management practices. o Maintains a centralized risk register to reflect an active recording and disposition of identified risks. The risk register identifies and assigns a risk ranking to vulnerabilities and risks that is based on industry-recognized practices and facilitates monitoring and reporting of those risks. o Governs supply chain risks associated with the development, acquisition, maintenance and disposal of systems, system components and services
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to identify and implement compensating countermeasures to reduce risk and exposure to threats.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to identify and implement compensating countermeasures to reduce risk and exposure to threats.
null
CC9.1-POF1 CC9.1-POF2
null
null
null
null
null
null
null
null
null
null
null
CCSC 2 (4.3)
PM-06-13 RQ-06-14
null
null
null
null
null
null
null
null
null
null
null
null
OR-2.0
null
MANAGE 2.1
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
ID.RA-07
null
null
1.2.6 2.2.4 12.3.1 12.3.2
null
1.2.6 2.2.4 12.3.1
null
1.2.6
2.2.4 12.3.1
2.2.4
1.2.6 2.2.4 12.3.1 12.3.2
1.2.6 2.2.4 12.3.1
null
A.1.3.1
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
314.4(c)(2)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
III.C.1.b III.C.2 III.C.3 III.E.3
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
3.3.1(13)(c)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
TPC-31
null
null
1-3-1-6 1-3-1-7
null
null
Sec 19
null
null
null
null
null
null
A2.a
null
null
null
null
null
null
null
null
null
1809
null
null
null
null
null
null
null
null
null
null
null
null
null
12.4.5.C.01
null
null
null
4.2(b) 4.3(c)
4.2.1 4.4.2 4.4.3
null
null
null
null
null
5.8
null
6.16 6.24
3.2.6
null
null
null
null
null
null
null
null
null
null
null
null
null
x
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-1 R-AM-2 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-GV-8 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1 R-SA-2
R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
null
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
R-SA-2
NT-1 NT-2 NT-3 NT-4 NT-5 NT-6 NT-7 NT-8 NT-9 NT-10 NT-11 NT-12 NT-13 NT-14 MT-1 MT-2 MT-3 MT-4 MT-5 MT-6 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15
NT-1
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Risk Management
Risk Assessment Update
RSK-07
Mechanisms exist to routinely update risk assessments and react accordingly upon identifying new security vulnerabilities, including using outside sources for security vulnerability information.
- Risk Management Program (RMP)
null
Does the organization routinely update risk assessments and react accordingly upon identifying new security vulnerabilities, including using outside sources for security vulnerability information?
9
Identify
null
X
null
There is no evidence of a capability to routinely update risk assessments and react accordingly up on identifying new security vulnerabilities, including using outside sources for security vulnerability information.
SP-CMM1 is N/A, since a structured process is required to routinely update risk assessments and react accordingly up on identifying new security vulnerabilities, including using outside sources for security vulnerability information.
Risk Management efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Risk management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • Data/process owners are expected to self-manage risks associated with their systems, applications, services and data, based on the organization’s published policies and standards, including the identification, remediation and reporting of risks. • Data/process owners work with IT/cybersecurity personnel and Data Protection Officers (DPOs) to ensure applicable statutory, regulatory and contractual obligations are properly addressed, including the storage, transmission and processing of sensitive/regulated data. • IT/cybersecurity personnel: o Identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for risk management. o Implement and maintain a form of Risk Management Program (RMP) that provides operational guidance on how risk is identified, assessed, remediated and reported. • Risk management processes (e.g., risk assessments) and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
Risk Management efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • A steering committee is formally established to provide executive oversight of the cybersecurity & data privacy program, including appropriately resourcing risk management operations. • A formal Risk Management Program (RMP) provides enterprise-wide guidance on how risk is to be identified, framed (e.g., risk appetite, risk tolerance, risk thresholds, etc.). assessed, mitigated/remediated and reported. • An IT Asset Management (ITAM) function, or similar function, categorizes assets according to the data the asset stores, transmits and/ or processes, applying the appropriate technology controls to protect the asset and data. • A Governance, Risk & Compliance (GRC) function, or similar function: o Maintains a common taxonomy of risk-relevant terminology to minimize assumptions and misunderstandings. o Enables data/process owners to conduct annual risk assessment of their operations that includes the likelihood and magnitude of harm, from unauthorized access, use, disclosure, disruption, modification or destruction of the organization's systems and data. o Assists users in making informed risk decisions to ensure data and processes are appropriately protected. o Enables the documentation of risk assessments, risk response and risk monitoring to support statutory, regulatory and contractual obligations for risk management practices. o Maintains a centralized risk register to reflect an active recording and disposition of identified risks. The risk register identifies and assigns a risk ranking to vulnerabilities and risks that is based on industry-recognized practices and facilitates monitoring and reporting of those risks. o Governs supply chain risks associated with the development, acquisition, maintenance and disposal of systems, system components and services
Risk Management efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to routinely update risk assessments and react accordingly up on identifying new security vulnerabilities, including using outside sources for security vulnerability information.
CC3.2
null
null
null
null
null
null
APO12.05
Principle 7
null
GVN-08
SO2
null
null
null
null
8.2
null
null
null
null
null
null
null
5.4 5.6
4.3.4
null
OR-2.0
null
null
ID.DE-P5 GV.MT-P1
null
M-2
3.2 3.3 3.4
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
3.11.1.b
null
null
null
null
null
null
null
6.1
12.3.1 12.3.2
null
12.3.1
null
null
12.3.1
null
12.3.1 12.3.2
12.3.1
null
A.3.1
7.4A
null
null
null
null
RISK-3.G.MIL3
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
314.4(b)(2)
null
null
null
null
null
null
null
null
null
null
null
null
null
5.6
null
null
null
null
null
null
null
null
null
null
null
null
17.03(2)(i) 17.03(2)(b)(3)
null
null
null
622(2)(A)(iv)
null
null
Sec 7
null
null
null
null
null
null
3.3.1(13)(f)
null
Art 17
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
2.2
null
null
null
null
null
null
null
null
null
null
null
null
TPC-31
null
1-5-3-2 1-5-4
null
null
null
Sec 19
null
null
null
null
null
null
A2.a
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
4.5.5 4.6 4.6.1
null
null
null
null
null
null
null
4.1.5
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
x
MA 201 CMR 17 OR 6464A
null
x
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-1 R-AM-2 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-GV-8 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1 R-SA-2
R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
null
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
R-SA-2
NT-1 NT-2 NT-3 NT-4 NT-5 NT-6 NT-7 NT-8 NT-9 NT-10 NT-11 NT-12 NT-13 NT-14 MT-1 MT-2 MT-3 MT-4 MT-5 MT-6 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15
NT-1
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Risk Management
Business Impact Analysis (BIA)
RSK-08
Mechanisms exist to conduct a Business Impact Analysis (BIA) to identify and assess cybersecurity and data protection risks.
- Risk Management Program (RMP) - Data Protection Impact Assessment (DPIA) - Business Impact Analysis (BIA)
E-CHG-01
Does the organization conduct a Business Impact Analysis (BIA) to identify and assess cybersecurity and data protection risks?
8
Identify
null
X
X
There is no evidence of a capability to conduct a Business Impact Analysis (BIA) to identify and assess cybersecurity and data protection risks.
Risk Management efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist: • IT personnel use an informal process to identify, assess, remediate and report on risk. • Data/process owners are expected to self-manage risks associated with their systems, applications, services and data, based on the organization’s published policies and standards, including the identification, remediation and reporting of risks. • Risk management processes (e.g., risk assessments) focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
Risk Management efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Risk management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • Data/process owners are expected to self-manage risks associated with their systems, applications, services and data, based on the organization’s published policies and standards, including the identification, remediation and reporting of risks. • Data/process owners work with IT/cybersecurity personnel and Data Protection Officers (DPOs) to ensure applicable statutory, regulatory and contractual obligations are properly addressed, including the storage, transmission and processing of sensitive/regulated data. • IT/cybersecurity personnel: o Identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for risk management. o Implement and maintain a form of Risk Management Program (RMP) that provides operational guidance on how risk is identified, assessed, remediated and reported. • Risk management processes (e.g., risk assessments) and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
Risk Management efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • A steering committee is formally established to provide executive oversight of the cybersecurity & data privacy program, including appropriately resourcing risk management operations. • A formal Risk Management Program (RMP) provides enterprise-wide guidance on how risk is to be identified, framed (e.g., risk appetite, risk tolerance, risk thresholds, etc.). assessed, mitigated/remediated and reported. • An IT Asset Management (ITAM) function, or similar function, categorizes assets according to the data the asset stores, transmits and/ or processes, applying the appropriate technology controls to protect the asset and data. • A Governance, Risk & Compliance (GRC) function, or similar function: o Maintains a common taxonomy of risk-relevant terminology to minimize assumptions and misunderstandings. o Enables data/process owners to conduct annual risk assessment of their operations that includes the likelihood and magnitude of harm, from unauthorized access, use, disclosure, disruption, modification or destruction of the organization's systems and data. o Assists users in making informed risk decisions to ensure data and processes are appropriately protected. o Enables the documentation of risk assessments, risk response and risk monitoring to support statutory, regulatory and contractual obligations for risk management practices. o Maintains a centralized risk register to reflect an active recording and disposition of identified risks. The risk register identifies and assigns a risk ranking to vulnerabilities and risks that is based on industry-recognized practices and facilitates monitoring and reporting of those risks. o Governs supply chain risks associated with the development, acquisition, maintenance and disposal of systems, system components and services
Risk Management efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to conduct a Business Impact Analysis (BIA) to identify and assess cybersecurity and data protection risks.
CC3.2 CC5.2 PI1.1
CC9.1-POF1 CC9.1-POF2
null
null
null
null
null
APO12.03 BAI04.02
Principle 7 Principle 11
BCR-02
RSM-01 RSM-02 RSM-03
null
null
null
RQ-15-01
8.2 8.2.1 8.2.2
8.2
null
null
5.30
null
null
null
5.12
5.4
4.3.4 5.3.3 5.5
null
null
Sec 4(D)(3)
null
null
null
null
3.2
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
ID.RA-4
null
null
null
A3.2.2
null
null
null
null
null
null
null
null
null
K.11
null
null
5.1
null
null
null
SC:SG7.SP1
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
D5.RE.Re.B.1 D5.ER.Er.Ev.1
null
null
null
null
null
7.M.C
7.M.C
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
38-99-20(D)(3)
null
null
null
null
null
null
null
null
3.7.1(78)
Art 11.5
Art 17
Art 35.1 Art 35.2 Art 35.3 Art 35.6 Art 35.8 Art 35.9 Art 35.11 Art 36.3
null
null
null
null
Art 21
null
null
null
null
null
null
BCM-02
null
null
null
6.8 16.6
null
null
null
null
null
null
null
null
null
null
null
null
null
null
1-5-3-4
null
null
null
Sec 19
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
21(d)
null
null
null
null
null
null
null
4.5.5 4.6 4.6.1
null
null
null
null
null
null
null
5.1.3 5.3.3
Art 33
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
x
NAIC
null
x
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-1 R-AM-2 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-GV-8 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1 R-SA-2
R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
null
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
R-SA-2
NT-1 NT-2 NT-3 NT-4 NT-5 NT-6 NT-7 NT-8 NT-9 NT-10 NT-11 NT-12 NT-13 NT-14 MT-1 MT-2 MT-3 MT-4 MT-5 MT-6 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15
NT-1
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Risk Management
Supply Chain Risk Management (SCRM) Plan
RSK-09
Mechanisms exist to develop a plan for Supply Chain Risk Management (SCRM) associated with the development, acquisition, maintenance and disposal of systems, system components and services, including documenting selected mitigating actions and monitoring performance against those plans.
- Risk Management Program (RMP)
E-RSK-02
Does the organization develop a plan for Supply Chain Risk Management (SCRM) associated with the development, acquisition, maintenance and disposal of systems, system components and services, including documenting selected mitigating actions and monitoring performance against those plans?
10
Identify
X
X
X
There is no evidence of a capability to develop a plan for Supply Chain Risk Management (SCRM) associated with the development, acquisition, maintenance and disposal of systems, system components and services, including documenting selected mitigating actions and monitoring performance against those plans.
SP-CMM1 is N/A, since a structured process is required to develop a plan for Supply Chain Risk Management (SCRM) associated with the development, acquisition, maintenance and disposal of systems, system components and services, including documenting selected mitigating actions and monitoring performance against those plans.
Risk Management efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Risk management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • Data/process owners are expected to self-manage risks associated with their systems, applications, services and data, based on the organization’s published policies and standards, including the identification, remediation and reporting of risks. • Data/process owners work with IT/cybersecurity personnel and Data Protection Officers (DPOs) to ensure applicable statutory, regulatory and contractual obligations are properly addressed, including the storage, transmission and processing of sensitive/regulated data. • IT/cybersecurity personnel: o Identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for risk management. o Implement and maintain a form of Risk Management Program (RMP) that provides operational guidance on how risk is identified, assessed, remediated and reported. • Risk management processes (e.g., risk assessments) and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
Risk Management efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • A steering committee is formally established to provide executive oversight of the cybersecurity & data privacy program, including appropriately resourcing risk management operations. • A formal Risk Management Program (RMP) provides enterprise-wide guidance on how risk is to be identified, framed (e.g., risk appetite, risk tolerance, risk thresholds, etc.). assessed, mitigated/remediated and reported. • An IT Asset Management (ITAM) function, or similar function, categorizes assets according to the data the asset stores, transmits and/ or processes, applying the appropriate technology controls to protect the asset and data. • A Governance, Risk & Compliance (GRC) function, or similar function: o Maintains a common taxonomy of risk-relevant terminology to minimize assumptions and misunderstandings. o Enables data/process owners to conduct annual risk assessment of their operations that includes the likelihood and magnitude of harm, from unauthorized access, use, disclosure, disruption, modification or destruction of the organization's systems and data. o Assists users in making informed risk decisions to ensure data and processes are appropriately protected. o Enables the documentation of risk assessments, risk response and risk monitoring to support statutory, regulatory and contractual obligations for risk management practices. o Maintains a centralized risk register to reflect an active recording and disposition of identified risks. The risk register identifies and assigns a risk ranking to vulnerabilities and risks that is based on industry-recognized practices and facilitates monitoring and reporting of those risks. o Governs supply chain risks associated with the development, acquisition, maintenance and disposal of systems, system components and services
Risk Management efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to develop a plan for Supply Chain Risk Management (SCRM) associated with the development, acquisition, maintenance and disposal of systems, system components and services, including documenting selected mitigating actions and monitoring performance against those plans.
