Skip to main content

EMB-10: Embedded Technology Reviews

EMB 8 — High Identify

Mechanisms exist to perform evaluations of deployed embedded technologies as needed, or at least on an annual basis, to ensure that necessary updates to mitigate the risks associated with legacy embedded technologies are identified and implemented.

Control Question: Does the organization perform evaluations of deployed embedded technologies as needed, or at least on an annual basis, to ensure that necessary updates to mitigate the risks associated with legacy embedded technologies are identified and implemented?

General (3)
Framework Mapping Values
CSA IoT SCF 2 CCM-01 IOT-08
OWASP Top 10 2021 A06:2021
SCF CORE Mergers, Acquisitions & Divestitures (MA&D) EMB-10
US (1)
Framework Mapping Values
US TSA / DHS 1580/82-2022-01 III.C.5
EMEA (1)
Framework Mapping Values
EMEA Saudi Arabia OTCC-1 2022 1-6 1-6-1 1-6-2 2-1-2 2-3-2 2-7-2 2-9-2

Capability Maturity Model

Level 0 — Not Performed

There is no evidence of a capability to perform evaluations of deployed embedded technologies as needed, or at least on an annual basis, to ensure that necessary updates to mitigate the risks associated with legacy embedded technologies are identified and implemented.

Level 1 — Performed Informally

C|P-CMM1 is N/A, since a structured process is required to perform evaluations of deployed embedded technologies as needed, or at least on an annual basis, to ensure that necessary updates to mitigate the risks associated with legacy embedded technologies are identified and implemented.

Level 2 — Planned & Tracked

C|P-CMM2 is N/A, since a well-defined process is required to perform evaluations of deployed embedded technologies as needed, or at least on an annual basis, to ensure that necessary updates to mitigate the risks associated with legacy embedded technologies are identified and implemented.

Level 3 — Well Defined

Embedded Technology (EMB) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:

  • An IT Asset Management (ITAM) function, or similar function, categorizes embedded technologies according to the data the asset stores, transmits and/ or processes to ensure that the appropriate technology controls are applied to protect the asset and the data it stores, transmits or processes.
  • An IT infrastructure team, or similar function, ensures that statutory, regulatory and contractual cybersecurity and data privacy obligations are addressed to ensure secure configurations for embedded technologies are designed, built and maintained for embedded technologies.
  • Cybersecurity personnel perform annual evaluations of deployed embedded technologies to identify necessary updates to mitigate any newly discovered risks associated with legacy embedded technologies.
  • Configurations for embedded technologies conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides) for test, development, staging and production environments.
  • Configuration management of embedded technologies is centralized for all operating systems, applications, servers and other technologies that are capable of being configured.
  • Special baseline configurations for embedded technologies are created for higher-risk environments.
  • Deviations to baseline configurations for embedded technologies are required to have a risk assessment and the business process owner accepts the risk(s) associated with the deviation.
  • Unauthorized configuration changes to embedded technologies are responded to in accordance with an Incident Response Plan (IRP) to determine if the unauthorized configuration is malicious in nature.
  • A Data Protection Impact Assessment (DPIA) is used to help ensure the protection of sensitive/regulated data processed, stored or transmitted on embedded technologies, so that cybersecurity and data protection controls are implemented in accordance with applicable statutory, regulatory and contractual obligations.
Level 4 — Quantitatively Controlled

See C|P-CMM3. There are no defined C|P-CMM4 criteria, since it is reasonable to assume a quantitatively-controlled process is not necessary to perform evaluations of deployed embedded technologies as needed, or at least on an annual basis, to ensure that necessary updates to mitigate the risks associated with legacy embedded technologies are identified and implemented.

Level 5 — Continuously Improving

See C|P-CMM4. There are no defined C|P-CMM5 criteria, since it is reasonable to assume a continuously-improving process is not necessary to perform evaluations of deployed embedded technologies as needed, or at least on an annual basis, to ensure that necessary updates to mitigate the risks associated with legacy embedded technologies are identified and implemented.

Assessment Objectives

  1. EMB-10_A01 deployed embedded technologies are evaluated per an organization-defined interval (no less than annually) to ensure that necessary updates to mitigate the risks associated with legacy embedded technologies are identified and implemented.

Technology Recommendations

Micro/Small

  • Configuration Management (CM) program
  • Technology maintenance program
  • Technology maintenance program
  • Vulnerability & Patch Management Program (VPMP)
  • Configuration Management Database (CMDB)

Small

  • Configuration Management (CM) program
  • Technology maintenance program
  • Technology maintenance program
  • Vulnerability & Patch Management Program (VPMP)
  • Configuration Management Database (CMDB)

Medium

  • Configuration Management (CM) program
  • Technology maintenance program
  • Technology maintenance program
  • Vulnerability & Patch Management Program (VPMP)
  • Configuration Management Database (CMDB)

Large

  • Configuration Management (CM) program
  • Technology maintenance program
  • Technology maintenance program
  • Vulnerability & Patch Management Program (VPMP)
  • Configuration Management Database (CMDB)

Enterprise

  • Configuration Management (CM) program
  • Technology maintenance program
  • Technology maintenance program
  • Vulnerability & Patch Management Program (VPMP)
  • Configuration Management Database (CMDB)

The Secure Controls Framework (SCF) is maintained by SCF Council. Use of SCF content is subject to the SCF Terms & Conditions.

Manage this control in SCF Connect

Track implementation status, collect evidence, and map controls to your compliance frameworks automatically.