GOV-07: Contacts With Groups & Associations
Mechanisms exist to establish contact with selected groups and associations within the cybersecurity and data privacy communities to: (1) Facilitate ongoing cybersecurity and data protection education and training for organizational personnel; (2) Maintain currency with recommended cybersecurity and data protection practices, techniques and technologies; and (3) Share current cybersecurity and/or data privacy-related information including threats, vulnerabilities and incidents.
Control Question: Does the organization establish contact with selected groups and associations within the cybersecurity and data protection communities to: (1) Facilitate ongoing cybersecurity and data protection education and training for organizational personnel; (2) Maintain currency with recommended cybersecurity and data protection practices, techniques and technologies; and (3) Share current cybersecurity and/or data privacy-related information including threats, vulnerabilities and incidents?
General (23)
| Framework | Mapping Values |
|---|---|
| AICPA TSC 2017:2022 (used for SOC 2) (source) | CC2.2-POF4 CC2.3 |
| CSA CCM 4 | GRC-08 |
| ISO 27002 2022 | 5.6 |
| ISO 27017 2015 | 6.1.4 |
| NIST 800-53 R4 | PM-15 |
| NIST 800-53 R5 (source) | PM-15 |
| NIST 800-53 R5 (NOC) (source) | PM-15 |
| NIST 800-161 R1 | PM-15 |
| NIST 800-161 R1 Level 1 | PM-15 |
| NIST 800-161 R1 Level 2 | PM-15 |
| NIST CSF 2.0 (source) | ID.RA-02 |
| PCI DSS 4.0.1 (source) | 6.3.1 |
| PCI DSS 4.0.1 SAQ A (source) | 6.3.1 |
| PCI DSS 4.0.1 SAQ A-EP (source) | 6.3.1 |
| PCI DSS 4.0.1 SAQ B-IP (source) | 6.3.1 |
| PCI DSS 4.0.1 SAQ C (source) | 6.3.1 |
| PCI DSS 4.0.1 SAQ C-VT (source) | 6.3.1 |
| PCI DSS 4.0.1 SAQ D Merchant (source) | 6.3.1 |
| PCI DSS 4.0.1 SAQ D Service Provider (source) | 6.3.1 |
| SCF CORE Mergers, Acquisitions & Divestitures (MA&D) | GOV-07 |
| SCF CORE ESP Level 1 Foundational | GOV-07 |
| SCF CORE ESP Level 2 Critical Infrastructure | GOV-07 |
| SCF CORE ESP Level 3 Advanced Threats | GOV-07 |
US (6)
| Framework | Mapping Values |
|---|---|
| US CERT RMM 1.2 | COMM:SG2.SP1 OTA:SG2.SP1 |
| US CMS MARS-E 2.0 | PM-15 |
| US HIPAA HICP Medium Practice | 8.M.A 8.M.C |
| US HIPAA HICP Large Practice | 8.M.A 8.M.C 9.L.D |
| US NISPOM 2020 | 8-101 |
| US - TX DIR Control Standards 2.0 | PM-15 |
EMEA (1)
| Framework | Mapping Values |
|---|---|
| EMEA EU DORA | 45.1 45.1(a) 45.1(b) 45.1(c) 45.2 |
APAC (1)
| Framework | Mapping Values |
|---|---|
| APAC Japan ISMAP | 6.1.4 |
Americas (1)
| Framework | Mapping Values |
|---|---|
| Americas Canada CSAG | 3.7 |
Capability Maturity Model
Level 0 — Not Performed
There is no evidence of a capability to establish contact with selected groups and associations within the cybersecurity and data protection communities to: (1) Facilitate ongoing cybersecurity and data protection education and training for organizational personnel; (2) Maintain currency with recommended cybersecurity and data protection practices, techniques and technologies; and (3) Share current cybersecurity and/or data privacy-related information including threats, vulnerabilities and incidents.
Level 1 — Performed Informally
Cybersecurity & Privacy Governance (GOV) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
- No formal cybersecurity and/ or data privacy principles are identified for the organization.
- No formal Governance, Risk & Compliance (GRC) team exists. GRC roles are assigned to existing IT/cybersecurity personnel.
- Governance efforts are narrowly-limited to certain compliance requirements.
- Formal roles and responsibilities for cybersecurity and/ or data privacy may exist.
- Cybersecurity and data privacy governance is informally assigned as an additional duty to existing IT/cybersecurity personnel.
- Basic cybersecurity policies and standards are documented [not based on any industry framework]
- Basic procedures are established for important tasks, but are ad hoc and not formally documented.
- Documentation is made available to internal personnel.
- Organizational leadership maintains an informal process to review and respond to observed trends.
- Cybersecurity and data privacy personnel identify and maintain contact information for local, regional and national cybersecurity / data privacy groups and associations.