CC3.1 CC3.2 CC4.1
CC3.2-POF7 CC9.2-POF1 CC9.2-POF2 CC9.2-POF3 CC9.2-POF4 CC9.2-POF5 CC9.2-POF6 CC9.2-POF7 CC9.2-POF8 CC9.2-POF9 CC9.2-POF10 CC9.2-POF11 CC9.2-POF12
null
15.2
null
15.2
15.2
APO12.01 APO12.02 APO12.03 APO12.04
Principle 6 Principle 7 Principle 16
STA-02 STA-03 STA-07 STA-08 STA-12 STA-13
SDV-02
null
null
null
null
null
null
null
null
5.21 8.30
null
null
null
null
5.1 5.2 5.3
4.3.3
null
null
Sec 4(D)(3)
MANAGE 3.0
ID.DE-P2 ID.DE-P3
PW.4.1
null
3.1
SA-12
null
null
SA-12
PM-29 PM-30 SR-2 SR-7
null
SR-2
SR-2
SR-2
PM-29 PM-30 SR-7
null
SR-2
SR-2
SR-2
null
PM-29 PM-30 SR-2 SR-7
SR-2
null
PM-29 PM-30
PM-30 SR-7
SR-2 SR-7
null
3.11.1.a 3.11.1.b 3.17.1.a 3.17.1.b 3.17.1.c 3.17.3.a 3.17.3.b
null
A.03.17.01.a[01] A.03.17.01.a[02] A.03.17.01.a[03] A.03.17.01.a[04] A.03.17.01.a[05] A.03.17.01.a[06] A.03.17.01.a[07] A.03.17.01.a[08] A.03.17.01.a[09] A.03.17.01.b[01] A.03.17.01.b[02] A.03.17.01.c
3.11.7e
null
ID.SC-1 ID.SC-3
GV.SC GV.SC-10
null
null
null
null
null
null
null
null
null
null
null
null
I.2.2.8
null
null
null
7.2.2.5
7.2.2.5
THIRD-PARTIES-1.C.MIL2
null
6.1 6.2
null
null
null
TBD - 3.11.7e
null
null
RA.L3-3.11.7e
null
null
null
null
null
null
null
null
null
null
null
null
null
SR-2
SR-2
SR-2
SR-2
SR-2
null
null
null
null
null
null
5.S.B
5.M.B
5.M.B 9.L.C
SR-2
null
null
null
null
null
null
17 CFR 229.106(B)(1)(iii)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
38-99-20(D)(3)
null
null
SR-2
null
null
null
null
null
null
Art 28.1 Art 28.1(a) Art 28.1(b) Art 28.1(b)(i) Art 28.1(b)(ii) Art 28.2 Art 28.3 Art 28.4(a) Art 28.4(b) Art 28.4(c) Art 28.4(d) Art 28.4(e) Art 28.5 Art 28.6 Art 28.7(a) Art 28.7(b) Art 28.7(c) Art 28.7(d) Art 28.8 Art 28.8(a) Art 28.8(b) Art 28.8(c)
null
null
Article 21.2(d) Article 21.3
null
null
null
null
null
null
null
null
null
null
OIS-07
null
null
null
16.3 17.3 17.11
null
null
null
null
null
null
null
null
null
null
null
null
null
null
1-5-3-3
null
null
null
null
null
null
null
null
null
null
A4.a
A4
null
null
null
null
null
null
null
null
0731 1567 1785
null
null
null
null
null
null
null
null
null
null
15.1.1.16.B 15.1.2.18.PB
null
null
2.2.7.C.01 12.7.14.C.01 12.7.14.C.02 12.7.14.C.03 12.7.15.C.01 12.7.15.C.02 12.7.16.C.01 12.7.16.C.02 12.7.16.C.03 12.7.17.C.01 12.7.18.C.01 12.7.18.C.02 12.7.19.C.01 12.7.19.C.02 12.7.20.C.01 12.7.20.C.02 12.7.20.C.03 12.7.20.C.04 12.7.20.C.05 12.7.21.C.01
null
null
null
null
5.3.1
null
null
null
null
null
null
null
2.3 4.25
null
null
null
null
null
null
null
null
null
null
null
x
NAIC
null
x
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-1 R-AM-2 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-GV-8 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1 R-SA-2
R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
null
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
R-SA-2
NT-1 NT-2 NT-3 NT-4 NT-5 NT-6 NT-7 NT-8 NT-9 NT-10 NT-11 NT-12 NT-13 NT-14 MT-1 MT-2 MT-3 MT-4 MT-5 MT-6 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15 MT-16
NT-1
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
MT-16
null
Risk Management
Supply Chain Risk Assessment
RSK-09.1
Mechanisms exist to periodically assess supply chain risks associated with systems, system components and services.
- Risk Management Program (RMP) - Data Protection Impact Assessment (DPIA)
E-RSK-05
Does the organization periodically assess supply chain risks associated with systems, system components and services?
9
Identify
X
X
null
There is no evidence of a capability to periodically assess supply chain risks associated with systems, system components and services.
Risk Management efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist: • IT personnel use an informal process to identify, assess, remediate and report on risk. • Data/process owners are expected to self-manage risks associated with their systems, applications, services and data, based on the organization’s published policies and standards, including the identification, remediation and reporting of risks. • Risk management processes (e.g., risk assessments) focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
Risk Management efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Risk management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • Data/process owners are expected to self-manage risks associated with their systems, applications, services and data, based on the organization’s published policies and standards, including the identification, remediation and reporting of risks. • Data/process owners work with IT/cybersecurity personnel and Data Protection Officers (DPOs) to ensure applicable statutory, regulatory and contractual obligations are properly addressed, including the storage, transmission and processing of sensitive/regulated data. • IT/cybersecurity personnel: o Identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for risk management. o Implement and maintain a form of Risk Management Program (RMP) that provides operational guidance on how risk is identified, assessed, remediated and reported. • Risk management processes (e.g., risk assessments) and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
Risk Management efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • A steering committee is formally established to provide executive oversight of the cybersecurity & data privacy program, including appropriately resourcing risk management operations. • A formal Risk Management Program (RMP) provides enterprise-wide guidance on how risk is to be identified, framed (e.g., risk appetite, risk tolerance, risk thresholds, etc.). assessed, mitigated/remediated and reported. • An IT Asset Management (ITAM) function, or similar function, categorizes assets according to the data the asset stores, transmits and/ or processes, applying the appropriate technology controls to protect the asset and data. • A Governance, Risk & Compliance (GRC) function, or similar function: o Maintains a common taxonomy of risk-relevant terminology to minimize assumptions and misunderstandings. o Enables data/process owners to conduct annual risk assessment of their operations that includes the likelihood and magnitude of harm, from unauthorized access, use, disclosure, disruption, modification or destruction of the organization's systems and data. o Assists users in making informed risk decisions to ensure data and processes are appropriately protected. o Enables the documentation of risk assessments, risk response and risk monitoring to support statutory, regulatory and contractual obligations for risk management practices. o Maintains a centralized risk register to reflect an active recording and disposition of identified risks. The risk register identifies and assigns a risk ranking to vulnerabilities and risks that is based on industry-recognized practices and facilitates monitoring and reporting of those risks. o Governs supply chain risks associated with the development, acquisition, maintenance and disposal of systems, system components and services
Risk Management efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to periodically assess supply chain risks associated with systems, system components and services.
CC3.2 CC9.2
CC3.2-POF7 CC9.2-POF1 CC9.2-POF2 CC9.2-POF3 CC9.2-POF4 CC9.2-POF5 CC9.2-POF6 CC9.2-POF7 CC9.2-POF8 CC9.2-POF9 CC9.2-POF10 CC9.2-POF11 CC9.2-POF12
null
null
null
null
null
APO12.01 APO12.02 APO12.03 APO12.04
Principle 7
STA-07 STA-08 STA-13 STA-14
null
null
null
null
null
null
8.2
null
null
8.30
null
null
null
5.12
5.4
4.3.4
null
null
null
MANAGE 3.1
ID.DE-P5 GV.MT-P1
null
null
3.2
null
null
null
null
RA-3(1)
null
RA-3(1)
RA-3(1)
RA-3(1)
null
null
RA-3(1)
RA-3(1)
RA-3(1)
null
null
null
null
null
null
null
null
3.11.1.b 3.17.3.a
null
null
3.11.6e
null
null
GV.SC-01 GV.SC-06 ID.IM-02
null
null
null
null
null
null
null
null
null
null
null
null
I.2.2.8
null
null
null
7.2.2.5
7.2.2.5
null
null
null
null
null
null
TBD - 3.11.6e
null
null
RA.L3-3.11.6e
null
null
null
null
null
null
null
null
null
null
null
null
null
RA-3(1)
RA-3(1)
RA-3(1)
RA-3(1)
RA-3(1)
null
null
null
null
null
null
5.S.B
5.M.B
5.M.B 9.L.C
RA-3(1)
null
null
null
null
null
null
17 CFR 229.106(B)(1)(iii)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
RA-3(1)
null
null
null
null
null
null
Art 28.4(a) Art 28.4(b) Art 28.4(c) Art 28.4(d) Art 28.4(e)
Art 17
Art 35.1 Art 35.2 Art 35.3 Art 35.6 Art 35.8 Art 35.9 Art 35.11 Art 36.3
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
16.6 17.3 17.11
null
null
null
null
null
null
null
null
null
null
null
null
null
null
1-5-3-3
null
null
null
null
null
null
null
null
null
null
A4.a
A4
null
null
null
null
null
null
null
null
1452
null
null
null
null
null
null
null
null
null
null
4.5.5 4.6 4.6.1
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
x
null
null
x
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-1 R-AM-2 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-GV-8 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1 R-SA-2
R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
null
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
R-SA-2
NT-1 NT-2 NT-3 NT-4 NT-5 NT-6 NT-7 NT-8 NT-9 NT-10 NT-11 NT-12 NT-13 NT-14 MT-1 MT-2 MT-3 MT-4 MT-5 MT-6 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15 MT-16
NT-1
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
MT-16
null
Risk Management
AI & Autonomous Technologies Supply Chain Impacts
RSK-09.2
Mechanisms exist to address Artificial Intelligence (AI) and Autonomous Technologies (AAT)-related risks and benefits arising from the organization's supply chain, including third-party software and data.
null
null
Does the organization address Artificial Intelligence (AI) and Autonomous Technologies (AAT)-related risks and benefits arising from the organization's supply chain, including third-party software and data?
8
Protect
X
X
null
There is no evidence of a capability to address Artificial Intelligence (AI) and Autonomous Technologies (AAT)-related risks and benefits arising from the organization's supply chain, including third-party software and data.
SP-CMM1 is N/A, since a structured process is required to address Artificial Intelligence (AI) and Autonomous Technologies (AAT)-related risks and benefits arising from the organization's supply chain, including third-party software and data.
SP-CMM2 is N/A, since a well-defined process is required to address Artificial Intelligence (AI) and Autonomous Technologies (AAT)-related risks and benefits arising from the organization's supply chain, including third-party software and data.
Risk Management efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • A steering committee is formally established to provide executive oversight of the cybersecurity & data privacy program, including appropriately resourcing risk management operations. • A formal Risk Management Program (RMP) provides enterprise-wide guidance on how risk is to be identified, framed (e.g., risk appetite, risk tolerance, risk thresholds, etc.). assessed, mitigated/remediated and reported. • An IT Asset Management (ITAM) function, or similar function, categorizes assets according to the data the asset stores, transmits and/ or processes, applying the appropriate technology controls to protect the asset and data. • A Governance, Risk & Compliance (GRC) function, or similar function: o Maintains a common taxonomy of risk-relevant terminology to minimize assumptions and misunderstandings. o Enables data/process owners to conduct annual risk assessment of their operations that includes the likelihood and magnitude of harm, from unauthorized access, use, disclosure, disruption, modification or destruction of the organization's systems and data. o Assists users in making informed risk decisions to ensure data and processes are appropriately protected. o Enables the documentation of risk assessments, risk response and risk monitoring to support statutory, regulatory and contractual obligations for risk management practices. o Maintains a centralized risk register to reflect an active recording and disposition of identified risks. The risk register identifies and assigns a risk ranking to vulnerabilities and risks that is based on industry-recognized practices and facilitates monitoring and reporting of those risks. o Governs supply chain risks associated with the development, acquisition, maintenance and disposal of systems, system components and services
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to address Artificial Intelligence (AI) and Autonomous Technologies (AAT)-related risks and benefits arising from the organization's supply chain, including third-party software and data.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to address Artificial Intelligence (AI) and Autonomous Technologies (AAT)-related risks and benefits arising from the organization's supply chain, including third-party software and data.
