Skip to main content

IAO-01.1: Assessment Boundaries

IAO 9 — Critical Identify

Mechanisms exist to establish the scope of assessments by defining the assessment boundary, according to people, processes and technology that directly or indirectly impact the confidentiality, integrity, availability and safety of the Technology Assets, Applications, Services and/or Data (TAASD) under review.

Control Question: Does the organization establish the scope of assessments by defining the assessment boundary, according to people, processes and technology that directly or indirectly impact the confidentiality, integrity, availability and safety of the Technology Assets, Applications, Services and/or Data (TAASD) under review?

General (6)
Framework Mapping Values
AICPA TSC 2017:2022 (used for SOC 2) (source) CC2.2-POF11
ISO/SAE 21434 2021 RQ-05-17 RQ-06-23 RQ-06-30.a RQ-06-30.b RQ-06-30.c RQ-06-30.d RQ-09-01.a RQ-09-01.b RQ-09-01.c RQ-09-02
NIST 800-171 R3 (source) 03.12.01
SCF CORE Mergers, Acquisitions & Divestitures (MA&D) IAO-01.1
SCF CORE ESP Level 2 Critical Infrastructure IAO-01.1
SCF CORE ESP Level 3 Advanced Threats IAO-01.1
US (4)
EMEA (1)
Framework Mapping Values
EMEA EU NIS2 Annex 6.5.2(c)
APAC (2)
Framework Mapping Values
APAC New Zealand NZISM 3.6 5.8.61.C.01 5.8.61.C.02 5.8.61.C.03
APAC Singapore MAS TRM 2021 5.7.1 5.7.2
Americas (2)
Framework Mapping Values
Americas Canada OSFI B-13 2.4.4
Americas Canada ITSP-10-171 03.12.01

Capability Maturity Model

Level 0 — Not Performed

There is no evidence of a capability to establish the scope of assessments by defining the assessment boundary, according to people, processes and technology that directly or indirectly impact the confidentiality, integrity, availability and safety of the Technology Assets, Applications, Services and/or Data (TAASD) under review.

Level 1 — Performed Informally

C|P-CMM1 is N/A, since a structured process is required to establish the scope of assessments by defining the assessment boundary, according to people, processes and technology that directly or indirectly impact the confidentiality, integrity, availability and safety of the Technology Assets, Applications, Services and/or Data (TAASD) under review.

Level 2 — Planned & Tracked

Information Assurance (IA) is requirements-driven and governed at a local/regional level, but not consistently across the enterprise. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:

  • Pre-production security testing is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure, resilient and compliant practices.
  • IT/cybersecurity personnel identify cybersecurity and data protection controls that are appropriate to address applicable statutory, regulatory and contractual requirements for pre-production cybersecurity and data privacy control testing.
  • IT personnel implement and maintain an established a limited Information Assurance Program (IAP) capability to conduct limited control testing to meet specific statutory, regulatory and/ or contractual requirements for pre-production cybersecurity and data privacy control testing.
  • IAP operations focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
Level 3 — Well Defined

Information Assurance (IA) is standardized across the enterprise and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:

  • Cybersecurity personnel implement and maintain an established Information Assurance Program (IAP) capability to conduct “business as usual” pre-production cybersecurity and data privacy control testing focused on the concept of “security and data privacy be design and by default.”
  • The IAP validates that systems/applications/services/processes are both secure and compliant.
  • A Governance, Risk & Compliance (GRC) function, or similar function, facilitates the implementation of cybersecurity and data protection controls to ensure that secure engineering practices are designed and implemented throughout the lifecycle of systems, applications and services both internal and external to the organization.
  • A Project Management Office (PMO), or project management function, ensures project involvement for IAP as part of the organization's established project management processes.
  • A Plan of Action and Milestones (POA&M) or similar mechanism, exists to document planned remediation actions to correct weaknesses or deficiencies noted during the assessment of the security controls, helping to reduce or eliminate known vulnerabilities.
  • Administrative processes prevent systems/applications/services/processes from “going live” in a production environment without first going through the IAP process.
  • The IAP uses a tiered approach to conformity testing, based on (1) the sensitivity of data that is stored, processed and/ or transmitted and (2) the criticality of the system/application/service/process.
Level 4 — Quantitatively Controlled

See C|P-CMM3. There are no defined C|P-CMM4 criteria, since it is reasonable to assume a quantitatively-controlled process is not necessary to establish the scope of assessments by defining the assessment boundary, according to people, processes and technology that directly or indirectly impact the confidentiality, integrity, availability and safety of the Technology Assets, Applications, Services and/or Data (TAASD) under review.

Level 5 — Continuously Improving

See C|P-CMM4. There are no defined C|P-CMM5 criteria, since it is reasonable to assume a continuously-improving process is not necessary to establish the scope of assessments by defining the assessment boundary, according to people, processes and technology that directly or indirectly impact the confidentiality, integrity, availability and safety of the Technology Assets, Applications, Services and/or Data (TAASD) under review.

Assessment Objectives

  1. IAO-01.1_A01 assessments are defined as (1) organization-level, (2) mission/business process-level, or (3) system/application/service-level.
  2. IAO-01.1_A02 the scope of assessments is established by defining the assessment boundary, according to people, processes and technology that directly or indirectly impact the confidentiality, integrity, availability and safety of the data and systems under review.

Evidence Requirements

E-AST-02 Asset Scoping Guidance

Documented evidence of an asset scoping guidance. This is program-level documentation in the form of a runbook, playbook or a similar format provides guidance on defining in-scope systems, applications, services, processes and third-parties.

Asset Management

Technology Recommendations

The Secure Controls Framework (SCF) is maintained by SCF Council. Use of SCF content is subject to the SCF Terms & Conditions.

Manage this control in SCF Connect

Track implementation status, collect evidence, and map controls to your compliance frameworks automatically.