Skip to main content

GOV-15.5: Monitor Controls

GOV 8 — High Govern

Mechanisms exist to compel data and/or process owners to monitor Technology Assets, Applications and/or Services (TAAS) under their control on an ongoing basis for applicable threats and risks, as well as to ensure cybersecurity and data protection controls are operating as intended.

Control Question: Does the organization compel data and/or process owners to monitor Technology Assets, Applications and/or Services (TAAS) under their control on an ongoing basis for applicable threats and risks, as well as to ensure cybersecurity and data protection controls are operating as intended?

General (8)
Framework Mapping Values
ISO/SAE 21434 2021 RQ-10-03
ISO 27001 2022 (source) 9.2.2
ISO 29100 2024 6.12
ISO 42001 2023 8.1
NIST 800-171 R3 (source) 03.15.01.a 03.17.01.a
SCF CORE Mergers, Acquisitions & Divestitures (MA&D) GOV-15.5
SCF CORE ESP Level 2 Critical Infrastructure GOV-15.5
SCF CORE ESP Level 3 Advanced Threats GOV-15.5
US (4)
Framework Mapping Values
US FCA CRM 609.930(a)
US FIPPS 2
US HIPAA Administrative Simplification 2013 (source) 164.306(a)(1)
US HIPAA Security Rule / NIST SP 800-66 R2 (source) 164.306(a)(1)
EMEA (6)
Framework Mapping Values
EMEA EU DORA 7(a) 7(b) 7(c) 7(d)
EMEA Qatar PDPPL 8.3 11.7 11.8
EMEA Saudi Arabia IoT CGIoT-1 2024 1-6-1
EMEA Saudi Arabia OTCC-1 2022 2-3 2-3-2
EMEA Serbia 87/2018 50 51
EMEA UK CAP 1850 A5
APAC (3)
Americas (2)
Framework Mapping Values
Americas Canada OSFI B-13 1.1.1 2.1.1
Americas Canada ITSP-10-171 03.15.01.A 03.17.01.A

Capability Maturity Model

Level 0 — Not Performed

There is no evidence of a capability to compel data and/ or process owners to monitor Technology Assets, Applications and/or Services (TAAS) under their control on an ongoing basis for applicable threats and risks, as well as to ensure cybersecurity and data protection controls are operating as intended.

Level 1 — Performed Informally

C|P-CMM1 is N/A, since a structured process is required to compel data and/ or process owners to monitor Technology Assets, Applications and/or Services (TAAS) under their control on an ongoing basis for applicable threats and risks, as well as to ensure cybersecurity and data protection controls are operating as intended.

Level 2 — Planned & Tracked

C|P-CMM2 is N/A, since a well-defined process is required to compel data and/ or process owners to monitor Technology Assets, Applications and/or Services (TAAS) under their control on an ongoing basis for applicable threats and risks, as well as to ensure cybersecurity and data protection controls are operating as intended.

Level 3 — Well Defined

Cybersecurity & Privacy Governance (GOV) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:

  • Statutory, regulatory and contractual compliance requirements for cybersecurity and data protection are identified and documented. Recurring testing is utilized to assess adherence to internal standards and/or external compliance requirements.
  • A Governance, Risk & Compliance (GRC) function, or similar function, provides scoping guidance to determine control applicability.
  • Internal policies and standards address all statutory, regulatory and contractual obligations for cybersecurity and data protection.
  • Controls are standardized across the organization to ensure uniformity and consistent execution.
  • Corporate governance (executive oversight) exists for the cybersecurity and data privacy, which includes regular briefings to ensure executives have sufficient situational awareness to properly govern the organization.
  • Procedures are established for sensitive/regulated compliance obligations that are standardized across the organization.
  • Defined roles & responsibilities require data/process owners to define, implement and maintain cybersecurity and data protection controls for each system, application and/ or service of which they have accountability.
  • The organization designates one or more qualified individuals to govern the cybersecurity and data privacy programs (e.g., Chief Information Security Officer or Chief Privacy Officer).
  • Risk management processes are defined, to include materiality considerations.
Level 4 — Quantitatively Controlled

See C|P-CMM3. There are no defined C|P-CMM4 criteria, since it is reasonable to assume a quantitatively-controlled process is not necessary to compel data and/ or process owners to monitor Technology Assets, Applications and/or Services (TAAS) under their control on an ongoing basis for applicable threats and risks, as well as to ensure cybersecurity and data protection controls are operating as intended.

Level 5 — Continuously Improving

See C|P-CMM4. There are no defined C|P-CMM5 criteria, since it is reasonable to assume a continuously-improving process is not necessary to compel data and/ or process owners to monitor Technology Assets, Applications and/or Services (TAAS) under their control on an ongoing basis for applicable threats and risks, as well as to ensure cybersecurity and data protection controls are operating as intended.

Assessment Objectives

  1. GOV-15.5_A01 roles and responsibilities exist to compel data and/or process owners to monitor systems, applications and/or services under their control on an ongoing basis for applicable threats and risks, as well as to ensure cybersecurity / data privacy controls are operating as intended.
  2. GOV-15.5_A02 Individual Contributor (IC) performance reviews cover how data and/or process owners monitor systems, applications and/or services under their control on an ongoing basis for applicable threats and risks, as well as to ensure cybersecurity / data privacy controls are operating as intended.

Technology Recommendations

Micro/Small

  • SCF Integrated Controls Management (ICM) model (https://securecontrolsframework.com/integrated-controls-management)

Small

  • SCF Integrated Controls Management (ICM) model (https://securecontrolsframework.com/integrated-controls-management)

Medium

  • SCF Integrated Controls Management (ICM) model (https://securecontrolsframework.com/integrated-controls-management)

Large

  • SCF Integrated Controls Management (ICM) model (https://securecontrolsframework.com/integrated-controls-management)

Enterprise

  • SCF Integrated Controls Management (ICM) model (https://securecontrolsframework.com/integrated-controls-management)

The Secure Controls Framework (SCF) is maintained by SCF Council. Use of SCF content is subject to the SCF Terms & Conditions.

Manage this control in SCF Connect

Track implementation status, collect evidence, and map controls to your compliance frameworks automatically.