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
GOVERN 6.0
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-1 R-AM-2 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-GV-8 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1 R-SA-2
R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
null
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
R-SA-2
NT-1 NT-2 NT-3 NT-4 NT-5 NT-6 NT-7 NT-8 NT-9 NT-10 NT-11 NT-12 NT-13 NT-14 MT-1 MT-2 MT-3 MT-4 MT-5 MT-6 MT-7 MT-8 MT-9 MT-10 MT-11 MT-12 MT-13 MT-14 MT-15
NT-1
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Risk Management
Data Protection Impact Assessment (DPIA)
RSK-10
Mechanisms exist to conduct a Data Protection Impact Assessment (DPIA) on systems, applications and services that store, process and/or transmit Personal Data (PD) to identify and remediate reasonably-expected risks.
- Risk Management Program (RMP) - Data Protection Impact Assessment (DPIA) - Privacy Impact Assessment (PIA)
E-PRI-04
Does the organization conduct a Data Protection Impact Assessment (DPIA) on systems, applications and services that store, process and/or transmit Personal Data (PD) to identify and remediate reasonably-expected risks?
9
Identify
null
X
X
There is no evidence of a capability to conduct a Data Protection Impact Assessment (DPIA) on systems, applications and services that store, process and/ or transmit Personal Data (PD) to identify and remediate reasonably-expected risks.
Risk Management efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist: • IT personnel use an informal process to identify, assess, remediate and report on risk. • Data/process owners are expected to self-manage risks associated with their systems, applications, services and data, based on the organization’s published policies and standards, including the identification, remediation and reporting of risks. • Risk management processes (e.g., risk assessments) focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
Risk Management efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Risk management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • Data/process owners are expected to self-manage risks associated with their systems, applications, services and data, based on the organization’s published policies and standards, including the identification, remediation and reporting of risks. • Data/process owners work with IT/cybersecurity personnel and Data Protection Officers (DPOs) to ensure applicable statutory, regulatory and contractual obligations are properly addressed, including the storage, transmission and processing of sensitive/regulated data. • IT/cybersecurity personnel: o Identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for risk management. o Implement and maintain a form of Risk Management Program (RMP) that provides operational guidance on how risk is identified, assessed, remediated and reported. • Risk management processes (e.g., risk assessments) and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
Risk Management efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • A steering committee is formally established to provide executive oversight of the cybersecurity & data privacy program, including appropriately resourcing risk management operations. • A formal Risk Management Program (RMP) provides enterprise-wide guidance on how risk is to be identified, framed (e.g., risk appetite, risk tolerance, risk thresholds, etc.). assessed, mitigated/remediated and reported. • An IT Asset Management (ITAM) function, or similar function, categorizes assets according to the data the asset stores, transmits and/ or processes, applying the appropriate technology controls to protect the asset and data. • A Governance, Risk & Compliance (GRC) function, or similar function: o Maintains a common taxonomy of risk-relevant terminology to minimize assumptions and misunderstandings. o Enables data/process owners to conduct annual risk assessment of their operations that includes the likelihood and magnitude of harm, from unauthorized access, use, disclosure, disruption, modification or destruction of the organization's systems and data. o Assists users in making informed risk decisions to ensure data and processes are appropriately protected. o Enables the documentation of risk assessments, risk response and risk monitoring to support statutory, regulatory and contractual obligations for risk management practices. o Maintains a centralized risk register to reflect an active recording and disposition of identified risks. The risk register identifies and assigns a risk ranking to vulnerabilities and risks that is based on industry-recognized practices and facilitates monitoring and reporting of those risks. o Governs supply chain risks associated with the development, acquisition, maintenance and disposal of systems, system components and services
Risk Management efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to conduct a Data Protection Impact Assessment (DPIA) on systems, applications and services that store, process and/ or transmit Personal Data (PD) to identify and remediate reasonably-expected risks.
CC3.2 CC5.2 PI1.1
null
null
null
null
null
null
APO12.01 APO12.02 APO12.03 APO12.04
Principle 7 Principle 11
DSP-09 STA-14
GVN-07 GVN-08 LGL-01 LGL-03
null
1.2.4 4.2.3
null
null
null
8.2
null
18.1.4
5.33
18.1.4
A.11.1 A.11.2
7.2.5
5.12
5.4
4.3.4 5.3.3 5.5
null
null
Sec 4(D)(3)
null
ID.IM-P7 ID.RA-P1 ID.RA-P2 ID.RA-P3 ID.RA-P4 ID.RA-P5 ID.DE-P2 ID.DE-P3 GV.PO-P6 GV.MT-P1 GV.MT-P4 GV.MT-P5
null
null
3.2
AR-2
null
null
null
RA-8
RA-8
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
A3.2.2
null
null
null
null
null
null
null
null
null
P.4
null
null
5.1
null
null
null
OPD:SG1.SP1 RISK:SG5.SP1 RISK:SG5.SP2
null
null
null
null
null
null
null
null
AR-2
6,502
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
7.M.C
7.M.C 4.L.B
RA-8
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
6-1-1305(2)(c) 6-1-1305(4) 6-1-1309(1) 6-1-1309(2) 6-1-1309(2)(a) 6-1-1309(2)(a)(I) 6-1-1309(2)(a)(II) 6-1-1309(2)(a)(III) 6-1-1309(2)(a)(IV) 6-1-1309(2)(b) 6-1-1309(2)(c) 6-1-1309(3) 6-1-1309(4) 6-1-1309(5) 6-1-1309(6)
null
null
null
null
null
null
null
null
38-99-20(D)(3)
null
null
null
null
null
null
59.1-580.A 59.1-580.A.1 59.1-580.A.2 59.1-580.A.3 59.1-580.A.3(i) 59.1-580.A.3(ii) 59.1-580.A.3(iii) 59.1-580.A.3(iv) 59.1-580.A.4 59.1-580.A.5 59.1-580.B 59.1-580.C 59.1-580.D 59.1-580.E 59.1-580.F
null
null
null
Art 17
Art 35.1 Art 35.2 Art 35.3 Art 35.6 Art 35.8 Art 35.9 Art 35.11 Art 36.1 Art 36.2 Art 36.3
null
null
null
null
null
null
null
null
null
null
null
BCM-02
null
null
null
16.6 17.3
null
null
31(1) 31(2)(a) 31(2)(b) 31(2)(c) 31(2)(d) 31(3) 31(4) 31(5) 31(6)
null
null
null
null
null
null
Article 8.2
null
null
null
null
1-5-3-4
null
Article 54 Article 54.x
null
Sec 19
null
null
null
null
null
null
null
null
null
null
Article 35(1) Article 35(2) Article 35(3)(a) Article 35(3)(b) Article 35(3)(c) Article 35(7)(a) Article 35(7)(b) Article 35(7)(c) Article 35(7)(d) Article 35(8) Article 35(9) Article 35(10) Article 35(11)
null
null
null
null
null
null
null
null
21(d)
null
null
Article 55 Article 55(1) Article 55(2) Article 55(3) Article 55(4) Article 55(5) Article 56 Article 56(1) Article 56(2) Article 56(3)
null
null
null
null
4.5.5 4.6 4.6.1 18.1.4
null
null
null
null
null
null
null
5.1.3 5.3.3
Art 33
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
x
NAIC
null
x
R-AC-4 R-BC-2 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-GV-1 R-GV-2 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-SA-2
null
null
null
R-AC-4
null
null
null
null
R-BC-2
null
null
null
null
R-EX-2
R-EX-3
R-EX-4
R-EX-5
null
null
R-GV-1
R-GV-2
null
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
null
null
null
null
null
R-SA-2
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Risk Management
Risk Monitoring
RSK-11
Mechanisms exist to ensure risk monitoring as an integral part of the continuous monitoring strategy that includes monitoring the effectiveness of cybersecurity & data privacy controls, compliance and change management.
null
null
Does the organization ensure risk monitoring as an integral part of the continuous monitoring strategy that includes monitoring the effectiveness of cybersecurity & data privacy controls, compliance and change management?
9
Detect
null
X
null
There is no evidence of a capability to ensure risk monitoring as an integral part of the continuous monitoring strategy that includes monitoring the effectiveness of cybersecurity & data privacy controls, compliance and change management.
SP-CMM1 is N/A, since a structured process is required to ensure risk monitoring as an integral part of the continuous monitoring strategy that includes monitoring the effectiveness of cybersecurity & data privacy controls, compliance and change management.
Risk Management efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Risk management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • Data/process owners are expected to self-manage risks associated with their systems, applications, services and data, based on the organization’s published policies and standards, including the identification, remediation and reporting of risks. • Data/process owners work with IT/cybersecurity personnel and Data Protection Officers (DPOs) to ensure applicable statutory, regulatory and contractual obligations are properly addressed, including the storage, transmission and processing of sensitive/regulated data. • IT/cybersecurity personnel: o Identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for risk management. o Implement and maintain a form of Risk Management Program (RMP) that provides operational guidance on how risk is identified, assessed, remediated and reported. • Risk management processes (e.g., risk assessments) and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
Risk Management efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • A steering committee is formally established to provide executive oversight of the cybersecurity & data privacy program, including appropriately resourcing risk management operations. • A formal Risk Management Program (RMP) provides enterprise-wide guidance on how risk is to be identified, framed (e.g., risk appetite, risk tolerance, risk thresholds, etc.). assessed, mitigated/remediated and reported. • An IT Asset Management (ITAM) function, or similar function, categorizes assets according to the data the asset stores, transmits and/ or processes, applying the appropriate technology controls to protect the asset and data. • A Governance, Risk & Compliance (GRC) function, or similar function: o Maintains a common taxonomy of risk-relevant terminology to minimize assumptions and misunderstandings. o Enables data/process owners to conduct annual risk assessment of their operations that includes the likelihood and magnitude of harm, from unauthorized access, use, disclosure, disruption, modification or destruction of the organization's systems and data. o Assists users in making informed risk decisions to ensure data and processes are appropriately protected. o Enables the documentation of risk assessments, risk response and risk monitoring to support statutory, regulatory and contractual obligations for risk management practices. o Maintains a centralized risk register to reflect an active recording and disposition of identified risks. The risk register identifies and assigns a risk ranking to vulnerabilities and risks that is based on industry-recognized practices and facilitates monitoring and reporting of those risks. o Governs supply chain risks associated with the development, acquisition, maintenance and disposal of systems, system components and services
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to ensure risk monitoring as an integral part of the continuous monitoring strategy that includes monitoring the effectiveness of cybersecurity & data privacy controls, compliance and change management.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to ensure risk monitoring as an integral part of the continuous monitoring strategy that includes monitoring the effectiveness of cybersecurity & data privacy controls, compliance and change management.
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
OR-2.0
null
null
null
null
null
null
null
null
null
null
CA-7(4)
CA-7(4)
CA-7(4)
CA-7(4)
CA-7(4)
null
null
CA-7(4)
CA-7(4)
CA-7(4)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
A.4.5
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
CA-7(4)
CA-7(4)
CA-7(4)
CA-7(4)
CA-7(4)
null
null
null
null
null
null
null
null
null
CA-7(4)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
CA-7(4)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Sec 4
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
x
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-1 R-AM-2 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-GV-8 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1 R-SA-2
R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
null
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
R-SA-2
NT-1 NT-2 NT-3 NT-4 NT-5 NT-6 NT-7 NT-8 NT-9 NT-10 NT-11 NT-12 NT-13 NT-14 MT-1 MT-2 MT-3 MT-4 MT-5 MT-6 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15
NT-1
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Risk Management
Risk Culture
RSK-12
Mechanisms exist to ensure teams are committed to a culture that considers and communicates technology-related risk.
null
null
Does the organization ensure teams are committed to a culture that considers and communicates technology-related risk?
4
Identify
X
null
null
There is no evidence of a capability to ensure teams are committed to a culture that considers and communicates technology-related risk.
SP-CMM1 is N/A, since a structured process is required to ensure teams are committed to a culture that considers and communicates technology-related risk.
SP-CMM2 is N/A, since a well-defined process is required to ensure teams are committed to a culture that considers and communicates technology-related risk.
Risk Management efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • A steering committee is formally established to provide executive oversight of the cybersecurity & data privacy program, including appropriately resourcing risk management operations. • A formal Risk Management Program (RMP) provides enterprise-wide guidance on how risk is to be identified, framed (e.g., risk appetite, risk tolerance, risk thresholds, etc.). assessed, mitigated/remediated and reported. • An IT Asset Management (ITAM) function, or similar function, categorizes assets according to the data the asset stores, transmits and/ or processes, applying the appropriate technology controls to protect the asset and data. • A Governance, Risk & Compliance (GRC) function, or similar function: o Maintains a common taxonomy of risk-relevant terminology to minimize assumptions and misunderstandings. o Enables data/process owners to conduct annual risk assessment of their operations that includes the likelihood and magnitude of harm, from unauthorized access, use, disclosure, disruption, modification or destruction of the organization's systems and data. o Assists users in making informed risk decisions to ensure data and processes are appropriately protected. o Enables the documentation of risk assessments, risk response and risk monitoring to support statutory, regulatory and contractual obligations for risk management practices. o Maintains a centralized risk register to reflect an active recording and disposition of identified risks. The risk register identifies and assigns a risk ranking to vulnerabilities and risks that is based on industry-recognized practices and facilitates monitoring and reporting of those risks. o Governs supply chain risks associated with the development, acquisition, maintenance and disposal of systems, system components and services
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to ensure teams are committed to a culture that considers and communicates technology-related risk.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to ensure teams are committed to a culture that considers and communicates technology-related risk.
