EMB-01: Embedded Technology Security Program
Mechanisms exist to facilitate the implementation of embedded technology controls.
Control Question: Does the organization facilitate the implementation of embedded technology controls?
General (8)
| Framework | Mapping Values |
|---|---|
| CSA IoT SCF 2 | GVN-01 GVN-02 POL-03 VLN-04 |
| IEC 62443-4-2 2019 | EDR 2.4 (13.2.1) EDR 2.4 (13.2.1(a)) EDR 2.4 (13.2.1(b)) EDR 2.4 (13.2.1(c)) |
| IMO Maritime Cyber Risk Management | 3.5.3.3 |
| OWASP Top 10 2021 | A01:2021 A02:2021 A03:2021 A04:2021 A05:2021 A06:2021 A07:2021 A08:2021 A09:2021 A10:2021 |
| Shared Assessments SIG 2025 | M.1.1 |
| UN R155 | 7.3.7(a) 7.3.7(b) 7.3.7(c) |
| UN ECE WP.29 | 7.3.7(a) 7.3.7(b) 7.3.7(c) |
| SCF CORE Mergers, Acquisitions & Divestitures (MA&D) | EMB-01 |
US (7)
| Framework | Mapping Values |
|---|---|
| US C2M2 2.1 | ARCHITECTURE-3.A.MIL1 ARCHITECTURE-3.B.MIL1 |
| US CISA CPG 2022 | 1.D |
| US DoD Zero Trust Execution Roadmap | 2.4.2 |
| US DHS ZTCF | SYS-05 |
| US HIPAA HICP Small Practice | 9.S.A |
| US HIPAA HICP Medium Practice | 6.M.B 9.M.A |
| US HIPAA HICP Large Practice | 6.M.B 9.M.A |
EMEA (7)
| Framework | Mapping Values |
|---|---|
| EMEA Austria | Sec 14 Sec 15 |
| EMEA Belgium | 16 |
| EMEA Israel CDMO 1.0 | 12.1 12.2 12.3 |
| EMEA Saudi Arabia IoT CGIoT-1 2024 | 1-1-1 1-1-2 2-4-6 2-5-1 |
| EMEA Saudi Arabia ECC-1 2018 | 5-1-1 5-1-2 5-1-3 5-1-4 |
| EMEA Saudi Arabia OTCC-1 2022 | 1-1-2 1-6 2-1-2 2-3-2 |
| EMEA South Africa | 19 |
APAC (1)
| Framework | Mapping Values |
|---|---|
| APAC Singapore MAS TRM 2021 | 11.5.1 11.5.2 11.5.3 11.5.4 11.5.5 |
Capability Maturity Model
Level 0 — Not Performed
There is no evidence of a capability to facilitate the implementation of embedded technology controls.
Level 1 — Performed Informally
Embedded Technology (EMB) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
- Embedded technologies (e.g., Operational Technology (OT) and Internet of Things (IoT) are managed in the same manner as any other technology asset.
- Embedded technologies management is decentralized.
Level 2 — Planned & Tracked
Embedded Technology (EMB) efforts are requirements-driven and governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
- Embedded technology management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure, resilient and compliant practices.
- IT/cybersecurity personnel identify cybersecurity and data protection controls that are appropriate to address applicable statutory, regulatory and contractual requirements for embedded technology management.
- Embedded technologies are configured to protect data with the strength and integrity commensurate with the classification or sensitivity of the information and mostly conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides), including cryptographic protections for sensitive/regulated data.
- Deviations to baseline for embedded technologies configurations are required to have a risk assessment and the business process owner accepts the risk(s) associated with the deviation.
- Unauthorized configuration changes to embedded technologies are responded to in accordance with an Incident Response Plan (IRP) to determine if the unauthorized configuration is malicious in nature.
- Special baselines for embedded technologies configurations are created for higher-risk environments.
- IT/cybersecurity personnel perform an annual review of existing for embedded technologies configurations to ensure security objectives are still being met.
- Data management for embedded technologies is decentralized where data/process owners are expected to take the initiative to work with Data Protection Officers (DPOs) to ensure applicable statutory, regulatory and contractual obligations are properly addressed, including the storage, transmission and processing of sensitive/regulated data.
- Data protection controls are primarily administrative in nature (e.g., policies & standards) to manage embedded technologies.
- Historical versions of configurations are maintained for troubleshooting and forensics purposes.