Level 2 — Planned & Tracked
Cybersecurity & Privacy Governance (GOV) efforts are requirements-driven and governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
- Cybersecurity and data privacy governance activities are decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure, resilient and compliant practices.
- IT/cybersecurity personnel identify cybersecurity and data protection controls that are appropriate to address applicable statutory, regulatory and contractual requirements for cybersecurity and data protection governance activities.
- The Chief Information Officer (CIO), or similar function, analyzes the organization's business strategy and prioritizes the objectives of the security function, based on business requirements.
- A qualified individual is assigned the role and responsibilities to centrally manage, coordinate, develop, implement and maintain a cybersecurity and data protection program (e.g., cybersecurity director or Chief Information Security Officer (CISO)).
- No formal Governance, Risk & Compliance (GRC) team exists. GRC roles are assigned to existing cybersecurity personnel.
- Compliance requirements for cybersecurity and data protection are identified and documented.
- Cybersecurity policies and standards exist that are aligned with a leading cybersecurity framework (e.g., SCF, NIST 800-53, ISO 27002 or NIST Cybersecurity Framework).
- Controls are assigned to sensitive/regulated assets to comply with specific compliance requirements.
- Procedures are established for sensitive/regulated obligations, but are not standardized across the organization.
- Documentation is made available to internal personnel.
- Cybersecurity and data privacy personnel identify and maintain contact information for local, regional and national cybersecurity / data privacy groups and associations.
- Cybersecurity and data privacy personnel in supervisory positions subscribe to news feeds from groups and associations to facilitate ongoing education and training.
Level 3 — Well Defined
Cybersecurity & Privacy Governance (GOV) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
- Statutory, regulatory and contractual compliance requirements for cybersecurity and data protection are identified and documented. Recurring testing is utilized to assess adherence to internal standards and/or external compliance requirements.
- A Governance, Risk & Compliance (GRC) function, or similar function, provides scoping guidance to determine control applicability.
- Internal policies and standards address all statutory, regulatory and contractual obligations for cybersecurity and data protection.
- Controls are standardized across the organization to ensure uniformity and consistent execution.
- Corporate governance (executive oversight) exists for the cybersecurity and data privacy, which includes regular briefings to ensure executives have sufficient situational awareness to properly govern the organization.
- Procedures are established for sensitive/regulated compliance obligations that are standardized across the organization.
- Defined roles & responsibilities require data/process owners to define, implement and maintain cybersecurity and data protection controls for each system, application and/ or service of which they have accountability.
- The organization designates one or more qualified individuals to govern the cybersecurity and data privacy programs (e.g., Chief Information Security Officer or Chief Privacy Officer).
- Risk management processes are defined, to include materiality considerations.
Level 4 — Quantitatively Controlled
Cybersecurity & Privacy Governance (GOV) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
- Metrics are developed that provide management insight, per a quantitative understanding of process capabilities, to predict optimal performance, ensure continued operations and identify areas for improvement.
- Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
- Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
- Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity and data protection controls, including functions performed by third-parties.
- Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
- Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
- Both business and technical stakeholders are involved in reviewing and approving proposed changes.
Level 5 — Continuously Improving
Cybersecurity & Privacy Governance (GOV) efforts are “world-class” capabilities that leverage predictive analysis (e.g., machine learning, AI, etc.). In addition to CMM Level 4 criteria, CMM Level 5 control maturity would reasonably expect all, or at least most, the following criteria to exist:
- Stakeholders make time-sensitive decisions to support operational efficiency, which may include automated remediation actions.
- Based on predictive analysis, process improvements are implemented according to “continuous improvement” practices that affect process changes.
Assessment Objectives
- GOV-07_A01 contact is established and institutionalized with selected groups and associations within the cybersecurity / data privacy community to facilitate ongoing security education and training for organizational personnel.
- GOV-07_A02 contact is established and institutionalized with selected groups and associations within the cybersecurity / data privacy community to maintain currency with recommended security practices, techniques and technologies.
- GOV-07_A03 contact is established and institutionalized with selected groups and associations within the cybersecurity / data privacy community to share current security information, including threats, vulnerabilities and incidents.
Evidence Requirements
- E-THR-02 Industry Associations / Memberships
-
Documented evidence of industry associations the organization utilizes to maintain situational awareness of evolving threats and trends.
Threat Management
Technology Recommendations
Micro/Small
- ISACA chapters
- ISAA chapters
- IAPP chapters
- Cooey Center of Excellence (Discord)
Small
- ISACA chapters
- ISAA chapters
- IAPP chapters
- Cooey Center of Excellence (Discord)
Medium
- ISACA chapters
- ISAA chapters
- IAPP chapters
- Cooey Center of Excellence (Discord)
Large
- ISACA chapters
- ISAA chapters
- IAPP chapters
- Cooey Center of Excellence (Discord)
Enterprise
- ISACA chapters
- ISAA chapters
- IAPP chapters
- Cooey Center of Excellence (Discord)