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
GOVERN 4.0
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-1 R-AM-2 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-GV-8 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1 R-SA-2
R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
null
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
R-SA-2
MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Secure Engineering & Architecture
Secure Engineering Principles
SEA-01
Mechanisms exist to facilitate the implementation of industry-recognized cybersecurity & data privacy practices in the specification, design, development, implementation and modification of systems and services.
null
E-TDA-01 E-TDA-02 E-TDA-04 E-TDA-08 E-TDA-09
Does the organization facilitate the implementation of industry-recognized cybersecurity & data privacy practices in the specification, design, development, implementation and modification of systems and services?
10
Protect
X
X
X
There is no evidence of a capability to facilitate the implementation of industry-recognized cybersecurity & data privacy practices in the specification, design, development, implementation and modification of systems and services.
Secure Engineering & Architecture (SEA) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist: • IT personnel use an informal process to design, build and maintain secure solutions. • IT /cyber engineering governance is decentralized, with the responsibility for implementing and testing cybersecurity & data privacy controls being assigned to the business process owner(s), including the definition and enforcement of roles and responsibilities. • Configurations mostly conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides).
Secure Engineering & Architecture (SEA) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Architecture/engineering management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • A Change Advisory Board (CAB), or similar function, exists to govern changes to systems, applications and services, ensuring their stability, reliability and predictability. • Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed. • IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for architecture/engineering management. • IT personnel implement secure engineering practices to protect the confidentiality, integrity, availability and safety of the organization’s technology assets, data and network(s). • Technologies are configured to protect data with the strength and integrity commensurate with the classification or sensitivity of the information and mostly conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides), including cryptographic protections for sensitive/regulated data.
Secure Engineering & Architecture (SEA) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • The Chief Information Security Officer (CISO), or similar function, analyzes the organization’s business strategy to determine prioritized and authoritative guidance for secure engineering practices. • The CISO, or similar function, develops a security-focused Concept of Operations (CONOPS) that documents management, operational and technical measures to apply defense-in-depth techniques across the enterprise for secure engineering. • A Governance, Risk & Compliance (GRC) function, or similar function, provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity & data privacy controls to protect the confidentiality, integrity, availability and safety of the organization’s applications, systems, services and data with regards to secure engineering. • A steering committee is formally established to provide executive oversight of the cybersecurity & data privacy program, including secure engineering. • IT/cybersecurity architects, or a similar function, enable the implementation a “layered defense” network architecture that enables a resilient defense-in-depth approach through the use of industry-recognized cybersecurity & data privacy practices in the specification, design, development, implementation and modification of systems and services (e.g., DISA STIGs, CIS Benchmarks or OEM security guides). • IT/cybersecurity engineers, or a similar function, operationalize enterprise architecture, aligned with industry-recognized leading practices, with consideration for cybersecurity & data privacy principles, including resiliency expectations, that addresses risk to organizational operations, assets, individuals, other organizations. • A Validated Architecture Design Review (VADR), or similar process, is used to evaluate design criteria for secure practices and conformance with requirements for applicable statutory, regulatory and contractual controls to determine if the system/application/service is designed, built and operated in a secure and resilient manner. • A Change Advisory Board (CAB), or similar function, governs changes to systems, applications and services to ensure their stability, reliability and predictability. • A formal Change Management (CM) program helps to ensure that no unauthorized changes are made, all changes are documented, services are not disrupted and resources are used efficiently. • An Identity & Access Management (IAM) function, or similar function, enables the implementation of identification and access management controls for “least privileges” practices, allowing for the management of user, group and system accounts, including privileged accounts. • An IT Asset Management (ITAM) function, or similar function, categorizes assets according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data.
Secure Engineering & Architecture (SEA) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to facilitate the implementation of industry-recognized cybersecurity & data privacy practices in the specification, design, development, implementation and modification of systems and services.
CC2.2 CC3.2 CC5.1 CC5.2
null
null
12.2 12.6 16.0 16.10
null
12.2 12.6 16.10
12.2 12.6 16.10
APO03.01 APO03.02 APO03.03 APO03.04 APO03.05 APO04.05
Principle 7 Principle 10 Principle 11 Principle 14 Principle 17
DSP-07 DSP-08 IVS-01 IVS-09
CLS-05 GVN-01 GVN-02 SWS-04
SO12
4.2.3 6.2.2 7.2.2 7.2.3
CCSC 1 (4.2)
RC-05-10
null
null
null
14.1.2 14.2.5
8.12 8.26 8.27
14.1.2 14.2.5
A.10.1 A.10.4 A.10.5 A.10.6
6.11.2.5 7.4 8.4
5.10 5.11
null
null
T1005, T1025, T1041, T1048, T1048.002, T1048.003, T1052, T1052.001, T1078, T1078.001, T1078.003, T1078.004, T1134.005, T1190, T1213.003, T1482, T1547.011, T1567, T1574.002
OR-1.0
Sec 4(C)(5) Sec 4(D)(1)
GOVERN 1.0 GOVERN 1.2 GOVERN 1.3 GOVERN 1.4 GOVERN 2.2 GOVERN 3.2 GOVERN 4.1 GOVERN 5.1 GOVERN 6.0 GOVERN 6.1 MAP 3.5
ID.DE-P4 GV.PO-P2 CT.PO-P1 CT.DM-P7 CT.DM-P8 CM.AW-P3
null
P-15
2.1 2.2 2.3 2.4 2.5 2.6 2.7 2.8
AR-7 SA-8 SA-13 SC-1 SC-7(18) SI-1
SC-1 SI-1
SA-8 SC-1 SI-1
SA-8 SC-1 SC-7(18) SI-1
PT-1 SA-8 SC-1 SC-7(18) SI-1 SA-15(5)
PT-1 SI-1
SA-8 SC-1 SI-1
SA-8 SC-1 SI-1
SA-8 SC-1 SC-7(18) SI-1
SA-15(5)
null
SA-8 SC-1 SI-1
SA-8 SC-1 SC-7(18) SI-1
SA-8 SC-1 SC-7(18) SI-1
2.1 2.2 2.3 2.4
SA-8 SC-1 SI-1
SA-8 SC-1 SI-1
null
SA-8 SC-1 SI-1
SA-8 SC-1 SI-1
SA-8 SC-1 SI-1
3.13.2
3.1.12.a 3.1.16.a 3.1.16.b 3.1.16.c 3.1.18.a
3.13.2[a] 3.13.2[c] 3.13.2[d] 3.13.2[f]
null
3.14.3e
null
PR.IP-1 PR.PT-5
PR.IR PR.IR-01 PR.IR-02 PR.IR-03
A01:2021 A04:2021 A05:2021
2.2
1.2 8.5 8.5.1
null
8.5.1
null
null
8.5.1
null
8.5.1
8.5.1
null
I.2.2
1.3 2.9
5.3.2
null
null
null
ARCHITECTURE-1.A.MIL1 ARCHITECTURE-1.B.MIL2 ARCHITECTURE-1.C.MIL2 ARCHITECTURE-1.D.MIL2 ARCHITECTURE-1.E.MIL2 ARCHITECTURE-1.F.MIL2 ARCHITECTURE-1.I.MIL3 ARCHITECTURE-1.J.MIL3 ARCHITECTURE-1.K.MIL3
EXD:SG3.SP2 EXD:SG3.SP4 EXD:SG4.SP1 RRD:SG2.SP1 RRD:SG3.SP2 RRD:SG3.SP3 RTSE:SG1.SP2 RTSE:SG1.SP3 TM:SG1.SP2 TM:SG2.SP1
5.4
5.10.3.2
null
SC.L2-3.13.2
SC.L2-3.13.2 TBD - 3.14.3e
SC.L1-b.1.x
SC.L2-3.13.2
SC.L2-3.13.2 SI.L3-3.14.3e
AR-7 SA-8 SC-1 SC-7(18) SI-1
null
null
null
52.204-21(b)(1)(x) 52.204-21(b)(2)
null
null
§ 11.30 § 11.50 § 11.70 § 11.100 § 11.100(a) § 11.100(b)
SC-1 SA-8 SC-7(18) SI-1
SC-1 SI-1
SC-1 SA-8 SC-7(18) SI-1
SC-1 SA-8 SC-7(18) SI-1
SC-1 SI-1
SA-8 SC-1 SC-7(18) SI-1
SA-8 SC-1 SI-1
SA-8 SC-1 SC-7(18) SI-1
SA-8 SC-1 SC-7(18) SI-1
SA-8 SC-1 SI-1
null
null
null
§45(a) §45b(d)(1)
314.4(c)
164.306(b) 164.306(c) 164.306(d) 164.308(a) 164.312 164.314(b) 164.314(b)(1) 164.314(b)(2) 164.314(b)(2)(i) 164.314(b)(2)(ii) 164.314(b)(2)(iii) 164.314(b)(2)(iv) 164.530(c) 164.530(c)(1) 164.530(c)(2)
1.S.A 2.S.A 3.S.A 5.S.A 5.S.B 5.S.C 6.S.A 6.S.C 9.S.A
1.M.A 5.M.B 9.M.B
1.M.A 5.M.B 9.M.B 1.L.A
PT-1 SA-8 SC-1 SC-7(18) SI-1
null
null
8-101 8-302 8-311
16.2
null
Principle 4
null
null
5.6
SC-1 SI-1
SC-1 SI-1
SC-1 SA-8 SC-7(18) SI-1
null
null
1798.91.04(a) 1798.91.04(a)(1) 1798.91.04(a)(2) 1798.91.04(a)(3) 1798.91.04(b) 1798.91.04(b)(1) 1798.91.04(b)(2)
null
null
6-1-1305(4) 6-1-1308(5)
null
null
null
null
null
null
Sec 4(2)(b)(ii)(B)(1) Sec 4(2)(b)(ii)(B)(2) Sec 4(2)(b)(ii)(B)(3) Sec 4(2)(b)(ii)(B)(4)
null
38-99-20(C)(5) 38-99-20(D)(1)
Sec. 521.052
null
SA-8 SC-1 SI-1
SC-1 SI-1
SA-8 SC-1 SC-7(18) SI-1
null
59.1-578.3
§ 2447(a) § 2447(a)(1) § 2447(a)(1)(A) § 2447(a)(1)(B) § 2447(a)(1)(C) § 2447(a)(1)(D) § 2447(a)(2)
3.7.1(79)
Art 9.3(a) Art 9.3(b) Art 9.3(c) Art 9.3(d)
Art 10 Art 14
Art 5.2 Art 24.1 Art 24.2 Art 24.3 Art 25.1 Art 25.2 Art 25.3 Art 32.1 Art 32.2 Art 40.2
Article 21.1 Article 21.5
null
null
Sec 14 Sec 15
Art 16
Art 13 Art 27
Art 27 Art 41
Sec 5 Sec 32 Sec 33 Sec 34 Sec 35
Art 34
Sec 4b Sec 9 Sec 9a Sec 16 Annex
12.1
COS-01
Art 9
Sec 7 Sec 8
Sec 2
2.1 15.6 17.7
Sec 16 Sec 17
Sec 31 Sec 33 Sec 34 Sec 35 Sec 42
null
Art 3 Art 4
Sec 12 Sec 13 Sec 14
null
Sec 13 Sec 14 Sec 29
Art 1 Art 36 Art 47
Art 14 Art 15 Art 16 Art 17 Art 18 Art 19
null
Art 7 Art 12 Art 19
null
TPC-43
3.3.4 3.3.8 3.3.13
1-6-3-4 2-4-3 2-15-3-3
1-1-2
null
null
Sec 19 Sec 21
null
7.1.2 [OP.PL.2]
Sec 31 Sec 33
Art 6 Art 7
Art 8 Art 12
Sec 11 Sec 15 Sec 16
B4.a B5.b
B4 B5
null
null
Article 5(1)(f) Article 25(1) Article 25(2) Article 25(3) Article 32(1) Article 32(1)(a) Article 32(1)(b) Article 32(1)(c) Article 32(1)(d) Article 32(2) Article 32(3) Article 32(4)
null
Principle 5.6
Principle 5.7
APP Part 8 APP Part 11
null
1739 1743
Principle 4 Principle 5 Principle 6 Principle 7
null
15 18
null
Sec 4
null
Principle 4 Sec 33
Sec 7 Sec 8
null
Article 20
14.1.2 14.2.5
Sec 9
1.5 1.6 1.7
1.2.13.C.01 1.2.13.C.02
null
Sec 25 Sec 29
Sec 24 Sec 26
null
5.6.1 5.6.2 5.6.3 11.2.8
Art 3 Art 29
Art 21
Art 9 Art 12
null
Sec 6 Sec 12
4
Art 6.7 Art 46 Art 37 Art 49
null
2.1 2.1.1 2.1.2 3.2.1
Principle 7
Art 7
Art 4 Art 26
Art 10 Art 14
Art 19 Art 36 Art 37
Art 9 Art 11 Art 15 Art 16 Art 17
Art 5 Art 10
null
null
null
x
FAR 52.204-21 NAIC
x
x
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-1 R-AM-2 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-GV-8 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1 R-SA-2
R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
null
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
R-SA-2
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15 MT-16
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
MT-16
null
Secure Engineering & Architecture
Centralized Management of Cybersecurity & Data Privacy Controls
SEA-01.1
Mechanisms exist to centrally-manage the organization-wide management and implementation of cybersecurity & data privacy controls and related processes.
null
null
Does the organization centrally-manage the organization-wide management and implementation of cybersecurity & data privacy controls and related processes?