- Physical controls, administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
Level 3 — Well Defined
Embedded Technology (EMB) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: o Categorizes embedded technologies according to the data the asset stores, transmits and/ or processes to ensure that the appropriate technology controls are applied to protect the asset and the data it stores, transmits or processes. o Ensures known vulnerabilities to embedded technologies are remediated or appropriate compensating controls are implemented to counter the threat. o Ensures that media sanitization and disposal actions are documented and verified. o Subscribes to threat feeds and performs vulnerability scanning to maintain situational awareness on existing threats within the operating environment.
- The Chief Information Security Officer (CISO), or similar function with technical competence to address cybersecurity concerns, analyzes the organization's business strategy to determine prioritized and authoritative guidance for embedded technologies governance practices.
- The CISO, or similar function, develops a security-focused Concept of Operations (CONOPS) that documents management, operational and technical measures to apply defense-in-depth techniques across the enterprise, including governance of embedded technologies.
- A Governance, Risk & Compliance (GRC) function, or similar function, provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity and data protection controls to protect the confidentiality, integrity, availability and safety of the organization's applications, systems, services and data with regards to embedded technologies.
- A steering committee is formally established to provide executive oversight of the cybersecurity and data privacy program, including embedded technologies governance.
- An IT Asset Management (ITAM) function, or similar function:
- An IT infrastructure team, or similar function, ensures that statutory, regulatory and contractual cybersecurity and data privacy obligations are addressed to ensure secure configurations for embedded technologies are designed, built and maintained for embedded technologies.
- Cybersecurity personnel perform annual evaluations of deployed embedded technologies to identify necessary updates to mitigate any newly discovered risks associated with legacy embedded technologies.
- Configurations for embedded technologies conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides) for test, development, staging and production environments.
- Configuration management of embedded technologies is centralized for all operating systems, applications, servers and other technologies that are capable of being configured.
- Special baseline configurations for embedded technologies are created for higher-risk environments.
- Deviations to baseline configurations for embedded technologies are required to have a risk assessment and the business process owner accepts the risk(s) associated with the deviation.
- Unauthorized configuration changes to embedded technologies are responded to in accordance with an Incident Response Plan (IRP) to determine if the unauthorized configuration is malicious in nature.
- A Data Protection Impact Assessment (DPIA) is used to help ensure the protection of sensitive/regulated data processed, stored or transmitted on embedded technologies, so that cybersecurity and data protection controls are implemented in accordance with applicable statutory, regulatory and contractual obligations.
- Administrative processes and technologies limit Personal Data (PD) being processed by embedded technologies to elements identified in the DPIA.
Level 4 — Quantitatively Controlled
Embedded Technology (EMB) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
- Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
- Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
- Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity and data protection controls, including functions performed by third-parties.
- Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
- Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
- Both business and technical stakeholders are involved in reviewing and approving proposed changes.
Level 5 — Continuously Improving
See C|P-CMM4. There are no defined C|P-CMM5 criteria, since it is reasonable to assume a continuously-improving process is not necessary to facilitate the implementation of embedded technology controls.
Assessment Objectives
- EMB-01_A01 embedded technology controls are implemented to protect the confidentiality of Operational Technology (OT) and/or Internet of Things (IoT) technologies.
- EMB-01_A02 embedded technology controls are implemented to protect the integrity of Operational Technology (OT) and/or Internet of Things (IoT) technologies.
- EMB-01_A03 embedded technology controls are implemented to protect the availability of Operational Technology (OT) and/or Internet of Things (IoT) technologies.
- EMB-01_A04 embedded technology controls are implemented to protect the safety of Operational Technology (OT) and/or Internet of Things (IoT) technologies.
- EMB-01_A05 embedded technology management operations are conducted according to documented policies, standards, procedures and/or other organizational directives.
- EMB-01_A06 adequate resources (e.g., people, processes, technologies, data and/or facilities) are provided to support embedded technology management operations.
- EMB-01_A07 responsibility and authority for the performance of embedded technology management-related activities are assigned to designated personnel.
- EMB-01_A08 personnel performing embedded technology management-related activities have the skills and knowledge needed to perform their assigned duties.
Evidence Requirements
- E-AST-07 Cyber-Physical Systems (CPS)
-
Documented evidence of an inventory of the organization's physical assets that process functions based on software and networks.
Asset Management
Technology Recommendations
Micro/Small
- IT Asset Management (ITAM) program
Small
- IT Asset Management (ITAM) program
Medium
- IT Asset Management (ITAM) program
Large
- IT Asset Management (ITAM) program
Enterprise
- IT Asset Management (ITAM) program