Skip to main content
IAO

Information Assurance

15 controls

Execute an impartial assessment process to validate the existence and functionality of appropriate cybersecurity & data privacy controls, prior to a system, application or service being used in a production environment.

SCF # Control Name Weight NIST CSF Frameworks
IAO-01 Information Assurance (IA) Operations 10 — Critical Govern 88
IAO-01.1 Assessment Boundaries 9 — Critical Identify 15
IAO-02 Assessments 10 — Critical Protect 90
IAO-02.1 Assessor Independence 9 — Critical Protect 36
IAO-02.2 Specialized Assessments 9 — Critical Protect 39
IAO-02.3 Third-Party Assessments 9 — Critical Protect 21
IAO-02.4 Security Assessment Report (SAR) 7 — High Identify 11
IAO-03 System Security & Privacy Plan (SSPP) 7 — High Identify 68
IAO-03.1 Plan / Coordinate with Other Organizational Entities 5 — Medium Protect 33
IAO-03.2 Adequate Security for Sensitive / Regulated Data In Support of Contracts 7 — High Protect 33
IAO-04 Threat Analysis & Flaw Remediation During Development 10 — Critical Protect 26
IAO-05 Plan of Action & Milestones (POA&M) 9 — Critical Detect 76
IAO-05.1 Plan of Action & Milestones (POA&M) Automation 2 — Low Detect 4
IAO-06 Technical Verification 8 — High Protect 50
IAO-07 Security Authorization 10 — Critical Protect 56

The Secure Controls Framework (SCF) is maintained by SCF Council. Use of SCF content is subject to the SCF Terms & Conditions.

Manage SCF Controls in SCF Connect

Streamline your compliance program with automated control tracking, evidence management, and framework mapping.