9
Protect
X
X
null
There is no evidence of a capability to centrally-manage the organization-wide management and implementation of cybersecurity & data privacy controls and related processes.
SP-CMM1 is N/A, since a structured process is required to centrally-manage the organization-wide management and implementation of cybersecurity & data privacy controls and related processes.
Secure Engineering & Architecture (SEA) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Architecture/engineering management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • A Change Advisory Board (CAB), or similar function, exists to govern changes to systems, applications and services, ensuring their stability, reliability and predictability. • Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed. • IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for architecture/engineering management. • IT personnel implement secure engineering practices to protect the confidentiality, integrity, availability and safety of the organization’s technology assets, data and network(s). • Technologies are configured to protect data with the strength and integrity commensurate with the classification or sensitivity of the information and mostly conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides), including cryptographic protections for sensitive/regulated data.
Secure Engineering & Architecture (SEA) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • IT/cybersecurity architects, or a similar function, enable the implementation a “layered defense” network architecture that enables a resilient defense-in-depth approach through the use of industry-recognized cybersecurity & data privacy practices in the specification, design, development, implementation and modification of systems and services (e.g., DISA STIGs, CIS Benchmarks or OEM security guides). • IT/cybersecurity engineers, or a similar function, operationalize enterprise architecture, aligned with industry-recognized leading practices, with consideration for cybersecurity & data privacy principles, including resiliency expectations, that addresses risk to organizational operations, assets, individuals, other organizations. • A Validated Architecture Design Review (VADR), or similar process, is used to evaluate design criteria for secure practices and conformance with requirements for applicable statutory, regulatory and contractual controls to determine if the system/application/service is designed, built and operated in a secure and resilient manner. • A Change Advisory Board (CAB), or similar function, governs changes to systems, applications and services to ensure their stability, reliability and predictability. • A formal Change Management (CM) program helps to ensure that no unauthorized changes are made, all changes are documented, services are not disrupted and resources are used efficiently. • An Identity & Access Management (IAM) function, or similar function, enables the implementation of identification and access management controls for “least privileges” practices, allowing for the management of user, group and system accounts, including privileged accounts. • An IT Asset Management (ITAM) function, or similar function, categorizes assets according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data.
Secure Engineering & Architecture (SEA) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to centrally-manage the organization-wide management and implementation of cybersecurity & data privacy controls and related processes.
CC5.1
null
null
16.10
null
16.10
16.10
APO03.01 APO03.03
Principle 10 Principle 17
null
CLS-05 GVN-01 GVN-02
null
null
null
RC-05-10
null
null
null
null
8.12
CLD.13.1.4
null
null
5.10 5.11
null
null
null
null
Sec 4(C)(5) Sec 4(D)(1)
GOVERN 1.0 GOVERN 1.2 GOVERN 1.3 GOVERN 1.4 GOVERN 2.2 GOVERN 3.2 GOVERN 4.1 GOVERN 5.1 GOVERN 6.0 GOVERN 6.1 MAP 3.5
GV.PO-P2
null
null
null
PL-9
null
null
null
PL-9
PL-9
null
null
null
null
null
null
null
null
3.4 3.4.3 3.4.4 3.4.5 3.4.6 3.4.7 3.4.8 3.4.9 3.4.10 3.4.11 3.4.12 3.4.13 3.4.14
PL-9
null
null
PL-9
PL-9
null
null
null
null
null
null
null
null
null
A01:2021 A04:2021 A05:2021
null
1.1 10.7 10.7.1 10.7.2 10.7.3
null
null
null
null
null
null
10.7.2 10.7.3
10.7.1 10.7.2 10.7.3
null
C.7
null
null
null
null
null
ARCHITECTURE-1.G.MIL2
EF:SG2.SP2
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
314.4(c)
null
1.S.A 2.S.A 3.S.A 5.S.A 5.S.B 5.S.C 6.S.A 6.S.C 9.S.A
1.M.A 5.M.B 9.M.B
1.M.A 5.M.B 9.M.B 1.L.A
null
null
null
null
15.1 15.2 15.3 15.4
null
null
null
null
null
null
null
null
III.B III.C.1 III.C.1.a III.C.1.b III.C.3
null
null
null
null
6-1-1305(4) 6-1-1308(5)
null
null
null
null
null
null
null
null
38-99-20(C)(5) 38-99-20(D)(1)
null
null
null
null
null
null
null
null
null
null
null
Art 5.2 Art 24.1 Art 24.2 Art 24.3 Art 25.1 Art 25.2 Art 25.3 Art 32.1 Art 32.2 Art 40.2
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Sec 8
null
null
null
null
null
null
B4.a
null
null
null
Article 24(1) Article 24(2) Article 24(3)
null
null
null
null
null
null
null
null
18
null
null
null
null
null
null
null
null
null
1.5 1.6 1.7
4.3.19.C.01
null
null
null
null
4.5.1
null
null
null
Art 9.1
null
null
null
null
2.1 2.1.1 2.1.2 3.2.1
null
null
null
null
null
null
Art 5 Art 10
null
null
null
x
NAIC
x
null
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-1 R-AM-2 R-AM-3 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-GV-8 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1
R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
null
NT-1 NT-2 NT-3 NT-4 NT-5 NT-6 NT-7 NT-8 NT-9 NT-10 NT-11 NT-12 NT-13 NT-14 MT-1 MT-2 MT-3 MT-4 MT-5 MT-6 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15
NT-1
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Secure Engineering & Architecture
Achieving Resilience Requirements
SEA-01.2
Mechanisms exist to achieve resilience requirements in normal and adverse situations.
null
null
Does the organization achieve resilience requirements in normal and adverse situations?
4
Protect
X
X
null
There is no evidence of a capability to achieve resilience requirements in normal and adverse situations.
SP-CMM1 is N/A, since a structured process is required to achieve resilience requirements in normal and adverse situations.
Secure Engineering & Architecture (SEA) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Architecture/engineering management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • A Change Advisory Board (CAB), or similar function, exists to govern changes to systems, applications and services, ensuring their stability, reliability and predictability. • Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed. • IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for architecture/engineering management. • IT personnel implement secure engineering practices to protect the confidentiality, integrity, availability and safety of the organization’s technology assets, data and network(s). • Technologies are configured to protect data with the strength and integrity commensurate with the classification or sensitivity of the information and mostly conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides), including cryptographic protections for sensitive/regulated data.
Secure Engineering & Architecture (SEA) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • IT/cybersecurity architects, or a similar function, enable the implementation a “layered defense” network architecture that enables a resilient defense-in-depth approach through the use of industry-recognized cybersecurity & data privacy practices in the specification, design, development, implementation and modification of systems and services (e.g., DISA STIGs, CIS Benchmarks or OEM security guides). • IT/cybersecurity engineers, or a similar function, operationalize enterprise architecture, aligned with industry-recognized leading practices, with consideration for cybersecurity & data privacy principles, including resiliency expectations, that addresses risk to organizational operations, assets, individuals, other organizations. • A Validated Architecture Design Review (VADR), or similar process, is used to evaluate design criteria for secure practices and conformance with requirements for applicable statutory, regulatory and contractual controls to determine if the system/application/service is designed, built and operated in a secure and resilient manner. • A Change Advisory Board (CAB), or similar function, governs changes to systems, applications and services to ensure their stability, reliability and predictability. • A formal Change Management (CM) program helps to ensure that no unauthorized changes are made, all changes are documented, services are not disrupted and resources are used efficiently. • An Identity & Access Management (IAM) function, or similar function, enables the implementation of identification and access management controls for “least privileges” practices, allowing for the management of user, group and system accounts, including privileged accounts. • An IT Asset Management (ITAM) function, or similar function, categorizes assets according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data.
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to achieve resilience requirements in normal and adverse situations.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to achieve resilience requirements in normal and adverse situations.
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
PR.IR-04
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-GV-1 R-GV-4 R-GV-5 R-IR-4
null
null
null
null
null
null
null
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
null
null
R-GV-1
null
null
R-GV-4
R-GV-5
null
null
null
null
null
null
R-IR-4
null
null
MT-1 MT-2 MT-3 MT-4 MT-5 MT-6 MT-7 MT-8 MT-9 MT-10 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
null
null
null
null
null
null
null
null
MT-1
MT-2
MT-3
MT-4
MT-5
MT-6
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Secure Engineering & Architecture
Alignment With Enterprise Architecture
SEA-02
Mechanisms exist to develop an enterprise architecture, aligned with industry-recognized leading practices, with consideration for cybersecurity & data privacy principles that addresses risk to organizational operations, assets, individuals, other organizations.
- Administrative controls through corporate policies, standards & procedures. - NIST 800-160 - Enterprise architecture committee
E-TDA-04 E-TDA-09
Does the organization develop an enterprise architecture, aligned with industry-recognized leading practices, with consideration for cybersecurity & data privacy principles that addresses risk to organizational operations, assets, individuals, other organizations?
9
Protect
X
X
X
There is no evidence of a capability to develop an enterprise architecture, aligned with industry-recognized leading practices, with consideration for cybersecurity & data privacy principles that addresses risk to organizational operations, assets, individuals, other organizations.
SP-CMM1 is N/A, since a structured process is required to develop an enterprise architecture, aligned with industry-recognized leading practices, with consideration for cybersecurity & data privacy principles that addresses risk to organizational operations, assets, individuals, other organizations.
Secure Engineering & Architecture (SEA) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Architecture/engineering management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • A Change Advisory Board (CAB), or similar function, exists to govern changes to systems, applications and services, ensuring their stability, reliability and predictability. • Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed. • IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for architecture/engineering management. • IT personnel implement secure engineering practices to protect the confidentiality, integrity, availability and safety of the organization’s technology assets, data and network(s). • Technologies are configured to protect data with the strength and integrity commensurate with the classification or sensitivity of the information and mostly conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides), including cryptographic protections for sensitive/regulated data.
Secure Engineering & Architecture (SEA) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • IT/cybersecurity architects, or a similar function, enable the implementation a “layered defense” network architecture that enables a resilient defense-in-depth approach through the use of industry-recognized cybersecurity & data privacy practices in the specification, design, development, implementation and modification of systems and services (e.g., DISA STIGs, CIS Benchmarks or OEM security guides). • IT/cybersecurity engineers, or a similar function, operationalize enterprise architecture, aligned with industry-recognized leading practices, with consideration for cybersecurity & data privacy principles, including resiliency expectations, that addresses risk to organizational operations, assets, individuals, other organizations. • A Validated Architecture Design Review (VADR), or similar process, is used to evaluate design criteria for secure practices and conformance with requirements for applicable statutory, regulatory and contractual controls to determine if the system/application/service is designed, built and operated in a secure and resilient manner. • A Change Advisory Board (CAB), or similar function, governs changes to systems, applications and services to ensure their stability, reliability and predictability. • A formal Change Management (CM) program helps to ensure that no unauthorized changes are made, all changes are documented, services are not disrupted and resources are used efficiently. • An Identity & Access Management (IAM) function, or similar function, enables the implementation of identification and access management controls for “least privileges” practices, allowing for the management of user, group and system accounts, including privileged accounts. • An IT Asset Management (ITAM) function, or similar function, categorizes assets according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data.
Secure Engineering & Architecture (SEA) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to develop an enterprise architecture, aligned with industry-recognized leading practices, with consideration for cybersecurity & data privacy principles, including resiliency expectations, that addresses risk to organizational operations, assets, individuals, other organizations.
CC3.1 CC4.1 CC5.1
null
null
12.2 16.10
null
12.2 16.10
12.2 16.10
APO02.01 APO03.01 APO03.02 APO03.03 APO03.04 APO03.05 APO04.02 APO04.03 APO04.04 APO04.05 APO04.06
Principle 6 Principle 10 Principle 16 Principle 18
null
CLS-05 GVN-01 GVN-02 SWS-04
null
null
null
null
null
null
null
14.1.1
5.8 8.26
CLD.13.1.4 14.1.1
null
6.11.1.1
null
null
null
null
null
null
null
GV.PO-P2
null
P-16
2.7 2.8
PL-8 PM-7
null
PL-8
PL-8
PL-8 PM-7
PL-8
null
PL-8
PL-8
PM-7
null
null
PL-8
PL-8
3.4 3.4.1 3.4.2 3.4.3 3.4.4 3.4.5 3.4.6
PL-8 PM-7
null
null
PM-7
PL-8 PM-7
PL-8
NFO - PL-8
3.1.12.a 3.1.16.a 3.1.18.a
null
null
3.13.1e
null
null
PR.IR-01
null
2.2
1.2
null
null
null
null
null
null
null
null
null
C.5.1
1.3
5.3.2
null
null
null
ARCHITECTURE-1.A.MIL1 ARCHITECTURE-1.B.MIL2 ARCHITECTURE-1.H.MIL3
CTRL:SG2.SP1 EC:SG3.SP1 EC:SG3.SP2 EF:SG1.SP2 EF:SG1.SP3 EF:SG2.SP1 EXD:SG1.SP1 KIM:SG3.SP1 PM:SG2.SP1 PM:SG2.SP2 RRD:SG2.SP2 RRM:SG1.SP1 RRM:SG1.SP5 RTSE:SG1.SP3 RTSE:SG2.SP2 SC:SG1.SP2 TM:SG1.SP2 TM:SG2.SP2 TM:SG3.SP1 TM:SG3.SP2
5.4
null
null
null
TBD - 3.13.1e
null
null
null
PL-8 PM-7
null
null
null
null
null
null
null
PL-8
null
PL-8
PL-8
null
PL-8
PL-8
PL-8
PL-8
PL-8
null
null
null
null
null
null
null
9.M.E
9.M.E
PL-8 PM-7
null
null
8-103
16.2
null
null
null
null
null
null
PL-8
PL-8
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
PM-7
null
PL-8
null
null
null
3.7.1(79)
Art 9.3(a) Art 9.3(b) Art 9.3(c) Art 9.3(d)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
2.1 17.7
null
null
null
null
null
null
null
null
null
null
null
null
TPC-43
null
null
null
null
null
null
null
7.1.2 [OP.PL.2]
null
null
null
null
B4.a B5.b
B4
null
null
null
null
null
null
null
null
1739
null
null
null
null
null
null
null
null
null
null
14.1.1
null
null
2.3.28.C.01 19.5.26.C.01 19.5.26.C.02 19.5.26.C.03 19.5.26.C.04 19.5.26.C.05 19.5.26.C.06 19.5.26.C.07 19.5.26.C.08 19.5.26.C.09 19.5.26.C.10 19.5.26.C.11 19.5.26.C.12
null
null
null
null
5.6.1 5.6.2 5.6.3 11.2.8
null
null
null
null
null
null
null
null
2.1 2.1.1 2.1.2 3.2.1
null
null
null
null
null
null
null
null
null
null
x
null
null
x
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-1 R-AM-2 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-GV-8 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1
R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
null
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
null
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Secure Engineering & Architecture
Standardized Terminology
SEA-02.1
Mechanisms exist to standardize technology and process terminology to reduce confusion amongst groups and departments.
null
null
Does the organization standardize technology and process terminology to reduce confusion amongst groups and departments?
3
Protect
null
X
null
There is no evidence of a capability to standardize technology and process terminology to reduce confusion amongst groups and departments.
SP-CMM1 is N/A, since a structured process is required to standardize technology and process terminology to reduce confusion amongst groups and departments.
Secure Engineering & Architecture (SEA) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Architecture/engineering management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • A Change Advisory Board (CAB), or similar function, exists to govern changes to systems, applications and services, ensuring their stability, reliability and predictability. • Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed. • IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for architecture/engineering management. • IT personnel implement secure engineering practices to protect the confidentiality, integrity, availability and safety of the organization’s technology assets, data and network(s). • Technologies are configured to protect data with the strength and integrity commensurate with the classification or sensitivity of the information and mostly conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides), including cryptographic protections for sensitive/regulated data.
Secure Engineering & Architecture (SEA) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • IT/cybersecurity architects, or a similar function, enable the implementation a “layered defense” network architecture that enables a resilient defense-in-depth approach through the use of industry-recognized cybersecurity & data privacy practices in the specification, design, development, implementation and modification of systems and services (e.g., DISA STIGs, CIS Benchmarks or OEM security guides). • IT/cybersecurity engineers, or a similar function, operationalize enterprise architecture, aligned with industry-recognized leading practices, with consideration for cybersecurity & data privacy principles, including resiliency expectations, that addresses risk to organizational operations, assets, individuals, other organizations. • A Validated Architecture Design Review (VADR), or similar process, is used to evaluate design criteria for secure practices and conformance with requirements for applicable statutory, regulatory and contractual controls to determine if the system/application/service is designed, built and operated in a secure and resilient manner. • A Change Advisory Board (CAB), or similar function, governs changes to systems, applications and services to ensure their stability, reliability and predictability. • A formal Change Management (CM) program helps to ensure that no unauthorized changes are made, all changes are documented, services are not disrupted and resources are used efficiently. • An Identity & Access Management (IAM) function, or similar function, enables the implementation of identification and access management controls for “least privileges” practices, allowing for the management of user, group and system accounts, including privileged accounts. • An IT Asset Management (ITAM) function, or similar function, categorizes assets according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data. • A Governance, Risk & Compliance (GRC) function, or similar function, enables the use of standardized technology and process terminology to reduce confusion amongst groups and departments.
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to standardize technology and process terminology to reduce confusion amongst groups and departments.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to standardize technology and process terminology to reduce confusion amongst groups and departments.
CC2.2
null
null
null
null
null
null
null
Principle 14
null
null
null
null
null
null
null
3.0
null
null
null
null
null
null
null
null
null
null
null
null
null
GV.PO-P2
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
C.1
null
null
null
null
null
null
ADM:SG1.SP2
null
null
null
null
null
null
null
null
null
null
252.204-7008(a) 252.204-7012(a) 252.204-7019(a) 252.204-7020(a) 252.204-7021(a)
null
52.204-21(a)
52.204-27(a)
null
§ 11.3
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
164.304
null
null
null
1.8.1 1.8.1.1 1.8.1.2
null
null
null
null
null
null
null
null
null
null
null
null
null
null
1798.91.05
7001
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
59.1-575
null
null
null
null
Art 4.1 Art 4.2 Art 4.3 Art 4.4 Art 4.5 Art 4.6 Art 4.7 Art 4.8 Art 4.9 Art 4.10 Art 4.11 Art 4.12 Art 4.13 Art 4.14 Art 4.15 Art 4.16 Art 4.17 Art 4.18 Art 4.19 Art 4.20 Art 4.21 Art 4.22 Art 4.23 Art 4.24 Art 4.25 Art 4.26
null
null
Article 1.8
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
2
null
null
1.3
null
null
null
Article 1
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
4.3
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
6.4
null
null
null
null
null
null
null
null
null
null
null
x
FAR 52.204-21
null
null
R-BC-3 R-EX-4 R-GV-1 R-GV-4 R-GV-5 R-SA-1
null
null
null
null
null
null
null
null
null
R-BC-3
null
null
null
null
null
R-EX-4
null
null
null
R-GV-1
null
null
R-GV-4
R-GV-5
null
null
null
null
null
null
null
R-SA-1
null
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
null
- updated DFARS mapping
Secure Engineering & Architecture
Outsourcing Non-Essential Functions or Services
SEA-02.2
Mechanisms exist to identify non-essential functions or services that are capable of being outsourced to external service providers and align with the organization's enterprise architecture and security standards.
null
null
Does the organization identify non-essential functions or services that are capable of being outsourced to external service providers and align with the organization's enterprise architecture and security standards?
3
Protect
null
X
null
There is no evidence of a capability to identify non-essential functions or services that are capable of being outsourced to third-party service providers and align with the organization's enterprise architecture and security standards.
SP-CMM1 is N/A, since a structured process is required to identify non-essential functions or services that are capable of being outsourced to third-party service providers and align with the organization's enterprise architecture and security standards.
Secure Engineering & Architecture (SEA) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Architecture/engineering management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • A Change Advisory Board (CAB), or similar function, exists to govern changes to systems, applications and services, ensuring their stability, reliability and predictability. • Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed. • IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for architecture/engineering management. • IT personnel implement secure engineering practices to protect the confidentiality, integrity, availability and safety of the organization’s technology assets, data and network(s). • Technologies are configured to protect data with the strength and integrity commensurate with the classification or sensitivity of the information and mostly conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides), including cryptographic protections for sensitive/regulated data.
Secure Engineering & Architecture (SEA) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • IT/cybersecurity architects, or a similar function, enable the implementation a “layered defense” network architecture that enables a resilient defense-in-depth approach through the use of industry-recognized cybersecurity & data privacy practices in the specification, design, development, implementation and modification of systems and services (e.g., DISA STIGs, CIS Benchmarks or OEM security guides). • IT/cybersecurity engineers, or a similar function, operationalize enterprise architecture, aligned with industry-recognized leading practices, with consideration for cybersecurity & data privacy principles, including resiliency expectations, that addresses risk to organizational operations, assets, individuals, other organizations. • A Validated Architecture Design Review (VADR), or similar process, is used to evaluate design criteria for secure practices and conformance with requirements for applicable statutory, regulatory and contractual controls to determine if the system/application/service is designed, built and operated in a secure and resilient manner. • A Change Advisory Board (CAB), or similar function, governs changes to systems, applications and services to ensure their stability, reliability and predictability. • A formal Change Management (CM) program helps to ensure that no unauthorized changes are made, all changes are documented, services are not disrupted and resources are used efficiently. • An Identity & Access Management (IAM) function, or similar function, enables the implementation of identification and access management controls for “least privileges” practices, allowing for the management of user, group and system accounts, including privileged accounts. • An IT Asset Management (ITAM) function, or similar function, categorizes assets according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data.
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to identify non-essential functions or services that are capable of being outsourced to third-party service providers and align with the organization's enterprise architecture and security standards.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to identify non-essential functions or services that are capable of being outsourced to third-party service providers and align with the organization's enterprise architecture and security standards.
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
PM-7(1)
null
null
null
null
PM-7(1)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
B.1.1.1
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-1 R-AM-2 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-GV-8 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1
R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
null
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
null
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Secure Engineering & Architecture
Technical Debt Reviews
SEA-02.3
Mechanisms exist to conduct ongoing “technical debt” reviews of hardware and software technologies to remediate outdated and/or unsupported technologies.
null
null
Does the organization conduct ongoing “technical debt” reviews of hardware and software technologies to remediate outdated and/or unsupported technologies?
9
Protect
null
X
X
There is no evidence of a capability to conduct ongoing “technical debt” reviews of hardware and software technologies to remediate outdated and/ or unsupported technologies.
SP-CMM1 is N/A, since a structured process is required to conduct ongoing “technical debt” reviews of hardware and software technologies to remediate outdated and/ or unsupported technologies.
SP-CMM2 is N/A, since a well-defined process is required to conduct ongoing “technical debt” reviews of hardware and software technologies to remediate outdated and/ or unsupported technologies.
Secure Engineering & Architecture (SEA) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • IT/cybersecurity architects, or a similar function, enable the implementation a “layered defense” network architecture that enables a resilient defense-in-depth approach through the use of industry-recognized cybersecurity & data privacy practices in the specification, design, development, implementation and modification of systems and services (e.g., DISA STIGs, CIS Benchmarks or OEM security guides). • IT/cybersecurity engineers, or a similar function, operationalize enterprise architecture, aligned with industry-recognized leading practices, with consideration for cybersecurity & data privacy principles, including resiliency expectations, that addresses risk to organizational operations, assets, individuals, other organizations. • A Validated Architecture Design Review (VADR), or similar process, is used to evaluate design criteria for secure practices and conformance with requirements for applicable statutory, regulatory and contractual controls to determine if the system/application/service is designed, built and operated in a secure and resilient manner. • A Change Advisory Board (CAB), or similar function, governs changes to systems, applications and services to ensure their stability, reliability and predictability. • A formal Change Management (CM) program helps to ensure that no unauthorized changes are made, all changes are documented, services are not disrupted and resources are used efficiently. • An Identity & Access Management (IAM) function, or similar function, enables the implementation of identification and access management controls for “least privileges” practices, allowing for the management of user, group and system accounts, including privileged accounts. • An IT Asset Management (ITAM) function, or similar function, categorizes assets according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data.
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to conduct ongoing “technical debt” reviews of hardware and software technologies to remediate outdated and/ or unsupported technologies.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to conduct ongoing “technical debt” reviews of hardware and software technologies to remediate outdated and/ or unsupported technologies.
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
GOVERN 1.7
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
12.3.4 A3.3.2
null
null
null
null
null
null
12.3.4
12.3.4
null
D.8.2
2.2
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Art 8.7
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-1 R-AM-2 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1
R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
null
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
null
NT-1 NT-2 NT-3 NT-4 NT-5 NT-6 NT-7 NT-8 NT-9 NT-10 NT-11 NT-12 NT-13 NT-14 MT-8 MT-9 MT-12 MT-13 MT-14 MT-15
NT-1
NT-2
NT-3
NT-4
NT-5
NT-6
NT-7
NT-8
NT-9
NT-10
NT-11
NT-12
NT-13
NT-14
null
null
null
null
null
null
null
MT-8
MT-9
null
null
MT-12
MT-13
MT-14
MT-15
null
null
Secure Engineering & Architecture
Defense-In-Depth (DiD) Architecture
SEA-03
Mechanisms exist to implement security functions as a layered structure minimizing interactions between layers of the design and avoiding any dependence by lower layers on the functionality or correctness of higher layers.
null
E-TDA-04 E-TDA-09
Does the organization implement security functions as a layered structure minimizing interactions between layers of the design and avoiding any dependence by lower layers on the functionality or correctness of higher layers?
10
Protect
X
X
null
There is no evidence of a capability to implement security functions as a layered structure minimizing interactions between layers of the design and avoiding any dependence by lower layers on the functionality or correctness of higher layers.
SP-CMM1 is N/A, since a structured process is required to implement security functions as a layered structure minimizing interactions between layers of the design and avoiding any dependence by lower layers on the functionality or correctness of higher layers.
Secure Engineering & Architecture (SEA) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Architecture/engineering management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • A Change Advisory Board (CAB), or similar function, exists to govern changes to systems, applications and services, ensuring their stability, reliability and predictability. • Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed. • IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for architecture/engineering management. • IT personnel implement secure engineering practices to protect the confidentiality, integrity, availability and safety of the organization’s technology assets, data and network(s). • Technologies are configured to protect data with the strength and integrity commensurate with the classification or sensitivity of the information and mostly conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides), including cryptographic protections for sensitive/regulated data.
Secure Engineering & Architecture (SEA) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • IT/cybersecurity architects, or a similar function, enable the implementation a “layered defense” network architecture that enables a resilient defense-in-depth approach through the use of industry-recognized cybersecurity & data privacy practices in the specification, design, development, implementation and modification of systems and services (e.g., DISA STIGs, CIS Benchmarks or OEM security guides). • IT/cybersecurity engineers, or a similar function, operationalize enterprise architecture, aligned with industry-recognized leading practices, with consideration for cybersecurity & data privacy principles, including resiliency expectations, that addresses risk to organizational operations, assets, individuals, other organizations. • A Validated Architecture Design Review (VADR), or similar process, is used to evaluate design criteria for secure practices and conformance with requirements for applicable statutory, regulatory and contractual controls to determine if the system/application/service is designed, built and operated in a secure and resilient manner. • A Change Advisory Board (CAB), or similar function, governs changes to systems, applications and services to ensure their stability, reliability and predictability. • A formal Change Management (CM) program helps to ensure that no unauthorized changes are made, all changes are documented, services are not disrupted and resources are used efficiently. • An Identity & Access Management (IAM) function, or similar function, enables the implementation of identification and access management controls for “least privileges” practices, allowing for the management of user, group and system accounts, including privileged accounts. • An IT Asset Management (ITAM) function, or similar function, categorizes assets according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data.
Secure Engineering & Architecture (SEA) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to implement security functions as a layered structure minimizing interactions between layers of the design and avoiding any dependence by lower layers on the functionality or correctness of higher layers.
null
null
null
null
null
null
null
APO03.01 APO04.05
null
IVS-09
null
null
null
null
null
null
null
null
null
null
CLD.13.1.4
null
null
null
null
null
null
null
null
null
null
null
null
null
PL-8(1) SC-3(5)
null
null
null
PL-8(1) SC-3(5)
null
null
null
null
PL-8(1) SC-3(5)
null
null
null
null
3.4 3.4.1 3.4.2 3.4.3 3.4.4 3.4.5 3.4.6
null
null
null
null
null
null
3.13.2
null
null
null
null
null
null
PR.IR-01
A01:2021 A05:2021
1.3.7
1.2.1 1.4.1
null
1.2.1 1.4.1
null
null
null
null
1.2.1 1.4.1
1.2.1 1.4.1
null
N.2.4.6
null
null
null
null
null
ARCHITECTURE-1.A.MIL1 ARCHITECTURE-1.B.MIL2 ARCHITECTURE-1.C.MIL2 ARCHITECTURE-1.D.MIL2 ARCHITECTURE-1.E.MIL2 ARCHITECTURE-1.F.MIL2 ARCHITECTURE-1.I.MIL3 ARCHITECTURE-1.J.MIL3 ARCHITECTURE-1.K.MIL3
null
5.4
null
null
SC.L2-3.13.2
null
null
SC.L2-3.13.2
SC.L2-3.13.2
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
PL-8(1)
null
null
null
16.2
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Art 9.3(a) Art 9.3(b) Art 9.3(c) Art 9.3(d)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
10.8
null
null
null
null
null
null
null
null
null
null
null
null
null
null
2-15-3-2
null
null
null
null
null
7.1.2 [OP.PL.2]
null
null
null
null
B4.a B5.b
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
11.2.1 11.2.8
null
null
null
null
null
null
null
null
3.2.3 3.2.4
null
null
null
null
null
null
null
null
null
null
x
null
x
null
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-1 R-AM-2 R-AM-3 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-GV-8 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1
R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
R-GV-8
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
null
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Secure Engineering & Architecture
System Partitioning
SEA-03.1
Mechanisms exist to partition systems so that partitions reside in separate physical domains or environments.
null
null
Does the organization partition systems so that partitions reside in separate physical domains or environments?
8
Protect
null
null
X
There is no evidence of a capability to partition systems so that partitions reside in separate physical domains or environments.
Secure Engineering & Architecture (SEA) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist: • IT personnel use an informal process to design, build and maintain secure solutions. • IT /cyber engineering governance is decentralized, with the responsibility for implementing and testing cybersecurity & data privacy controls being assigned to the business process owner(s), including the definition and enforcement of roles and responsibilities.
Secure Engineering & Architecture (SEA) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Architecture/engineering management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • A Change Advisory Board (CAB), or similar function, exists to govern changes to systems, applications and services, ensuring their stability, reliability and predictability. • Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed. • IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for architecture/engineering management. • IT personnel implement secure engineering practices to protect the confidentiality, integrity, availability and safety of the organization’s technology assets, data and network(s). • Technologies are configured to protect data with the strength and integrity commensurate with the classification or sensitivity of the information and mostly conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides), including cryptographic protections for sensitive/regulated data.
Secure Engineering & Architecture (SEA) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • IT/cybersecurity architects, or a similar function, enable the implementation a “layered defense” network architecture that enables a resilient defense-in-depth approach through the use of industry-recognized cybersecurity & data privacy practices in the specification, design, development, implementation and modification of systems and services (e.g., DISA STIGs, CIS Benchmarks or OEM security guides). • IT/cybersecurity engineers, or a similar function, operationalize enterprise architecture, aligned with industry-recognized leading practices, with consideration for cybersecurity & data privacy principles, including resiliency expectations, that addresses risk to organizational operations, assets, individuals, other organizations. • A Validated Architecture Design Review (VADR), or similar process, is used to evaluate design criteria for secure practices and conformance with requirements for applicable statutory, regulatory and contractual controls to determine if the system/application/service is designed, built and operated in a secure and resilient manner. • A Change Advisory Board (CAB), or similar function, governs changes to systems, applications and services to ensure their stability, reliability and predictability. • A formal Change Management (CM) program helps to ensure that no unauthorized changes are made, all changes are documented, services are not disrupted and resources are used efficiently. • An Identity & Access Management (IAM) function, or similar function, enables the implementation of identification and access management controls for “least privileges” practices, allowing for the management of user, group and system accounts, including privileged accounts. • An IT Asset Management (ITAM) function, or similar function, categorizes assets according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data.
Secure Engineering & Architecture (SEA) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist: ▪ Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs). ▪ Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs). ▪ Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity & data privacy controls, including functions performed by third-parties. ▪ Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review). ▪ Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes. ▪ Both business and technical stakeholders are involved in reviewing and approving proposed changes.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to partition systems so that partitions reside in separate physical domains or environments.
null
null
null
3.12
null
3.12
3.12
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
SC-32
null
null
null
SC-32
null
null
null
null
SC-32
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
I.3.3
null
null
null
null
null
null
null
null
5.10.3.1
null
null
null
null
null
null
SC-32
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
x
null
null
null
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-1 R-AM-2 R-AM-3 R-BC-1 R-BC-2 R-BC-4 R-BC-5 R-EX-7 R-GV-1 R-GV-2 R-GV-4 R-GV-5 R-IR-1 R-IR-4
R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
null
R-BC-4
R-BC-5
null
null
null
null
null
null
R-EX-7
R-GV-1
R-GV-2
null
R-GV-4
R-GV-5
null
null
null
R-IR-1
null
null
R-IR-4
null
null
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-10 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Secure Engineering & Architecture
Application Partitioning
SEA-03.2
Mechanisms exist to separate user functionality from system management functionality.
- Separate interface for non-privileged users.
null
Does the organization separate user functionality from system management functionality?
8
Protect
null
null
X
There is no evidence of a capability to separate user functionality from system management functionality.
Secure Engineering & Architecture (SEA) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist: • IT personnel use an informal process to design, build and maintain secure solutions. • IT /cyber engineering governance is decentralized, with the responsibility for implementing and testing cybersecurity & data privacy controls being assigned to the business process owner(s), including the definition and enforcement of roles and responsibilities.
Secure Engineering & Architecture (SEA) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Architecture/engineering management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • A Change Advisory Board (CAB), or similar function, exists to govern changes to systems, applications and services, ensuring their stability, reliability and predictability. • Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed. • IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for architecture/engineering management. • IT personnel implement secure engineering practices to protect the confidentiality, integrity, availability and safety of the organization’s technology assets, data and network(s). • Technologies are configured to protect data with the strength and integrity commensurate with the classification or sensitivity of the information and mostly conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides), including cryptographic protections for sensitive/regulated data.
Secure Engineering & Architecture (SEA) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • IT/cybersecurity architects, or a similar function, enable the implementation a “layered defense” network architecture that enables a resilient defense-in-depth approach through the use of industry-recognized cybersecurity & data privacy practices in the specification, design, development, implementation and modification of systems and services (e.g., DISA STIGs, CIS Benchmarks or OEM security guides). • IT/cybersecurity engineers, or a similar function, operationalize enterprise architecture, aligned with industry-recognized leading practices, with consideration for cybersecurity & data privacy principles, including resiliency expectations, that addresses risk to organizational operations, assets, individuals, other organizations. • A Validated Architecture Design Review (VADR), or similar process, is used to evaluate design criteria for secure practices and conformance with requirements for applicable statutory, regulatory and contractual controls to determine if the system/application/service is designed, built and operated in a secure and resilient manner. • A Change Advisory Board (CAB), or similar function, governs changes to systems, applications and services to ensure their stability, reliability and predictability. • A formal Change Management (CM) program helps to ensure that no unauthorized changes are made, all changes are documented, services are not disrupted and resources are used efficiently. • An Identity & Access Management (IAM) function, or similar function, enables the implementation of identification and access management controls for “least privileges” practices, allowing for the management of user, group and system accounts, including privileged accounts. • An IT Asset Management (ITAM) function, or similar function, categorizes assets according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data.
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to separate user functionality from system management functionality.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to separate user functionality from system management functionality.
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
T1068, T1189, T1190, T1203, T1210, T1211, T1212, T1611
null
null
null
null
null
null
null
SC-2 SC-2(1)
null
SC-2
SC-2
SC-2 SC-2(1)
null
null
SC-2
SC-2
SC-2(1)
null
null
SC-2
SC-2
null
null
null
null
null
null
null
3.13.3
null
3.13.3[a] 3.13.3[b] 3.13.3[c]
null
3.14.3e
null
null
null
A01:2021 A05:2021
11.3.4
null
null
null
null
null
null
null
null
null
null
H.12
null
null
null
null
null
null
AM:SG1.SP1 KIM:SG2.SP1 KIM:SG2.SP2 TM:SG2.SP1
null
5.10.3.1
null
SC.L2-3.13.3
SC.L2-3.13.3 TBD - 3.14.3e
null
SC.L2-3.13.3
SC.L2-3.13.3 SI.L3-3.14.3e
SC-2
null
null
null
null
null
null
null
SC-2
null
SC-2
SC-2
null
SC-2
null
SC-2
SC-2
null
null
null
null
null
null
null
null
null
null
SC-2 SC-2(1)
null
null
null
null
null
null
null
null
null
null
SC-2
SC-2
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
SC-2
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
x
null
x
null
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-1 R-AM-2 R-AM-3 R-BC-1 R-BC-2 R-BC-4 R-BC-5 R-EX-7 R-GV-1 R-GV-2 R-GV-4 R-GV-5 R-IR-1 R-IR-4
R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
null
R-BC-4
R-BC-5
null
null
null
null
null
null
R-EX-7
R-GV-1
R-GV-2
null
R-GV-4
R-GV-5
null
null
null
R-IR-1
null
null
R-IR-4
null
null
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-10 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Secure Engineering & Architecture
Process Isolation
SEA-04
Mechanisms exist to implement a separate execution domain for each executing process.
null
null
Does the organization implement a separate execution domain for each executing process?
7
Protect
null
null
X
There is no evidence of a capability to implement a separate execution domain for each executing process.
Secure Engineering & Architecture (SEA) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist: • IT personnel use an informal process to design, build and maintain secure solutions. • IT /cyber engineering governance is decentralized, with the responsibility for implementing and testing cybersecurity & data privacy controls being assigned to the business process owner(s), including the definition and enforcement of roles and responsibilities.
Secure Engineering & Architecture (SEA) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Architecture/engineering management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • A Change Advisory Board (CAB), or similar function, exists to govern changes to systems, applications and services, ensuring their stability, reliability and predictability. • Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed. • IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for architecture/engineering management. • IT personnel implement secure engineering practices to protect the confidentiality, integrity, availability and safety of the organization’s technology assets, data and network(s). • Technologies are configured to protect data with the strength and integrity commensurate with the classification or sensitivity of the information and mostly conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides), including cryptographic protections for sensitive/regulated data.
Secure Engineering & Architecture (SEA) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • IT/cybersecurity architects, or a similar function, enable the implementation a “layered defense” network architecture that enables a resilient defense-in-depth approach through the use of industry-recognized cybersecurity & data privacy practices in the specification, design, development, implementation and modification of systems and services (e.g., DISA STIGs, CIS Benchmarks or OEM security guides). • IT/cybersecurity engineers, or a similar function, operationalize enterprise architecture, aligned with industry-recognized leading practices, with consideration for cybersecurity & data privacy principles, including resiliency expectations, that addresses risk to organizational operations, assets, individuals, other organizations. • A Validated Architecture Design Review (VADR), or similar process, is used to evaluate design criteria for secure practices and conformance with requirements for applicable statutory, regulatory and contractual controls to determine if the system/application/service is designed, built and operated in a secure and resilient manner. • A Change Advisory Board (CAB), or similar function, governs changes to systems, applications and services to ensure their stability, reliability and predictability. • A formal Change Management (CM) program helps to ensure that no unauthorized changes are made, all changes are documented, services are not disrupted and resources are used efficiently. • An Identity & Access Management (IAM) function, or similar function, enables the implementation of identification and access management controls for “least privileges” practices, allowing for the management of user, group and system accounts, including privileged accounts. • An IT Asset Management (ITAM) function, or similar function, categorizes assets according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data.
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to implement a separate execution domain for each executing process.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to implement a separate execution domain for each executing process.
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
T1003, T1003.001, T1003.002, T1003.003, T1003.004, T1003.005, T1003.006, T1003.007, T1003.008, T1068, T1189, T1190, T1203, T1210, T1211, T1212, T1547.002, T1547.005, T1547.008, T1556, T1556.001, T1611
null
null
null
null
null
null
null
SC-39
SC-39
SC-39
SC-39
SC-39
null
SC-39
SC-39
SC-39
null
null
SC-39
SC-39
SC-39
null
null
null
null
null
null
null
NFO - SC-39
null
null
null
null
null
null
null
A01:2021 A05:2021
null
null
null
null
null
null
null
null
null
null
null
D.16.5
null
null
null
null
null
null
TM:SG2.SP2
null
null
null
null
null
null
null
null
SC-39
null
null
null
null
null
null
null
SC-39
SC-39
SC-39
SC-39
SC-39
SC-39
SC-39
SC-39
SC-39
SC-39
null
null
null
null
null
null
null
null
null
SC-39
null
null
null
null
null
null
null
null
null
SC-39
SC-39
SC-39
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
SC-39
SC-39
SC-39
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Principle 5.6
Principle 5.7
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
x
null
x
null
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-1 R-AM-2 R-AM-3 R-BC-1 R-BC-2 R-BC-4 R-BC-5 R-EX-7 R-GV-1 R-GV-2 R-GV-4 R-GV-5 R-IR-1 R-IR-4
R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
null
R-BC-4
R-BC-5
null
null
null
null
null
null
R-EX-7
R-GV-1
R-GV-2
null
R-GV-4
R-GV-5
null
null
null
R-IR-1
null
null
R-IR-4
null
null
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
null
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Secure Engineering & Architecture
Security Function Isolation
SEA-04.1
Mechanisms exist to isolate security functions from non-security functions.
null
null
Does the organization isolate security functions from non-security functions?
7
Protect
null
null
X
There is no evidence of a capability to isolate security functions from non-security functions.
Secure Engineering & Architecture (SEA) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist: • IT personnel use an informal process to design, build and maintain secure solutions. • IT /cyber engineering governance is decentralized, with the responsibility for implementing and testing cybersecurity & data privacy controls being assigned to the business process owner(s), including the definition and enforcement of roles and responsibilities.
Secure Engineering & Architecture (SEA) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Architecture/engineering management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • A Change Advisory Board (CAB), or similar function, exists to govern changes to systems, applications and services, ensuring their stability, reliability and predictability. • Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed. • IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for architecture/engineering management. • IT personnel implement secure engineering practices to protect the confidentiality, integrity, availability and safety of the organization’s technology assets, data and network(s). • Technologies are configured to protect data with the strength and integrity commensurate with the classification or sensitivity of the information and mostly conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides), including cryptographic protections for sensitive/regulated data.
Secure Engineering & Architecture (SEA) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • IT/cybersecurity architects, or a similar function, enable the implementation a “layered defense” network architecture that enables a resilient defense-in-depth approach through the use of industry-recognized cybersecurity & data privacy practices in the specification, design, development, implementation and modification of systems and services (e.g., DISA STIGs, CIS Benchmarks or OEM security guides). • IT/cybersecurity engineers, or a similar function, operationalize enterprise architecture, aligned with industry-recognized leading practices, with consideration for cybersecurity & data privacy principles, including resiliency expectations, that addresses risk to organizational operations, assets, individuals, other organizations. • A Validated Architecture Design Review (VADR), or similar process, is used to evaluate design criteria for secure practices and conformance with requirements for applicable statutory, regulatory and contractual controls to determine if the system/application/service is designed, built and operated in a secure and resilient manner. • A Change Advisory Board (CAB), or similar function, governs changes to systems, applications and services to ensure their stability, reliability and predictability. • A formal Change Management (CM) program helps to ensure that no unauthorized changes are made, all changes are documented, services are not disrupted and resources are used efficiently. • An Identity & Access Management (IAM) function, or similar function, enables the implementation of identification and access management controls for “least privileges” practices, allowing for the management of user, group and system accounts, including privileged accounts. • An IT Asset Management (ITAM) function, or similar function, categorizes assets according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data.
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to isolate security functions from non-security functions.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to isolate security functions from non-security functions.
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
T1003.001, T1021.003, T1047, T1068, T1134.005, T1189, T1190, T1203, T1210, T1211, T1212, T1559, T1559.001, T1559.002, T1602, T1602.001, T1602.002, T1611
null
null
null
null
null
null
null
SC-3
null
null
SC-3
SC-3
null
null
null
SC-3
null
null
null
null
SC-3
null
null
null
null
null
null
null
null
null
null
null
3.14.3e
null
null
null
A01:2021 A05:2021
1.2 1.3.1 2.2.1 11.3.4 11.3.4.1
2.2.3 10.7.1 11.4.5 11.4.6
null
2.2.3 11.4.5
null
11.4.5
2.2.3 11.4.5
null
2.2.3 11.4.5
2.2.3 10.7.1 11.4.5 11.4.6
null
D.16.5
null
null
null
null
null
null
null
null
null
null
null
TBD - 3.14.3e
null
null
SI.L3-3.14.3e
null
null
null
null
null
null
null
null
SC-3
null
null
SC-3
null
SC-3
null
null
SC-3
null
null
null
null
null
null
null
null
null
null
null
null
null
8-105
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
x
null
x
null
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-1 R-AM-2 R-AM-3 R-BC-1 R-BC-2 R-BC-3 R-BC-4 R-BC-5 R-EX-1 R-EX-2 R-EX-3 R-EX-4 R-EX-5 R-EX-6 R-EX-7 R-GV-1 R-GV-2 R-GV-3 R-GV-4 R-GV-5 R-GV-6 R-GV-7 R-IR-1 R-IR-2 R-IR-3 R-IR-4 R-SA-1
R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
R-BC-3
R-BC-4
R-BC-5
R-EX-1
R-EX-2
R-EX-3
R-EX-4
R-EX-5
R-EX-6
R-EX-7
R-GV-1
R-GV-2
R-GV-3
R-GV-4
R-GV-5
R-GV-6
R-GV-7
null
R-IR-1
R-IR-2
R-IR-3
R-IR-4
R-SA-1
null
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-10 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Secure Engineering & Architecture
Hardware Separation
SEA-04.2
Mechanisms exist to implement underlying hardware separation mechanisms to facilitate process separation.
null
null
Does the organization implement underlying hardware separation mechanisms to facilitate process separation?
7
Protect
null
null
X
There is no evidence of a capability to implement underlying hardware separation mechanisms to facilitate process separation.
Secure Engineering & Architecture (SEA) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist: • IT personnel use an informal process to design, build and maintain secure solutions. • IT /cyber engineering governance is decentralized, with the responsibility for implementing and testing cybersecurity & data privacy controls being assigned to the business process owner(s), including the definition and enforcement of roles and responsibilities.
Secure Engineering & Architecture (SEA) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Architecture/engineering management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • A Change Advisory Board (CAB), or similar function, exists to govern changes to systems, applications and services, ensuring their stability, reliability and predictability. • Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed. • IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for architecture/engineering management. • IT personnel implement secure engineering practices to protect the confidentiality, integrity, availability and safety of the organization’s technology assets, data and network(s). • Technologies are configured to protect data with the strength and integrity commensurate with the classification or sensitivity of the information and mostly conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides), including cryptographic protections for sensitive/regulated data.
Secure Engineering & Architecture (SEA) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • IT/cybersecurity architects, or a similar function, enable the implementation a “layered defense” network architecture that enables a resilient defense-in-depth approach through the use of industry-recognized cybersecurity & data privacy practices in the specification, design, development, implementation and modification of systems and services (e.g., DISA STIGs, CIS Benchmarks or OEM security guides). • IT/cybersecurity engineers, or a similar function, operationalize enterprise architecture, aligned with industry-recognized leading practices, with consideration for cybersecurity & data privacy principles, including resiliency expectations, that addresses risk to organizational operations, assets, individuals, other organizations. • A Validated Architecture Design Review (VADR), or similar process, is used to evaluate design criteria for secure practices and conformance with requirements for applicable statutory, regulatory and contractual controls to determine if the system/application/service is designed, built and operated in a secure and resilient manner. • A Change Advisory Board (CAB), or similar function, governs changes to systems, applications and services to ensure their stability, reliability and predictability. • A formal Change Management (CM) program helps to ensure that no unauthorized changes are made, all changes are documented, services are not disrupted and resources are used efficiently. • An Identity & Access Management (IAM) function, or similar function, enables the implementation of identification and access management controls for “least privileges” practices, allowing for the management of user, group and system accounts, including privileged accounts. • An IT Asset Management (ITAM) function, or similar function, categorizes assets according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data.
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to implement underlying hardware separation mechanisms to facilitate process separation.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to implement underlying hardware separation mechanisms to facilitate process separation.
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
SC-39(1)
null
null
null
SC-39(1)
null
null
null
null
SC-39(1)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
A01:2021 A05:2021
null
null
null
null
null
null
null
null
null
null
null
D.16.4
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
x
null
x
null
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-1 R-AM-2 R-BC-1 R-BC-2 R-BC-4 R-BC-5 R-EX-7 R-GV-1 R-GV-2 R-GV-4 R-GV-5 R-IR-1 R-IR-4
R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
null
R-BC-1
R-BC-2
null
R-BC-4
R-BC-5
null
null
null
null
null
null
R-EX-7
R-GV-1
R-GV-2
null
R-GV-4
R-GV-5
null
null
null
R-IR-1
null
null
R-IR-4
null
null
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-10 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15
null
null
Secure Engineering & Architecture
Thread Separation
SEA-04.3
Mechanisms exist to maintain a separate execution domain for each thread in multi-threaded processing.
null
null
Does the organization maintain a separate execution domain for each thread in multi-threaded processing?
7
Protect
null
null
X
There is no evidence of a capability to maintain a separate execution domain for each thread in multi-threaded processing.
Secure Engineering & Architecture (SEA) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist: • IT personnel use an informal process to design, build and maintain secure solutions. • IT /cyber engineering governance is decentralized, with the responsibility for implementing and testing cybersecurity & data privacy controls being assigned to the business process owner(s), including the definition and enforcement of roles and responsibilities.
Secure Engineering & Architecture (SEA) efforts are requirements-driven and formally governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: • Architecture/engineering management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure and compliant practices. • A Change Advisory Board (CAB), or similar function, exists to govern changes to systems, applications and services, ensuring their stability, reliability and predictability. • Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed. • IT/cybersecurity personnel identify cybersecurity & data privacy controls to address applicable statutory, regulatory and contractual requirements for architecture/engineering management. • IT personnel implement secure engineering practices to protect the confidentiality, integrity, availability and safety of the organization’s technology assets, data and network(s). • Technologies are configured to protect data with the strength and integrity commensurate with the classification or sensitivity of the information and mostly conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides), including cryptographic protections for sensitive/regulated data.
Secure Engineering & Architecture (SEA) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: • IT/cybersecurity architects, or a similar function, enable the implementation a “layered defense” network architecture that enables a resilient defense-in-depth approach through the use of industry-recognized cybersecurity & data privacy practices in the specification, design, development, implementation and modification of systems and services (e.g., DISA STIGs, CIS Benchmarks or OEM security guides). • IT/cybersecurity engineers, or a similar function, operationalize enterprise architecture, aligned with industry-recognized leading practices, with consideration for cybersecurity & data privacy principles, including resiliency expectations, that addresses risk to organizational operations, assets, individuals, other organizations. • A Validated Architecture Design Review (VADR), or similar process, is used to evaluate design criteria for secure practices and conformance with requirements for applicable statutory, regulatory and contractual controls to determine if the system/application/service is designed, built and operated in a secure and resilient manner. • A Change Advisory Board (CAB), or similar function, governs changes to systems, applications and services to ensure their stability, reliability and predictability. • A formal Change Management (CM) program helps to ensure that no unauthorized changes are made, all changes are documented, services are not disrupted and resources are used efficiently. • An Identity & Access Management (IAM) function, or similar function, enables the implementation of identification and access management controls for “least privileges” practices, allowing for the management of user, group and system accounts, including privileged accounts. • An IT Asset Management (ITAM) function, or similar function, categorizes assets according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data.
See SP-CMM3. SP-CMM4 is N/A, since a quantitatively-controlled process is not necessary to maintain a separate execution domain for each thread in multi-threaded processing.
See SP-CMM4. SP-CMM5 is N/A, since a continuously-improving process is not necessary to maintain a separate execution domain for each thread in multi-threaded processing.
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
SC-39(2)
null
null
null
SC-39(2)
null
null
null
null
SC-39(2)
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
A01:2021 A05:2021
null
null
null
null
null
null
null
null
null
null
null
D.16.7
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
x
null
x
null
R-AC-1 R-AC-2 R-AC-3 R-AC-4 R-AM-1 R-AM-2 R-AM-3 R-BC-1 R-BC-2 R-BC-4 R-BC-5 R-EX-7 R-GV-1 R-GV-2 R-GV-4 R-GV-5 R-IR-1 R-IR-4
R-AC-1
R-AC-2
R-AC-3
R-AC-4
R-AM-1
R-AM-2
R-AM-3
R-BC-1
R-BC-2
null
R-BC-4
R-BC-5
null
null
null
null
null
null
R-EX-7
R-GV-1
R-GV-2
null
R-GV-4
R-GV-5
null
null
null
R-IR-1
null
null
R-IR-4
null
null
NT-7 MT-1 MT-2 MT-7 MT-8 MT-9 MT-10 MT-11 MT-12 MT-13 MT-14 MT-15
null
null
null
null
null
null
NT-7
null
null
null
null
null
null
null
MT-1
MT-2
null
null
null
null
MT-7
MT-8
MT-9
MT-10
MT-11
MT-12
MT-13
MT-14
MT-15
null
null